Risk Framework

The Attached article reading gives a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For This week research paper, please address the following in a properly formatted research paper:

Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

Are there other frameworks mentioned has been discussed in the article that might be more effective?

Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

Prof writing & proposal Devel(DSRT 837)

 

Task: Write a condensed (2.5 – 3 pages or more is fine) chapter 1 for your mock dissertation topic.  You will use the section headers required from the university dissertation handbook.  See examples provided and the rubric. 

The following section headings are required:

  • Overview (1-2 well developed paragraphs)
  • Background and problem statement (1-2 well developed paragraphs)
  • Purpose of the study (1 well developed paragraph)
  • Significance of the study (1 well developed paragraph) 
  • Research Questions (numbered list)
  • Limitations of the Study (1 short paragraph)
  • Assumptions (1 short paragraph)
  • Definitions (list)
  • Summary (1 well developed paragraph)

Research Paper 12

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

risk assessment on Acme Enterprise

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment

concepts we have learned about thus far. Each of the areas of the infrastructure mentioned

above is where you will concentrate your assessments. After you have completed your risk

assessment, you will then provide recommendations for each area that you assessed to

reduce risk, exposure, and threat. Also, as part of your final submission demonstrate

through a redesign where your mitigations will take place within the architecture. You can

use the image below as guide for your risk analysis of each area.

Discussion

Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Please conduct the following activity located at the following address:

http://seeingdata.org/developing-visualisation-literacy/rate-these-visualisations/

Tell us what you think of the visualisations that we used in our focus group research. Instructions below!

What to do

  1. Look at the visualisations by clicking on the images below. You can choose to open the visualisation in a NEW tab or window (we recommend this) or view it in a pop-up window if you prefer to stay on this page. Some are interactive (i) and some are static (s).
  2. Place the images on the grid. When you’ve looked at one, go to the grid and position the image according to whether you liked or didn’t like and learned or didn’t learn something from the visualisation (‘learning something’ could also mean confirming something you already knew). Only place the visualisations that you have looked at onto the grid. Click SUBMIT.
  3. Compare your views with others. You can compare your responses to the visualisations with those of others, by clicking COMPARE.

Choose three of your favorite visualisations. Post a 3 – 5 sentence summary of why you chose the visualisations. What caught your attention? Were they effective in presenting the provided data? If possible, explain how you would you do to improve the visualization?

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Discussion question, 350 words and 2 references.

Communication and Team Decision Making

Part 1: Sharpening the Team Mind: Communication and Collective Intelligence

A.    What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster?

B.      Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss  measures that might have prevented problems from arising within each team’s communication system.

Part 2: Team Decision-Making: Pitfalls and Solutions

A.    What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink? 

B.    Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals?

Case Scenario

An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. (Attached) 

Remember to use a professional writing style and support your statements with logical evidence. 

Include APA citations within your paper as well as an APA formatted references list.

Final Research Paper – ERM

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.