Categories
IT Management

Construct an organizational chart for your organization or another organization

Construct an organizational chart for your organization or another organization of your choice. This chart should reflect key roles required within the IT department that would be involved in any InfoSec programs, projects, or security operational activities. You can use any program that you like.

Categories
IT Management

When planning an InfoSec program, an organization is expected to specify for emp

When planning an InfoSec program, an organization is expected to specify for employees their behavior toward security and the security of the organization. The major stakeholders involved in the planning of InfoSec may differ depending on the type and size of the organization. Assuming you were to develop a new InfoSec program for your organization or one you are familiar with, discuss the major stakeholders that may be involved in this planning and the reasons why these stakeholders should be involved. Determine if these stakeholders would also be involved in IT strategic planning. How would these roles overlap between InfoSec strategic planning and IT strategic planning?

Categories
IT Management

Here are a few Information Security Policies (Educause) (Links to an external si

Here are a few Information Security Policies (Educause) (Links to an external site.) from higher education institutions. Choose two of these policies or other policies of your choice that you may find publicly available. Here are a few security policies from airlines: https://www.china-airlines.com/us/en/terms-and-conditions/information-security https://wwws.airfrance.us/information/legal/edito-psc https://www.singaporeair.com/en_UK/privacy-policy/ After evaluating these two different Information Security Policies, write a 1-2 page paper comparing and contrasting these policies. What are some of the similarities and differences? Would you have any recommendations to add to each of these policies?

Categories
IT Management

Use the following resources, as well as your readings from this module (see atta

Use the following resources, as well as your readings from this module (see attached files), to develop a framework for the foundation of an Information Security Governance Plan. The framework should address all major components of an Information Security Governance Plan, which would include: major stakeholders critical success factors alignment with organizational mission, vision, and objectives, etc. This framework is simply a listing of all major components that will need to be included in a full Information Security Governance Plan. In a second section, explain how you would implement this plan.

Categories
IT Management

Competencies 4020.4.1 : Introduction to Software Engineering The graduate applie

Competencies 4020.4.1 : Introduction to Software Engineering The graduate applies software engineering core principles, the generic process framework, and introductory software engineering concepts to a software project. 4020.4.2 : Software Engineering and Process Models The graduate recommends a software engineering process model for a project. 4020.4.3 : Requirements Engineering The graduate interprets requirements refined through the software engineering process. 4020.4.4 : Software Design Concepts, Including Architecture The graduate designs requirements-based software solutions using software engineering design concepts and patterns. 4020.4.5 : Quality Concepts, Software Quality Assurance, and Software Testing The graduate integrates software quality testing and assurance throughout the software development process. Introduction In this assessment, you will review a requirements document and then propose a software solution. Your submission will showcase what you’ve learned in the course through the creation of a design and test plan, which is a deliverable for the waterfall methodology. Review the scenario, requirements, and rubric below for additional guidance as you complete this assessment. Scenario You are a member of a software development team for a project, which includes business analysts, solution analysts, developers, quality assurance professionals, and a project manager, among other team members. You have been tasked with completing a solution proposal and design and test plan with the help of your team to support the software development process. The American Video Game Company has provided a high-level requirements document to aid you in identifying an appropriate solution. The project is to implement a customer relationship management (CRM) system for the sales force of a medium-sized company. The initial requirements document has been provided for you to use in determining a solution. You may choose to implement a customizable/commercial off-the-shelf (COTS) system, or you may decide to have the system custom built. When making this decision, ensure all requirements are considered and can be implemented if choosing a COTS system. If you decide to build the system, consider the additional resources that will be needed. Review the attached “CRM Requirements” document provided with the assessment to gain an overall understanding of the system the American Video Game Company is looking for. Requirements Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. Review the attached “CRM Requirements” to gain an overall understanding of the system that American Video Game Company is looking for. Then propose a software solution for American Video Game Company by doing the following: A. Introduce your proposed system, including a purpose statement, overview of the problem, goals and objectives for the project and solution, prerequisites, scope, and environment, as outlined in the attached “Design Template.” Note: The Introduction section of this report may be done after the project task is completed. B. Explain how your software solution addresses five distinct requirements from the attached “CRM Requirements.” C. Discuss the waterfall method by doing the following: 1. Compare the advantages and disadvantages of the waterfall method to those of another development method of your choice. 2. Evaluate whether the waterfall method or the development method you chose in C1 is better suited to the solution for American Video Game Company, including specific examples to justify your claims. D. Create two visual representations of your software solution (e.g., storyboard, flowchart, UML diagram, ERD) that illustrate how the system process or workflow aligns with and supports the business process for American Video Game Company. E. Create a test plan with test cases for three different functional aspects of your software solution, including the following: • preconditions for each test case • steps for each test case • expected results for each test case F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. G. Demonstrate professional communication in the content and presentation of your submission. I have attached an example

Categories
IT Management

Your submission must be your original work. No more than a combined total of 30%

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. Review the attached “CRM Requirements” to gain an overall understanding of the system that American Video Game Company is looking for. Then propose a software solution for American Video Game Company by doing the following: A. Introduce your proposed system, including a purpose statement, overview of the problem, goals and objectives for the project and solution, prerequisites, scope, and environment, as outlined in the attached “Design Template.” Note: The Introduction section of this report may be done after the project task is completed. B. Explain how your software solution addresses five distinct requirements from the attached “CRM Requirements.” C. Discuss the waterfall method by doing the following: 1. Compare the advantages and disadvantages of the waterfall method to those of another development method of your choice. 2. Evaluate whether the waterfall method or the development method you chose in C1 is better suited to the solution for American Video Game Company, including specific examples to justify your claims. D. Create two visual representations of your software solution (e.g., storyboard, flowchart, UML diagram, ERD) that illustrate how the system process or workflow aligns with and supports the business process for American Video Game Company. E. Create a test plan with test cases for three different functional aspects of your software solution, including the following: • preconditions for each test case • steps for each test case • expected results for each test case F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. G. Demonstrate professional communication in the content and presentation of your submission. I added examples as attachments

Categories
IT Management

The literature review needs to be succinct and cover the following: – Generic in

The literature review needs to be succinct and cover the following: – Generic introduction on healthcare issues regarding cybersecurity – How do for-profit and nonprofit organizations budget for security and how they address security threats – How do for-profit and nonprofit organizations approach they cybersecurity strategy and prevent and/or mitigate data breaches. Are there any differences between the two? Some things to consider answering: 1. Are for profit organizations having better security than non profit due to better budgets? Similarly, is the security posture of nonprofits weaker? or, 2. Are for-profit organizations focused on maximizing profits in healthcare, thus having worse security than nonprofits?

Categories
IT Management

As organizations increasingly collect massive amounts of customer data, there ar

As organizations increasingly collect massive amounts of customer data, there are several ethical scenarios that have been reported and potential laws that may come into play. Research a recent unethical scenario, such as the crowdturfing campaigns described in the article: https://www.researchgate.net/profile/Wael-Soliman/publication/326893611_Unethical_but_not_illegal_Uncovering_the_persuasive_messages_leveraged_by_providers_of_the_real_online_social_impressions/links/5b6aa55f45851546c9f6bd00/Unethical-but-not-illegal-Uncovering-the-persuasive-messages-leveraged-by-providers-of-the-real-online-social-impressions.pdf?origin=publication_detail Write a 2-3 page analysis of this case study and describe your opinion of the ethical behavior within the case. Would any state security breach notification laws and international privacy laws need to be considered? Describe how key law enforcement agencies dedicated to combating cyber and physical threats could be involved.

Categories
IT Management

Assume you are a first responder to an incident involving a report of suspected

Assume you are a first responder to an incident involving a report of suspected misuse from an internal individual that occurred at your organization. You have been assigned to investigate this report. Using a digital forensics methodology, create a visual workflow diagram that shows what steps you would take in this investigation.

Categories
IT Management

After reviewing the table in Chapter 2 (Key U.S. Laws of Interest to Information

After reviewing the table in Chapter 2 (Key U.S. Laws of Interest to Information Security Professionals), describe one of the Acts and how it impacts Information Security. Provide an example of when this Act was violated and explain the outcome of the case. Be sure to provide any sources you use from this example. See attached file for Chapter 2 table