Categories
Cyber Security

Learning Goal: I’m working on a cyber security discussion question and need supp

Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.
This week, you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing attacks (including “spear phishing” and “whaling”) that could allow hackers to steal login credentials and other information. One of the outcomes of this meeting will be recommendations for improvements and/or changes to the company’s guidance to employees, managers, and executives regarding use of laptops, cell phones, and other mobile devices to access company email and databases while traveling.
Resort Operations is involved in this meeting since the majority of employees who travel on company business work for RO. The head of RO, R. Rose Padgett, has asked you to review the Read Ahead package (see below) and then prepare a position paper for her use during this meeting. Since she, like other executives, is very busy, she has asked you to limit this paper to no more than 2 pages and 5 key points. She has also asked that you list and cite the resources used so that she can have a senior staffer can fact check your work. (APA format citations are preferred.)
Note: a “position” paper is used by staff to inform an executive and assist in preparations for meetings with other executives. The position paper should be written in the third person and usually has three parts:
(a) statement of the issue(s) — clear and concise
(b) the position to be taken on the issues (intentions, beliefs, attitudes)
(c) recommendations which restate key points and provide suggested resolutions or actions.
Read Ahead Package
The read ahead package for this meeting includes the following resources:
1. https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While-Traveling-Tip-Sheet-122019-508.pdf
2. https://resources.infosecinstitute.com/30-cybersecurity-tips-for-travelers/#gref
3. https://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/
4. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-charging-station-could-hack-your-phone.html

Categories
Cyber Security

Learning Goal: I’m working on a cyber security discussion question and need supp

Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.
Among other things, the Chief of Staff’s organization is responsible for organizing meetings and providing support to the various internal governance boards and executive committees that comprise the internal governance infrastructure. Last week, you had a brief introduction to the work of one of these boards — the IT Governance board — when you helped the Chief Financial Officer and CFO staff put together a briefing to inform the board’s members about a technology problem.
The work of the company’s governance boards and committees is extremely important since these groups plan, design, negotiate, implement and provide oversight for the processes, policies, procedures, and other mechanisms used to guide, monitor, control, and assess the operations of the company. Each board is comprised of executives who each represent their functional areas or a group of internal stakeholders. Usually, there is a chair position that rotates among the members. If you would like to learn more about corporate governance in general, Deloitte’s report Developing an effective governance operating model: A guide for financial services boards and management teams provides a brief but comprehensive overview (see https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/dttl-fsi-US-FSI-Developinganeffectivegovernance-031913.pdf). You may also find this article What is a management system?, from the International Standards Organization, helpful as it explains what a management system is and why standards are needed to define repeatable steps that organizations can use to ensure the effectiveness and efficiency of their management activities.
The IT Governance board operates under authority delegated by the corporate governance board. This board’s charter gives it responsibility for governance, risk management, and compliance management (GRC) for corporate IT processes, policies, and technologies. Members of the board each serve for a three year term. Of the 24 members, 8 have just begun their terms.
The IT Governance board focuses upon ensuring that the company achieves maximum value for each dollar spent on information technology capabilities. The board’s members must exercise due diligence to ensure that the company complies with laws and regulations that apply to the use of Information Technology (including privacy and security requirements). The board is also charged with ensuring that the company complies with voluntary standards such as PCI-DSS since these have an impact on the company’s business operations (non compliance could result in the company not being permitted to receive payments via credit cards).
The next meeting of the IT Governance board will include a set of orientation briefings for the new members. Your assignment, as a support staffer, is to help prepare for this orientation meeting by developing a short (5-minute) briefing on one of the following IT management / IT security management frameworks, standards, and models.
COBIT
ITIL
ISO 27001 (ISMS Program Management)
NIST Cybersecurity Framework
NIST Security and Privacy Controls (NIST SP 800-53)
NIST Risk Management Framework (NIST SP 800-37)
See the weekly readings for information about your selected topic. Then, find additional sources on your own. (Each of these standards and frameworks is discussed in freely available materials on the Internet or in articles available through the university’s only library. There is no reason for you to pay for copies of any materials for this assignment.)
After you have researched your chosen framework, standard, or model, develop a written script for your briefing which you will deliver verbatim (as written). You should also prepare a one page handout for the board members to follow as you present your speech.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security discussion question and need supp

Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.
You have been asked to publish a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests’ concerns extend beyond privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.
In order to write an effective notification letter, it is first necessary to understand the legal requirements for such a letter. This Data Security Breach Notice Letter guidance document from Hutnik, Kelley Drye & Warren LLP provides guidance for companies facing the need to write notification letters. Second, you should consider the technical and people perspectives which guide the incident specific content required for such a letter.
From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit). The impact of this type of attack is a loss of confidentiality.
From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.
Managers need to address this problem from all three perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy. For both audiences, the conversation needs to take place in a manner that will not expose the company to avoidable legal difficulties.
Next, we must consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.
Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs. As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response — less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.
To learn more about emotional intelligence, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.
Finally, read one or more of these articles about cyber attacks that can affect hotel operations and create fear and concern among guests and employees.
1. Hackers use ransomware to target hotel guests’ door locks
2. Is Hotel Wifi Safe? No, and here’s why
3. 20 hotels suffer hack costing tens of thousands their credit card information
Using what you’ve learned about data security AND emotional intelligence, publish a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company’s hotel properties. Your publish letter will also be used to train employees in how they can and should respond to guest concerns.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security question and need an explanation

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
In January of 2019, the U.S. Senate introduced S.189 – Social Media Privacy Protection and Consumer Rights Act of 2019. This bill requires online platform operators to inform a user, prior to a user creating an account or otherwise using the platform, that the user’s personal data produced during online behavior will be collected and used by the operator and third parties. The operator must provide a user the option to specify privacy preferences, and an operator may deny certain services or complete access to a user if the user’s privacy elections create inoperability in the platform.
Answer all the following questions:
Describe privacy issues that affect users of the WWW. Are privacy violations the same as data breaches?
Discuss your opinion of S.189. Did it pass? Is it needed? Will it work? Is it too late?
Describe how individuals can take responsibility to protect their privacy while using online services and accounts.
2–3 pages
Coversheet
List of References Page.
Proofread – Edit for spelling, grammar, punctuation, etc.
Use only course text, professional journal articles, or other reputable resources.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security writing question and need an expl

Learning Goal: I’m working on a cyber security writing question and need an explanation and answer to help me learn.
I want you to solve this assignment as soon as possible, with correct grammar and make it well presented

Categories
Cyber Security

Learning Goal: I’m working on a cyber security question and need guidance to hel

Learning Goal: I’m working on a cyber security question and need guidance to help me learn.
Assignment Deliverables
Considering the initial lecture topics and seminar activities, conduct research on the fundamentals of
cybersecurity for business, to inform your creation of a multimedia training artefact. It is your choice to identify
relevant cybersecurity happenings (as you think useful) and then prepare a multimedia cybersecurity
information awareness training artefact.
Your choice of multimedia training artefacts is as follows:
A narrated PowerPoint Presentation Slide Show;
A web-based interactive training game;
A multimedia mashup website or blog;
A cartoon animation;
A video presentation.
You are free to develop the multimedia training artefact of your choice and all cyber information training
artefacts are to present cybersecurity awareness messages relating to small business and their staff
cybersecurity behaviours within the business.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security discussion question and need supp

Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.
The Chief of Staff will be hosting a working lunch this week for your group of interns. In addition to the usual introductions and “getting to know you” discussions, you’ve been advised that there will be a discussion of the following article.

Seasonal Employee Security Risks: Present Danger, Proactive Defense


Each intern has been asked to write and bring a discussion paper containing their written responses to the following questions:
1. Do you agree or disagree with the author’s assertions regarding seasonal employees and cybersecurity risks in the work place? Why?
2. What steps can (should) managers take to reduce security risks associated with hiring seasonal or temporary employees? (Consider whether or not the Secure Computer User training course would be appropriate for these employees.)
3. How can managers show leadership in the area of cybersecurity defenses and best practices?
As you write your response, remember to provide examples from the article and other readings for this week. Explain why you agree or disagree and provide examples, if appropriate. Your examples should be relevant to the hospitality industry and hotel operations. Consider the ways in which these types of companies are likely to use seasonal employees and the types of digital assets / information to which these temporary employees may have access.
Include information from the Week 1 readings to support your responses / arguments. Remember to cite your sources using a consistent and professional style (APA recommended but not required).
Post your discussion paper as a response to this thread. After you have posted your response, read and critique at least 2 of the discussion papers written by your peers in this class. The goal of your critiques should be to help your peers improve their analyses of the issues and the quality of their papers. You could suggest a different perspective or help your peer to write a more effective argument to support his or her position on the issues. Grammar or writing mechanics comments are not necessary — your instructor will address those.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security project and need support to help

Learning Goal: I’m working on a cyber security project and need support to help me learn.
Students will apply the learnings from the class participation through a project and present their findings to the class at the end of the course. Students will choose one topic from the three announced in the first week and will apply all the principles learned in the classes as well as supplement it with individual research. The student will submit the paper in the thirteenth week. There will be discussions on the projects in the class regularly during the 12 sessions to share the progress and findings. After the submission of the papers, students will present their research and conclusions to the class during the 14th and 15th weeks. The output of the project consists of:
1. A paper which must contain at least the following elements:
Executive summary
Problem statement
Key requirements to address the problem
Key research findings
Solution options/conclusion/recommendations
List of references
Supporting material in Appendices
An outline should be submitted by _________ Sunday
2, A presentation is based on the paper that:
Consists of 5 slides
Presents a convincing summary of findings
Conveys key points to the audience
Is succinct and to the point
The students are expected to read all the papers and provide written feedback to the author.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security question and need guidance to hel

Learning Goal: I’m working on a cyber security question and need guidance to help me learn.
INSTRUCTIONS
Read, study and analyze chapters 1 and 7 of the book Interaction Design: Beyond Human-Computer Interaction.
She then evaluates the following case and designs a web interface with the requested features.
Background:
XYZ Company offers technology consulting. Its star service: advice on the configuration of iPhone and Android phones. They have another service: it is advice on the purchase of a new telephone according to the needs of the client. The service is currently oriented towards the customer market between 18 and 40 years old and has the following characteristics:
The service is currently carried out by telephone by dialing 1-800-ADVISOR.
When the customer dials the number, a voice answering machine is activated and follows the programmed script.
Technician: Dial 1
Sales: Dial 2
If the Sales option is checked, it communicates directly with a sales representative.
If the Technician option is checked, another list is offered:
For Android: Dial 1
For iPhone: Dial 2
Regardless of the platform of the chosen phone, the following list is offered:
To install software: Dial 1
To configure the operating system: Dial 2
Choosing option 1 or 2 establishes communication with the technical representative.
Request:
Due to the fact that calls from older adults have increased in recent quarters and these, in turn, have not been attended as they should be, the sales manager has modified the existing market segment to serve people over 40 years of age. However, the phone box is very limited for your needs.
The manager needs you to design a web interface with the following features:
That is friendly and provokes in the client the feeling that his doubts are addressed and resolved.
That it contains a correct access to the information of the services offered by the company XYZ (include menu on the page).
It must include aspects of assisted interaction, such as agents, representatives of online services and explain step by step what the process would be like.
You must apply a minimum of five (5) elements of a GUI, as learned in task 2.1.
Make rough sketches (drawings) of what the web page(s) (interface) would look like.
Important: You will need more than 2 sketches to show the different interfaces.

Categories
Cyber Security

Learning Goal: I’m working on a cyber security writing question and need an expl

Learning Goal: I’m working on a cyber security writing question and need an explanation and answer to help me learn.
Using a critical thinking perspective (generally: positive, negative, and opinion) write a five paragraph summary in your own words on why we should care about trafficking of persons.