Categories
IT Management

Overview post your weekly current event discussion here.

Overview Post your weekly current event discussion here. The topic of your posting should be related to information assurance since that is our class title. A Current Event is simply a newsworthy item that helps us to stay current on what is going on in information security today. You can select any reputable source to find your current event. Guidelines & Expectations Please give your analysis of the event and provide a link. Deliverables To receive full credit for this discussion: 1) Submit an original post in the discussion arena below (by Wednesday).

Categories
IT Management

Why must these steps be addressed before the design begins?

Review the video on CA ERwin Data Modeling. How and why would the use of data modeling software improve the development of data models for an organization? Why must these steps be addressed before the design begins? Video link mentioned above: https://www.youtube.com/watch?v=k5RopAn04Hk This is a discussion piece and only needs 1 or 2 paragraphs. it’s already late so the sooner it can be completed the better.

Categories
IT Management

What kind of cryptography is this?

Please see attached document. Deliverables Answer the following for each of the above codes: What does the code say? Please see attached document. What kind of cryptography is this? Describe the basic approach you used to solve the cipher.

Categories
IT Management

Deliverables post your detailed analysis of what you find in the discussion area by wednesday.

Overview The history of the use of cryptography is an interesting and educational area for discussion. Guidelines & Expectations Research a major event in history when cryptography played a role in the success or failure of the event. Provide the details of the event and links to the information. Deliverables Post your detailed analysis of what you find in the discussion area by Wednesday.

Categories
IT Management

Next view the power point presentation “data manipulation with structured query language ppt.”

o prepare for the discussion, read the article “Bridging the Gap: The Difference Between Data Analysis and Data Modeling.” in the Module Resources folder on data manipulation. Next view the Power Point presentation “Data Manipulation with Structured Query Language PPT.” Discuss the challenges of accurate data analysis upon accurate data modeling. Why would you want to use structured query language (SQL) for database design? What would be the benefits of using SQL to create and manipulate the data in the database? What other ways are there to manipulate data in a database besides SQL? In your response, focus on both the technical challenges and on the data and information management challenges associated with data analysis conducted by business analyst. Links from the above paragraph: https://www.bridging-the-gap.com/data-analysis-data-modeling-difference/ powerpoint document mentioned attached

Categories
IT Management

Laws and regulations: explain how laws and regulations influence information security policies and procedures within this company.

PLEASE USE THE ATTACHED MEMO TEMPLATE FOR THE ASSIGNMENT You recently stepped into the role of information security manager at a medium-sized e-commerce company with roughly 500 to 1,000 employees organization-wide. The company has hired a third-party consultant to evaluate its information security posture. The consultant has concluded the evaluation and noted several high security risks. These action items must be addressed to ensure that the company’s information assets are secure. Your task is to provide recommendations to address multiple identified security risks and explain your decisions to your leadership team. Directions Memo Template: To communicate the identified information security risks and your recommendations and explanations, you will generate a memo to your leadership team. Your recommendations do not have to address all information security risks; however, they must address multiple risks. Be mindful that your leadership team is considered a nontechnical audience. You must complete each of the following sections: Introduction: Describe how addressing the evaluated elements of information security will support the company’s business objectives. Laws and Regulations: Explain how laws and regulations influence information security policies and procedures within this company. Technical Controls: Describe the technical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Administrative Controls: Describe the administrative controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Physical Controls: Describe the physical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Business Impact: Explain how your recommendations impact current information security policies and practices within this company. Conclusion: Explain why leadership should act on these control recommendations to improve the company’s information security posture. Your conclusion can also include a brief summary, although it is not required. What to Submit To complete this project, you must submit the following: Memo Template This should be a 2- to 3-page Word document (.docx) with the following sections completed: introduction, laws and regulations, technical controls, administrative controls, physical controls, business impact, and conclusion.

Categories
IT Management

Follow the instructions on the assignment and make the specified changes to the microsoft word document.

Follow the instructions on the assignment and make the specified changes to the Microsoft Word document.

Categories
IT Management

There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities.

There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities. Review at least three of these tools and compare and contrast their features and functions. In your opinion, would you implement any of these scanners? Explain your rationale in choosing this particular tool. Here are a few resources to assist you with this assignment. https://www.comparitech.com/net-admin/free-network-vulnerability-scanners/ https://www.networkworld.com/article/2176429/security-6-free-network-vulnerability-scanners.html https://www.g2.com/categories/vulnerability-scanner

Categories
IT Management

To design a new system to sustain the vision of mhc, you will create a system requirements specification (srs) document.

PLEASE USE SRS TEMPLATE ATTACHED FOR THE ASSIGNMENT. You are employed as a systems engineer at Millennia HealthCenter (MHC), an organization in the healthcare industry that offers patient care in person and online. MHC will be implementing a new software system within the next three years, and you are the systems engineer leading the project. The software system that Millennia HealthCenter currently uses has several problems, as described in the business case document (see Supporting Materials section). MHC’s technical problems are reducing efficiencies, accuracies, and the quality of patient care. The vision and the ultimate goal of MHC is to effectively improve the patient’s health and well-being through innovative approaches in health information technology. The question is: as a systems engineer on this project, how will you design a new system to improve the patient’s experience? To design a new system to sustain the vision of MHC, you will create a system requirements specification (SRS) document. The SRS will determine all aspects of the system that need to be considered prior to the start of the development process, from the perspective of the stakeholders. As you create this document, you will also have to make ethical decisions that consider legal, organizational, and industry considerations. Directions Review all of the details of the software system outlined in the business case. Be sure to read through the entire case. You will refer to its specifics throughout your SRS, and you do not want to miss any important information. Also in the Supporting Materials section: Watch all of the interviews with the stakeholders who will be using the software system once it is implemented. Review the codes of ethics for the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). Review the security guidelines regarding the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulations. Read the Workflow of Existing System and Processes document. Download the System Requirements Specification Template, and develop its content. Fill out the sections in the template that apply to the specific system that is described in the scenario. If you believe that a section does not apply to the system within the scenario, enter “Does not apply.” Provide a brief rationale as to why you believe that the section does not apply. Your system requirements specification must include: An introduction, which may include: System purpose System scope System overview System context System functions User characteristics A description of functional system requirements that clearly explains how the functionality addresses the problem statement within the business case and meets the organizational vision A description of the non-functional requirements, which includes: Usability requirements Performance requirements A description of other requirements, which may include: System interface System operations System modes and states Physical characteristics Environmental conditions As you complete these sections of your SRS, pay particular attention to the interviews with stakeholders referred to in the Supporting Materials section of this document. Since you do not have access to the actual end users and other stakeholders of the system, you may use your judgment in specifying the precise nature of the capabilities that the users will need. If you have questions about system functions, you should research the nature of the user’s work, and you may also want to use your instructor as a resource. As you develop the SRS, you will demonstrate how to make ethical decisions. Your SRS must also include: An explanation of the system security requirements, which includes how the system will need to sustain proper levels of security A section on information management requirements, which determines how the system will need to manage and encrypt information between its databases, interaction with other systems, and interfaces, while considering the ethics of privacy An explanation as to how the system must comply with organizational and federal policies and regulations requirements (e.g., HIPAA compliance) An application of the ethical considerations throughout the SRS by addressing the codes of ethics for ACM and IEEE

Categories
IT Management

Submit the list of questions you want prospective bidders to answer, and be ready to provide an explanation for including each of the questions.

You are a manager for a new company that is about to start selling textbooks to college bookstores via the web. Several firms specialize in software that supports transactions and data collection on the web. Prepare an RFI for an application to support your new company’s effort on the web, including posted catalogs, orders, shipment tracking, payment, and data collection for future marketing. Submit the list of questions you want prospective bidders to answer, and be ready to provide an explanation for including each of the questions. Note: Repeat the question/task. Structure document as APA format, but exclude cover page; label as directed below. Use technical writing elements and formatting. Must have a reference page. Must use a 12-inch font, double-spaced. Include Name, Course Number and section, Title of Homework Assignment, Instructor Name, and Due Date aligned right single-space.