IT Security Audit

Discussion 

  1. What is an IT security audit and why it is important to the organization?
  2. Explain why compliance is important to an organization.
  3. What is expected from an organization to be in compliance with Regulations (i.e. HIPAA, GLBA, SOX, etc)?
  4. Discuss a few key takeaways.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

The use of encryption

 

The use of encryption can have adverse effects on incident response and incident investigations; however, from a security standpoint, encryption is a major component in network confidentiality.  Present your argument for or against an “universal key” which would allow investigators the ability to decrypt data for an investigation.  State your position and back-up your stance with 5 or 6 sentences supporting your stance from information you found in related cases or arguments made in online publications.  Do not plagurize, use your own words when presenting.

For this week, you need to respond to 2 of your peer’s initial responses.  Your replies need to be more than 1 or 2 sentences to obtain credit for posting.  Describe how you agree or disagree with their post.  Add to their post, but do not attack their position.  These are ethical questions with no right or wrong answer.  In total, you need to have more than 3 posts (your initial and 2 replies to receive full credit).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer network

I have the correct answer (model answer ) and I just need to paraphrase, and write the answer without copy and past!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Oracle 12c

Discuss in 500 words or more why Oracle 12c has introducted two new roles – AUDIT_ADMIN and AUDIT_VIEWER. Include a discussion of what database auditing is and what it does.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion -5 Cyber

Describe an instance where a government has taken some action the result of which is influence on commerce. 

need 300-350 words

on time delivery and no plagiarism 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Security Policy – Access Controls, Authorization, and Authentication

 Scenario: Answers the following questions to incorporate into the information needed for the PPT
Access Control & Data Protection:Ben employs a number of part time high school students interested in graphics.As you consider the components of a business continuity/recovery plan, discuss with your team the following:

  • What sort of access controls might be needed in the office?
  • How can data be protected using authentication and authorization?
  • Does this use of temporary employees create situations which makes data vulnerable to social attacks?

Main instructions for the PPTBased on your Week Four Learning Team collaborative discussion, “Access Control & Data Protection,” create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following (Sue the chapter attached as one on the refferences for the PPT):

  • The benefits of implementing access controls for Ben’s office
  • The ways you can use authorization and authentication to protect the company’s data
  • How the use of temporary employees can make data vulnerable to social engineering attacks
  • Methods to mitigate social engineering threats and damage

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Security topic and write a 3-4 page paper on it.

Any  Network Security topic and write a 3-4 page paper on it.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion 510 (9)

 Apply your Knowledge 

This section contains four mini-cases. Each case describes a situation, explains your role, and requires you to apply what you learned in the chapter.  

 1. Rachel’s Day Off Swimwear  

 Rachel’s Day Off Swimwear is a successful chain of high end swimsuit boutiques. In the last six months, the firm added several new lines and opened a dozen new stores. The downside is that the company has outgrown its accounting software. The original accounting system was a package from Peachtree Software, which ran on a stand-alone PC and later on a network. Now, the firm is ready to install a new accounting package that can support current and future operations. You have been asked to implement the new system, which is called Sage 50.  

 Tasks 

1. Who should receive training on the new software, and what topics should the training cover? 

2. Go online and investigate the Sage 50 product to learn whether it can import and upload existing data. 

3. What changeover strategy would you suggest for the new accounting system? Explain your answer. 

4. When should a post-implementation evaluation be conducted? Explain your answer.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SLP 4

 

Module 4 SLP, we return our focus from the specifics of information technologies and the formulation of ideal strategies to the wider world of real corporate behavior. Our emphasis now shifts to the actual implementation of information technologies and the sociotechnical dynamics that implementation not infrequently founders upon. No technical solution—however brilliantly designed or competently backstopped or elegantly integrated with other corporate plans—is any better than its implementation at the lowest levels of the system to which it is addressed. All too frequently, plans and solutions are developed in a vacuum apart from the context within which they are to be deployed and used. It is hard to overestimate the quantity of corporate resources that have been squandered on poor IT implementations over the years—to say that it would exceed the GNP of many third world countries would probably not be an exaggeration. Implementation is by no means an all-or-nothing proposition; even though the full measure of system changes may not be as successful as desired, there can often be positive local results, particularly if the implementation process is oriented toward learning as well as doing, or even more so, doing unto others. The one sure way to implementation failure is to assume that all knowledge resides in IT management—or even in management generally. Success is inevitably based on user involvement in varying degrees, generally more rather than less.

All modules in the course draw on everything that you have learned in the program; however, this module most specifically draws on your courses in computer-human interaction, systems development, and project management as well as on your general introductory courses. Implementation is a drawn-out process requiring effective collaboration among many different kinds of specialists and generalists, extended over time and across space, and requiring explicit attention to both the social and technical systems of the organizational units affected. Above all, implementation must be sensitive to feedback, resilient enough to deal with changing circumstances, personnel, and goals, and focused much more on the users than on the technologists. Effective implementation always embraces the fundamental sociotechnical criterion of “incompletion”—that is, the idea that no change process is ever “finished” as such, but that change is an ever-flowing river in which one set of adjustments is merely the prelude to another set. Sociotechnical life in organizations is a soap opera, not a novel. There is never a “happily ever after,” just an ever-evolving and constantly reconfiguring cast of players and problems. Sometimes things get better; sometimes they get worse—but they will always be different.

Videos of Interest… Something to Think About…

Andrew McAfee discusses an array of revolutionary technologies that are replacing routine jobs with machines that can speak, understand, translate, and hear. McAfee believes that this kind of innovation will lead to creating new jobs that involve more than enhancing creativity. He refers to this cycle of innovation as “The New Machine Age.” Think in terms how technology-driven changes could impact the ERP implementation for Aux Bons Soins’ case study below.

TED Ideas Worth Spreading. (2012, September). Andrew McAfee: Are droids taking our jobs? Retrieved from http://www.ted.com/talks/andrew_mcafee_are_droids_taking_our_jobs.html

For the last assignment, we will be introducing a new case, the real-world story of an ERP implementation for Aux Bons Soins. This case details the rather frustrating experiences that the company encountered in trying to implement an integrated management system after an acquisition and merger, and the range of circumstances that affected the process. Not every implementation is this sticky, but in varying ways most partake of greater or lesser parts of this experience. Please note that there is nothing particularly pathological about the experience described here, despite the frustrations experienced. There are no great villains, but neither are there any great heroes; implementation seldom turns up either. This may seem a rather inconclusive note on which to conclude both this course and your IT management program, but it is how things are. For better or worse, this is what real IT management is all about—the good, the bad, the ugly, and above all the reasonably acceptable. Over the next decades, the profession is likely to evolve far beyond any ways that can be reasonably forecast today; after all, 20 years ago there was not any such thing as the Internet, and today’s information environment was ranked science fiction. You are entering the profession at a most exciting and dynamic time; always remember how much you do not know, but also remember that you do know how to learn.

Please read the following parts of the case:

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Background (A). International Journal of Case Studies in Management. 4(1):March.

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Troubles Ahead (C). International Journal of Case Studies in Management. 4(1):March.

Bernier, C., Roy, V., & Brunelle, E. (2006) An ERP Story: Epilogue (D). International Journal of Case Studies in Management. 4(1):March.

Use information from the course background readings as well as any good quality resource you can find. Please cite all sources and provide a reference list (use APA format) at the end of your paper.

Your answer to the following will be assessed:

  • What were the main causes of the difficulties with the project at Aux Bons Soins?
  • What were the key elements that led to the success of the project at Aux Bons Soins?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Social Media and Privacy Issues

Social networks afford individuals the venue and technology to connect with many “ friends”, both known and unknown. An individual’s activities on social networks can have security implications, especially if they adversely affect the corporate reputations of their employers. This practice is more obvious on professional social network sites that identify the employee’s employer, such as LinkedIn.

Imagine that you are a CIO of a company. As the CIO, the security and privacy of your organization is one of your primary concerns. It is your responsibility to review the risks and vulnerabilities of social media to your company and provide your employees with guidelines on how to interact with social networking sites, such as Twitter and Facebook, when representing your company.

Write a four to five (4-5) page guidelines for accessing Web 2.0 sites that:

  1. Select and describe three (3) social networking sites you are presenting in the context of cloud computing.
  2. Examine the risks and vulnerabilities to your employer associated with the social networking sites that you have selected.
  3. Summarize the mitigating strategies you would recommend to your CEO that affirm the organization’s privacy and security practice among social network sites.
  4. Suggest three (3) ways that your social network policy can protect your employer against:
  5. identity theft
  6. cybercrimes
  7. abusive marketing
  8. Use at least three (3) quality resources in this assignment. At least one (1) must be from a professional journal in the IT field.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now