Theme
By the due date assigned, post your response of at least 150-200 words to the Discussion Area. By the end of the week, comment on at least two of your classmates' submissions.
IMPORTANT NOTE: Your instructor will assign five short stories for the class to read and discuss this week. Check the Week 4 Announcement for a list of the assigned stories. You must choose one of these stories to earn credit on the assignment.
Prompt:
Select one of the stories assigned by your instructor, and develop a one- or two-paragraph response to the following:
- Identify one of the main themes used in the story. Explain the message the author is conveying by telling the story in this way.
- Provide at least one specific example and at least one quotation from the
Introduction to security protocols that will help reduce the risk of a security incident we are going to study security incidents.Select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism. There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc. As you evaluate the incident you evaluate several components throughout the remainder of the course.
1. select one incident
2. create a 1-page introduction of the security incident
3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted.
4. The submission will go through safe-assign to check for plagiarism
**** Need it by 01/29/2020 7 PM EST****
APA Format NEEDED
In-text Citations
NO PLAGIARISM
SUBJECT:: InfoTech Importance in Strategic Plan
Question1: 400 word essay addressing each point mentioned the question (2 references & Intext citations)
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
Question2: four to six pages in length (1200-1800 words), not including the required cover page and reference page.
This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?
Discussion Length (word count): At least 250 words
Fennelly (2017) stated that entry and exit points should be identified and those vital to the effectiveness of the total system determined. Physical barriers should be checked at the area considered the most sensitive, such as the vault, cell block, tool crib, or shipping department.
For this assignment, you will research and expound on the following questions as they relate to physical security?
- List, explain and cite all levels of physical security (one paragraph on each with different sub-header, citation, and detail explanation on all five levels.
- What is the objective of physical barriers as it relates to this weeks reading assignment?
- What is the value of planning?
- According to your reading material,(PROVIDED BELOW SLIDES) itemize all information a security plan should contain, then explain at least three?
- Requirements
- All questions should have sub-headers<
Assignment 1: Business Continuity Plan Report Due Week 3 and worth 50 points During your first week as a Senior Information Systems Security director, you met with the Chief Information Officer (CIO) and Chief Security Officer (CSO). During the meeting, they revealed their deep concerns with the organizations business continuity plans (BCP). Since you were previously responsible for BCPs for a large enterprise they are requesting that you review the companys BCP staffing plans and training plans. They would like you to provide a report with your findings and recommendations for corrective action. Additionally, include why it is important to include legal representatives on the business continuity planning team and provide an example of laws or regulation the company should include to remain compliant. While there is not a specific page requirement for this assignment, students are required to fully develop ideas an
Now that we have had an introduction to security protocols that will help reduce the risk of a security incident we are going to study security incidents. Each student will select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism. There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc. As you evaluate the incident you evaluate several components throughout the remainder of the course.
1. select our incident
2. create a 1-page introduction of the security incident
3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted.
Whats the Worst That Could Happen?
This is a question you should (and will be) asking yourself as you take on a security officer role. Quite honestly, this statement could become your undoing if you do not think it through or try to avoid answering such a question; however, the extreme voice of doom is not one you will be visiting very often. You should be evaluating the possible circumstances and ask yourself the above question as it pertains to something that could happen, such as a fire or user error.
For this exercise, you should think about a local company (one which you work or have worked) or a fake marketing firm in Kansas City Missouri. Ask yourself this question as you think through what they have and what could be lost. Think of a minimum of 7 threats to this network (one for each of the 7 IT Infrastructure Domains [pg.7]) and describe Whats the Worst That Could Happen? if these