Assignment
help3
if you are not an expert on the topic don’t bid.
further guidelines will be provided on chat.
see file attached.
Research Paper
** RESEARCH PAPER**
please address the following in a properly formatted research paper:
1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
2. Are there other frameworks mentioned has been discussed in the article that might be more effective?
3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?
Your paper should meet the following requirements:
Be approximately five to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
**DISCUSSION POST**
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.
Mini Paper
My Topic is a:- a comparison of authentication mechanisms
Research topic. You must include at least four primary, peer-reviewed sources in your bibliography. Additional sources of varying standards can also be used. However, these four must be specifically cited. An un-cited source should not appear in your bibliography.
A primary source is the original material. If you are directly quoting the words of an author, that is usually a primary source. However, if you are quoting a paraphrase from an author (known because the author is making a citation), then you should find the original document they are paraphrasing and then quote or paraphrase the original.
- Peer-reviewed means that experts in the field have vetted the ideas, methods, and conclusions to determine its suitability for publication.
- Use the library databases, Google Scholar, and Wikipedia to locate these primary sources (i.e. see what Wikipedia cites, or what papers are listed as often cited in Google Scholar). Ensure that they are from peer reviewed sources (such as ACM, IEEE, etc.) and not from trade publications (such as eWeek, PC Magazine, etc.) Wikipedia is not a primary source — you can use it, but it will not count as one of the four peer reviewed primary sources.
- Write a 4 to 6 page research paper on your topic. The page count excludes any figures, tables, pictures, title page, front-matter, back-matter, appendices, or bibliographic references. In other words, there should be 4 to 6 pages of double-spaced prose.
- Proofread your assignment carefully. Improper English grammar, sentence structure, punctuation, or spelling will result in significant point deductions.
Discussion 1
IT innovation has been a key component of organizational operations and strategy. For years, many business leaders did not see IT as vital to business, which resulted in missed opportunities to grow, and in some cases, sustain the business. Evaluate the role of IT solutions in an organization with which you are familiar. Explain how the business is using IT as a solution for the organization’s operations and strategy. Distinguish among hardware components, operating systems, programming languages, programs, and applications being used by the organization. Identify the solutions already in place and any areas where the business is not using IT. Describe the perceived impact the lack of IT has on the business both internally and externally. Provide examples from any of the required resources to support your answers.
Your post must be a minimum of 250 words.
Discussion
1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
2. What are the privacy issues with data mining? Do you think they are substantiated?
Disaster Recovery – From Chapter 1, page 37, Real World Exercise 1.1 -350 words
Exercise 1-1
Using a Web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter. Are there sections missing? If so, which ones?
AmazonEcho
Instructions
1. Please read these two articles:
· Using forensics against a fitbit device to solve a murder: https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/
· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data
2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.
3. Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!
4. I expect at least one paragraph answer for each device.
Why did I assign this?
The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation!
SQL injection vulnerabilities (Cyber Security)
- Injection attacks have stood at the top of the OWASP Top 10 for nearly a decade. Why do you think SQL injection vulnerabilities still exist? What procedures, policies, or practices do you think it will take to make them stop?
Cyber Law – assignment 2
Using a Microsoft Word document, please define:
1. Constitutions
2. Statutes
3. Case Law
4. Administrative Regulations
5. Stare Decisis
6. Precedent
add one reference at least.
