RESPONSE DUE 5/26

GIVE YOUR OPINION ON THE POST BELOW, ALSO ASK THREE QUESTIONS PRETAINING TO THE POST.

 

As the cloud has become the norm for many businesses and users at this point, I selected Software-as-a-Service (SaaS). SaaS is the concept of enabling users with the ability to connect and use cloud resources over the internet (Chkadmin, 2022). The most recent example that applies to many of us here at Strayer University would be Microsoft 365. Specifically, we can log in to Strayer University and utilize many of the Microsoft applications or “software” provided through this cloud service. This is a perfect example of SaaS and poses many benefits but offers many challenges as well.

One of the main issues with the SaaS option of Microsoft 365 is that the user’s credentials are the target. If a user’s credentials are compromised, malicious actors are provided direct access to not only the user’s data but also the data within the organization that the user’s a member of. This exposes potentially sensitive data and places other assets and users at risk.

Within my organization, we have additional security configurations in place for this specific reason. One example is multifactor authentication through something you have and something you know. Along with two-person authentication, when I enable or request access to certain information, another user with the same permission or more must authenticate my request. Through this configuration, justifications are required for auditing purposes as well to harden resources and limit unauthorized access.

References:

Chkadmin. (2022). Top 3 office 365 security concerns. Retrieved from https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-office-365-security/top-3-office-365-security-concerns/

Portfolio Project

 You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.  

Requirements:

The paper should include at a minimum of the following sections:

  1. Title page
  2. Executive Summary (Abstract)
  3. Body
    1. Introduction (including industry discussion – 1-2 pages)
    2. Annotated Bibliography (2-3 pages)
    3. Literature review (2-3 pages)
    4. Program and technology recommendations, including:
      1. Metrics
      2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
      3. Regulatory, security, and privacy compliance expectations for your company
      4. Email and social media strategy
      5. Cloud Computing strategy
  4. Conclusion
  5. References

CYBERLAWS & ETHICAL HACKING

Determine whether a network scenario is fully secure.
Requirements:

Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.

Answer the following question(s):

  1. 1. If your network has both a firewall and an IDS deployed, would you consider it to be fully secure? Why or why not?

Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.

Problem 12- Legal

Question I – The year is 2012 and the light bulb has not yet been invented.  Thomas Edison and Nikola Tesla are in a bitter feud to see who can bring electricity to the masses first.  In this alternative history, it is indisputable that Tesla invented the lightbulb first.  However, Edison filed his lightbulb patent prior to Tesla.  According to the law in 2012, who holds the patent to the lightbulb?

Question II – In May of 2013, Jesse plans to open a law office named “Peace Law” and uses the peace symbol as part of the logo for the business.  That same month Jesse registers the trademark with the Patent and Trademark Office.  Jesse opens the law office for practice in July 2015.  Assuming no one contested registration of the trademark within 5 years, is the trademark valid?

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Editio

Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0 | Access Chapter 1

  Project Description:

In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters.

     

Open   the Customers form in Form view. Use Search to locate the record for Baker Auto   Supply. Modify   the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form.

 

Open the Products form in Form   view. Add a new product (Access will automatically add the Product ID): Coffee-Arabica   Premium. The   Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the   Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form.

 

Open the Products report and   check that the report contains the new product P0026, Coffee-Arabica Premium.   View the layout of the report in Print Preview and then change the page   layout to Landscape. Save the report and close Print Preview.

 

Open the Customers table. Sort   the table by Customer Name in ascending order. Save the changes and close the   table.

 

Open the Revenue Stats query and   sort the City field in ascending order. Apply Filter by Selection so that   only stats for the last name Pellum   display. Save and close the filtered query.

 

Open the Products table. Use   Filter by Form to create a filter that will identify all premium brands in   the Brand field that were introduced after 2017. Apply the filter and preview the filtered table.   Close the table and save the changes.

 

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Dark Web

Need below questions in a word document in APA format with no less than 500 words along with 2 references & citations

  1. In your own words, describe the Dark Web.
  2. What type of content is generally found on the Darknet?
  3. What kind of information can be found using the hidden wiki?

Case Study 6.1

A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed.