Operating Security

 An information technology (IT) security policy framework is the foundation of an organization’s information security program. Organizations use these documents to build processes, determine acceptable technologies, and lay the foundation for enforcement. The security policy framework documents and their implementation express management’s view of the importance of information security.

  • Describe the role of a policy framework in an information security program
  • Describe the different types of policies used to document a security program
  • What business factor(s) do YOU think should be considered when building an organizational IT security policy framework?  Explain
  • What is the difference between risk tolerance vs risk appetite? 

InfoTech Import in Strat Plan 3

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies. 

Explain in Detail

Cloud_computing_week_12

 Discussion Topic: Define auditing in regards to auditing cloud services and what internal controls would you implement (provide an example of each control). 

Paper Topic: 

Write a paper on governing the cloud. The following are the items to discuss in the paper:

  • Define corporate governance.
  • Discuss the events that led up to the need for increased corporate governance.
  • Define business strategy. List five possible business strategies.
  • Discuss the purpose of the Capability Maturity Model.

 Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Elliptic Curve Cryptography

 1 page discussion

  • Perform research on Elliptic Curve Cryptography. Define what  Elliptic Curve Cryptography is and identify the associated benefits and  the associated negatives.
  • Would the implementation of Elliptic Curve Cryptography be a good  option for the HU Investment Firm? Fully explain your comments.

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Organization leader and decision making

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

security architecture 8

 

Read the attach paper “A survey of edge computing-based designs for IoT security” and write a comprehensive  summary/review of the paper as follows: 

  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free