ethics 2

 Then, write a paper in which you address the following. Use your research to support your ideas.

  • Describe codes of ethical conduct for the information technology field.
  • Explain ethical responsibilities for IT professionals.
  • Describe your personal code of ethics for the IT environment.

Additional Requirements

  • Include a title page and a references page.
  • Include an introductory paragraph and a concluding paragraph.
  • Include a minimum of three research resources.
  • Be sure to follow APA guidelines for style and formatting.
  • Your finished assessment should be approximately 3–5 pages in length, excluding the title page and references page.

Assignment 1 cryptography

  Question: Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at the reasons why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

 –The writing assignment requires a minimum of two written pages to evaluate history.

  -You must use a minimum of three scholarly articles to complete the assignment.

– The assignment must be properly APA formatted with a separate title and reference page. 

 – No Plagiarism 

Case Study help (300+ words)

Read the case study “Communication Failures” starting on page 329-331 and answer the below questions.

Questions

1. How important are communication skills in project management?

2. Was Herb the right person to be assigned as the project manager?

3. There were communications issues with Alice, Bob, Betty, and Frank. For each communication issue, where was the breakdown in communications: decoding, feedback, and so on?

Book pages 329,330,331 screen shots attached here.

Book Author: Harold R. Kerzner

Book Title:  Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th Edition, ISBN:  9781118022276

Opposing Shadow IT 2.0

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.
    1000 words 

Enterprise Risk Management – Research paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Physical Security: Door and Window Lock Assessment

 Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.