Discuss in 500 words or more the relationship between NIST and FISMA.

Discuss in 500 words or more the relationship between NIST and FISMA.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Note:-

Please use my prompts as a starting point for your discussion posts.  What I am looking for is for each student to find something different to say not to recycle the same pablum. This is a graduate program so simply writing definitions is not what we are after. Use your higher order cognitive skills (analysis, synthesis, evaluation, etc).  A solution is to find something that happened at work to explore and write about (You could, for example, explore the ransomware attack that happened at one student’s office. His solution was to encrypt the data but is that really a protection against that sort of attack? And, how did they get hacked, anyway? I wanted to know as soon as I read it ).  You could also find something at work that you want to know more about and explore that. Or, maybe, something specific in your reading or in the news attracts your eye. For example, the Russian hacking of election systems or the Chinese hack of the US navy. Lately, I’ve been intrigued by stories of people hacking the hackers. Find something that makes you want to do the research and writing.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT

 1 …… Cybersecurity governance requires a set of actions that are necessarily different from managing a company or resource. What is IT governance and why is it important to an organization? 

2……  When the Advocate Health System, located in Downers Grove, IL, failed to fully comply with the HIPAA framework, what was the result? Was the result appropriate with the data breaches involved? Is health and human services a “push over” agency? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Essay 7

 

Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be 2-3 pages.

 

1.  Using argument components discussed in Chapter 3, assess arguments for and against the use of biometric technologies for security, especially in airports and large stadiums. (a) Should biometric technologies such as face-recognition programs and iris scanners be used in public places to catch criminals? Since 9/11 there is much more support for these technologies than there was when biometrics were used at Super Bowl XXXV in January 2001. (b) Granted that such technologies can help the government to catch criminals and suspected terrorists, what kinds of issues do they raise from a civil liberties perspective? (c) Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5. (d) Do you support the use of biometrics in large, public gathering places in the United States? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

2.  In looking at the case of Internet entrapment involving a pedophile that was discussed in this chapter (a) which arguments can be made in favor of entrapment or “sting operations” on the internet? (b) From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences, but can it be defended on constitutional grounds in the United States? (c) Justify your position by appealing to one or more of the ethical theories described back in Chapter 2. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

 3.  (a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction? (c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes? (d) Why would cyberstalking be categorized as a “cyberexacerbated” rather than a cyberassisted crime? (e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime? (f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case study RR2 and RR3

  

· Case Study A- RR2- Read and Respond:
 

Chapter 4 from course textbook. Answer Question #4 p.137

     

4 What advice would you give Monica? 

Chapter 6 from course textbook. Answer Question #3 p.213

     

3 How could the ARAPU process be improved? 

  

· Case Study A- RR3- Read and Respond:
 

Chapter 7 from course textbook. Answer Question #1 p.243

    

1 What should an ideal design of an event centre be able to do? 

Chapter 8 from course textbook. Answer Question #1 p.274

     

1.How do the two alternative process technologies (Chemling and AFU) differ in terms of their scale and automation? What are the implications of this for Rochem? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CMGT 556 Wk 6 DQ 2

Review scenario “5. What Happens on YouTube Stays on YouTube FOREVER!” under “Making Business Decisions” at the end of Ch. 5 of Business Driven Technology.

5. What Happens on YouTube Stays on YouTube FOREVER!

Are you looking for great career advice? Here it is: Never post anything on publicly accessible websites that you would not feel comfortable showing a recruiter or hiring manager. This includes inappropriate photos; negative comments about jobs, professors, or people; and binge drinking at a holiday party. Future employers will Google you!

The bad news: You have to continue to keep your cyber profile squeaky clean for the rest of your life. Companies can and will fire you for inappropriate online postings. One interesting story occurred when two employees created a private, password-protected group on Facebook where they would complain about their jobs, post derogatory comments about their managers, and highlight new top-secret product information. The managers, being computer savvy, obtained the password and immediately fired the two individuals after reviewing the site. Now one of the individuals is suing the former managers for invasion of privacy.

Do you agree that if you post something online it is open for the world to see? What do you consider is inappropriate material that you should never post to the web? What can you do to remove inappropriate material posted to the web by a friend that identifies you? How do efficiency and effectiveness enter into this scenario? Was social media the most efficient and effective way for the two employees to communicate? What is the potential argument each of these sides might use in order to win the lawsuit?”

Do you agree that if you post something online it is open for the world to see? Should employers be able to decide who to hire or fire based on social media posts? Select a position and justify your response.

Respond to at least three of your peers. In your response, address any thoughts you have on the influence the internet has on businesses and how SCM, CRM and ERP can help organizations.

Students need to contribute three substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

PEER 1

Yes, I agree that whatever is posted to the internet is open for everyone to see, however, I do not necessarily agree everyone has a right to see everything that is posted to the internet. I feel that things that are password protected or restricted to just those users should be only meant to be between those users. However, system can get hacked, which means that a user should post to the internet with the assumption that the information can be seen.

I think that that manager that hacked the facebook account of the employees overstepped their authority and that the manager should be reprimanded. However, the employees were also in the wrong for posting proprietary information on an unsecured system.

As for employers looking up information on the internet to help decide on whether to hire or fire someone, I do agree they should be able to. I feel this is no different than employees running background checks or police reports on potential employees.  

PEER 2

Good Evening everyone!

Do you agree that if you post something online it is open for the world to see?

Yes it is You can just type the person’s name and you can see all there post they are publicly

Should employers be able to decide who to hire or fire based on social media posts?

no because people act different outside of the work. Example my Facebook is my family, friends and co workers. A post does not mean it is you. A person can just like the post or think it is funny and post it. People should be able to be themselves after work hours. It is over analyzed at times and can very easily be misinterpreted. A company has not business really looking at your post they using social media as an excuse not to hire someone it maybe also considered discrimination because they are discriminating you based on a post not to hire someone.

PEER 3

This has been a popular subject, especially in the recent years. I do agree that it can be a problem if an employee does something especially if they are doing something that can make the company or its employees look bad. Before we had to behave ourselves and not allow our companies to see us if we were doing something bad when we weren’t at work. Now these behaviors can be seen on the Internet. I have seen multiple stories where employees lost their jobs because of social media. I do everything that I can do to not look bad on social media, and I barely even look at you tube. I know that there are even employers that will look into the possible recruits before they are hired, to see if they are worthy to work at that company.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Event Process Chain Diagram

 EPC is an abbreviation for Event-driven Process Chain, and is a flowchart based diagram that can be used for resource planning and identifying possible improvements of a business process. Businesses use event-driven process chain diagrams to lay out business process workflows, originally in conjunction with SAP R/3 modeling, but is now more widely used by many companies for modeling, analyzing, and redesigning business processes. 

>INSTRUCTIONS In this assignment you will use Signavio, (see the Activity in week 3 for creating a Signavio account) to prepare an EPC diagram for the Case Study below. Make sure to identify the organizational units and actors relevant to the case study and indicate on the EPC diagram the actor that is responsible for each task in the process.

>YOUR DOCUMENT should be a WORD or PDF document containing a copy of the EPC diagram you constructed in Signavio. The EPC must only be ‘one page wide’, but it may span several consecutive pages. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Executive Program Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Topics to be discussed:

1. Deception

2. Separation

3. Diversity

4. Commonality

5. Depth

6. Discretion

7. Collection

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 3 Assignment: The Effect of Scalability on Virtualization

 

Virtualization may be the solution for some organizations. For this assignment, do some research to determine the effect of scalability on virtualizations solutions. Consider both horizontal and vertical scaling. Is scalability important to consider when determining virtualization needs? Why or why not.

Write a 2-3 page paper (not including cover page and references) about the importance of scalability to an organization when they are developing a virtualization solution.

Your paper must use proper APA formatting and must contain citations and references to all materials you access to help you with this paper.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Big data database

Write a 2 page Word document describing Big Data, its definition, context, characteristics, and relevance. You may use anything on this page including Wikipedia but you must have at least one other Web reference

-You can take reference from here, 

https://en.wikipedia.org/wiki/Big_data

– Please make sure to put references as work cited page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PhD TIM-Evaluate the Global Cybersecurity Position for a Significant Organization

 

Choose an organization that has exposure to international influences and budgets exceeding $100 million. This organization should have a presence on the web so that your academic readers can understand the industry and the organization.

For the selected organization, analyze the cybersecurity risks faced from abroad, detailing processes used to establish the risk, enable threats, and identify how there might be harmful to some parties. In addition, outline how the organization can reduce these risks, detailing people, products, or processes that could help with risk reduction. Furthermore, provide a rough estimate of the total resources needed and their potential cost. Finally, explain how you might acquire access to the resources to execute your proposed cyber defenses.

References: Support your assignment with no fewer than 8 scholarly sources published within the last five years, and source them from the NCU Library. You may add additional quality sources from the NCU Library or the Internet.

Length: 6 to 8 pages

Your assignment should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect graduate-level writing and APA standards.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now