roles

One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

Part 1

Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

Use the following column headings:

  • Title
  • Role
  • Responsibilities

Use the following row headings:

  • Chief Executive Officer (CEO)
  • Chief Operations Officer (COO)
  • Chief Financial Officer (CFO)
  • Chief Information Officer (CIO)
  • Chief Information Security Officer (CISO)
  • Senior Security Manager
  • Information Security Architect
  • Information Security Engineer
  • Information Security Auditor
  • Information Security Analyst
  • Security Technician/Specialist
Part 2

Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:

  • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
  • Recommend an information security control framework.
  • Logically explain how an information security control framework benefits a business.
  • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.

Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

Format all citations according to APA guidelines.

Submit your assignment.

Mobile Application – discussion

Appcelerator Titanium was released in December 2008, and has been steadily growing in functionality since its release.  Starting with its Titanium Developer product, Appcelerator provides a single-point interface to run applications.  Titanium Studio is a full-featured IDE which provides a single place to handle all steps of the development environment including a debugging solution.   Titanium is not a magic bullet; however, it does include a solid framework for developing a single codebase to deploy to multiple platforms.   In addition, it allows developers to use a language they are more familiar with to create apps in a domain outside of their knowledge.

  • What are some advantages to using Appcelerator Titanium?
  • Though Appcelerator is reasonably priced, why do some mobile app developers feel that the bugs don’t make it worth the effort?.
  • How is Appcelerator different from other mobile application developers?

–  apa 

– 2 pages

– zero plagiarism

Privacy and Computer Crime

 

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 121. HHS and the FTC recently launched an investigation into a major pharmacy chain for its information disposal practices. The regulators claimed that the pharmacy chain failed to protect customers’ sensitive financial and medical information by disposing prescriptions and labeled pill bottles in dumpsters that were accessible by the public. Based on the HIPAA (Health Insurance Portability and Accountability Act of 1996), what consequences should a company face for failing to properly dispose of customer information? For HIPAA act, you may check the website.Chapter 132. Trust is an important part of the continued growth and development of the Internet. This is particularly the case with respect to social networking. Media reports of disturbing stories and case law alike have shown some of the consequences that can arise when individuals create false social networking profiles. In a case in California, and individual established a fake MySpace profile of his former church pastor. On the profile, he posted content that suggested that the pastor used drugs and was homosexual. Can criminal charges be brought against the party that created the fake profile?

3. Read the Family Educational Rights and Privacy Act of 1974 (FERPA) at ED, discuss who has access to your educational record at APUS. Furthermore, what is the roles and responsibilities for APUS instructors and students to comply with FERPA

Discussion: Privileged Accounts

Privileged accounts, such as Administrator or root, have more privileges than an ordinary user account. Anyone with privileged access can perform nearly any action on a system or network. In many environments, privileged accounts and passwords are shared by IT staff.Privileged access management (PAM), also referred to as privileged account management, eliminates password sharing for privileged accounts. Instead, it uses a “privilege safe” with policies. When administrators need elevated privileges, they request them through the privilege safe, which checks the policy and issues a password for a limited period of time if conditions are met.Answer the following question(s):

  1. Other than the risk of a privileged account password falling into the hands of an attacker, what is at least one other drawback to sharing those passwords? Explain your answer.
  2. Do you see any pitfalls to using PAM? Explain your answer.

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Operational Excellence w5

  

1. Information Systems for Business and Beyond Questions:

a. Chapter 9 – study questions 1-10, Exercise 3

b. Chapter 10 – study questions 1-10, Exercise 1

2. Information Technology and Organizational Learning Assignment:

a. Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 

b. Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important?

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates

Advanced operating system 3 assignment questions. Please complete within 3 hours.

 

Question 1.              (10  Marks)

a. How Process migration within a heterogeneous network is usually impossible, given the differences in architectures and operating systems. Describe a method for process migration across different architectures running:

    i. The same operating system

    ii. Different operating systems

b. To build a robust distributed system, you must know what kinds of failures can occur.

  1. List three possible types of failure in a distributed system.
  2. Specify which of the entries in your list also are applicable to a centralized system. 

Question 2.          (10 Marks)

a. Protection in a Distributed system is more difficult, where the users are allowed to do their own I/O, explain your answer with justifications, Why?

b. Why is deadlock detection much more expensive in a distributed environment than in a centralized environment?

Question 3.      (10 Marks)

Explain the following with diagram

  1. How do caches help improve performance? Why do systems not use more or larger caches if they are so useful?
  2. Stateful vs Stateless service
  3. Majority vs Biased Protocol
  4. Hard real time systems vs Soft real time systems
  5. Interrupt Latency vs Dispatch Latency