Computer Science
Cybersecurity Planning
Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on the personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company. Project Plan You are asked to create two separate policies on the use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable). 1. Overview 2. Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies, and Processes 7. Definitions and Terms Some useful links and resources for your research: https://resources.workable.com/email-usage-policy-template https://www.sans.org/security-resources/policies/general/pdf/email-policy https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gre https://www.techrepublic.com/article/download-our-wireless-policy-template/
Business Intellegence
Discussion (need 250 words and atleast 1 APA formatted citations/references):Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.Assignment (each question atleast 4 sentences and minimum 2 APA formatted citation/references):1. Explain why it is useful to describe group work in terms of the time/place framework.2. Describe the kinds of support that groupware can provide to decision makers.3. Explain why most groupware is deployed today over the Web.4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.5. Compare Simons four-phase decision-making model to the steps in using GDSS.
Security Plan
2 Part Assignment Assignment Content The information security strategic plan and security policies are strongly interrelated within an organizations information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization. Part 1 Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this weeks Learning Team assignment. Part 2 Review the control families described in this weeks reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations. Review the controls from this weeks reading, CIS Controls V7.1. Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families. Cite all sources using APA guidelines. Submit your assignment. For more information on Security Plan read this: https://en.wikipedia.org/w/index.php?search=Security+Plan&title=Special%3ASearch&go=Go&ns0=1
Network Model
This assignment will be submitted to Turnitin®. Instructions Pick any Network you may find in your home, work, or on the internet as an example for your case study. Prepare a presentation and paper report around 10 pages that shows: Introduction that includes background and history Network model presentation What types of standard protocols and technologies have been used Provide an example for 3 different protocols that are applied in different 3 network layers Show your work citations No grade if No presentation. For more information on Network Model read this: https://en.wikipedia.org/wiki/Network_model
PCI Compliance
Assignment Content Your father has a private retail pharmacy in a small rural town. He accepts credit cards and holds customer information on a small database server. He wants to know if he should be concerned about PCI compliance, as well as HIPAA, and has asked you for a summary so he can decide if he wants to hire an outside consultant to help him comply with government regulations. Write a 3- to 4-page summary in Microsoft® Word of the important aspect of PCI and HIPAA regulations to help him make his decision. In your summary: Accurately describe what PCI is and why it is important to a small business. Explain why a small business needs to comply with PCI. Provide at least two reasons. Outline the ramifications of noncompliance to a small business. Provide two examples. Concisely describe who is covered under HIPAA. List the information protected under HIPAA. List the administrative requirements under HIPAA. Cite all sources using APA guidelines. Submit your assignment. For more information on PCI Compliance read this: https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Software Product Liability
Write a 4-5 page paper (deliverable length does not include the title and reference pages) Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process control systems, and consumer products? What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality? What are the four most common types of software product liability claims? For more information on Software Product Liability read this: https://en.wikipedia.org/w/index.php?search=Software+Product+Liability&title=Special%3ASearch&go=Go&ns0=1
Data Stewardship
The purpose of this assignment is to develop data stewardship standards for clinical and public health entities. Data is essential to progress when it comes to health care information technology and HMIS. The collecting, interpreting, and modeling of data allow information technology specialists, health care administrators, and clinical practitioners to provide the highest quality patient diagnoses, treatment, and care. But the data are only effective when users have appropriate access and understand how to read the data, and when the integrity of the data is sound. Read the scenario “Aligning Clinical and Public Health Data Standards Through Partnership With the Public Health Data Standards Consortium,” located before Chapter 10 in the textbook. Using the information provided in conjunction with your own research, create a plan to enforce data stewardship standards across the clinical and public health sectors as a result of this AHIMA/PHDSC merger. In a 1,000-1,250-word plan, elaborate on the following points: Overarching goal for the alignment of both clinical and public data standards. Differences between clinical and public health data use and how this partnership will minimize those disparities. Similarities between clinical and public health data use and how this partnership will capitalize on those parallels. Your proposal for new data stewardship standards and guidelines. Action plan: What will be the first steps in standardizing these data stewardship guidelines and how do you plan to go about managing this process? How do you intend to ensure and maintain consistency in data stewardship standards across the clinical and public health sectors? Who will have access to what data? How will data be collected and stored? How will confidentiality be maintained throughout this process? How will this collaboration affect patients, health care practitioners, and both public and private health care organizations? How will this partnership strengthen the infrastructure of health information systems and technology? You are required to use at least two scholarly references in addition to your textbook for this assignment. Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. For more information on Data Stewardship read this: https://en.wikipedia.org/wiki/Data_steward
Cloud
Why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph. For more information on Cloud read this: https://en.wikipedia.org/wiki/Cloud_computing
Selective Repeat Protocol
Consider a source S and a destination D using the Selective Repeat Protocol (SRP) with a window size of N=4N=4. Each packet is 10001000 bits. The delays are as follows: Each packet transmitted by S has a transmission time of 10 ms10ms. The end-to-end delay from the time that S starts transmitting a packet until D completely receives that packet is 100 ms100ms. Each ack transmitted by D has a transmission time of 1 ms1ms. The end-to-end delay from the time that D starts transmitting an ack until S completely receives that ack is 100 ms100ms. The timeout value is 300 ms300ms. Here is what happens to each packet: Packet #0 is received by D, and the corresponding ACK is received by S. The first transmission of packet #1 is dropped by a router in between S and D. The second transmission of packet #1 is received by D, and the corresponding ACK is received by S. The first transmission of packet #2 is dropped by a router in between S and D. The second transmission of packet #2 is received by D, and the corresponding ACK is received by S. Packet #3 is received by D, and the corresponding ACK is received by S. Packet #4 is received by D, and the corresponding ACK is received by S. Packet #5 is received by D, and the corresponding ACK is received by S. (a) At time t = 150 mst=150ms, what is S’s window? (b) At what time does the retransmission of packet #1 start? (c) At what time does the application layer at D receive packet #2? (d) What is the throughput during the time from t = 0 mst=0ms until t = 500 mst=500ms? Write your answers for parts (a)-(d) (as well as any diagram or equations use to obtain your answers) on paper, and upload the image here: For more information on Selective Repeat Protocol read this: https://en.wikipedia.org/wiki/Selective_Repeat_ARQ
Global Cybersecurity
Choose an organization that has exposure to international influences and budgets exceeding $100 million. This organization should have a presence on the web so that your academic readers can understand the industry and the organization. For the selected organization, analyze the cybersecurity risks faced from abroad, detailing processes used to establish the risk, enable threats, and identify how there might be harmful to some parties. In addition, outline how the organization can reduce these risks, detailing people, products, or processes that could help with risk reduction. Furthermore, provide a rough estimate of the total resources needed and their potential cost. Finally, explain how you might acquire access to the resources to execute your proposed cyber defenses. References: Support your assignment with no fewer than 8 scholarly sources published within the last five years. Length: 6 to 8 pages Required readings: Banks, W. C. (2017). Cyber espionage and electronic surveillance: Beyond the media coverage. Emory Law Journal, 66(3), 513-525 Choi, C.Q. (2017). Unhackable quantum networks take to space [News]. IEEE Spectrum, 54(8), 12-13 Emery, A. C. (2017). Zero-day responsibility: The benefits of a safe harbor for cybersecurity research. Jurimetrics: The Journal of Law, Science… Kaiser, R. (2015). The birth of cyberwar. Political Geography, 46, 11-20 Kovács, L. (2018a). Cybersecurity policy and strategy in the European Union and NATO. Revista Academiei Fortelor Terestre, 23(1), 16-24 For more information on Global Cybersecurity read this: https://en.wikipedia.org/wiki/Cybersecurity_standards
Use Promo Code: FIRST15