Review the information in the text on cloud computing. Search for and review one major cloud computing vendor (Amazon, Microsoft Azure, VMware, IBM Cloud, Adobe, etc.). Briefly summarize (don’t copy and paste from the web site) its strengths and weaknesses.

Report Issue

 

Subject: Information Governance! – ITS-833

Week Chapters: Attaching Textbook Below Please Fallow That

Chapter 14 – Information Governance for Mobile Devices

Chapter 15 – Information Governance for Cloud Computing

Discussion: 1

Word Count Min: 300

Page: 276

(1) Review the specifications for the smart phone you use most frequently. What brand and model is it?

(2) Briefly summarize (don’t copy and paste from the phone’s vendor site) the data protection features it provides.

(3) Using the IG guidelines specified on p.276 in the text as background, provide a brief argument either for or against the data security for this device.

(4) In your opinion, based on IG guidelines, what data security improvements can be made?

Be original, creative, and constructive. Cite and reference as appropriate.

(this week’s discussions are more weighted than previous ones. Be sure to answer the question completely.)

Reference: 2 min

Discussion: 2

Word Count Min: 300

Chapetr: 15 Information Governance for Cloud Computing

(1) Review the information in the text on cloud computing. Search for and review one major cloud computing vendor (Amazon, Microsoft Azure, VMware, IBM Cloud, Adobe, etc.). Briefly summarize (don’t copy and paste from the web site) its strengths and weaknesses.

(2) Based on the IG principles outlined in Chapter 15 of the text, provide an argument targeted toward a middle-management business user on the pros and cons of using this vendor to fulfill a business need. Be specific in your response.

Be original, creative, and constructive. Cite and reference as appropriate.

(this week’s discussions are more weighted than previous ones. Be sure to answer the question completely.)

Reference: 2 min

Explain the recommendation and solutions to policy problems introduced from the readings in this class.

Report Issue

 

Research Paper Details

1. Write a research paper that explains the innovation and technologies policy issues and its impacts on people in a global environment.

2. Explain how Information Technology (IT) promotes people who are affected by policies involved in the policy-making process.

3. Include some of the theories that have been introduced in this class and how they are applicable in the context of global IT.

4. Explain the recommendation and solutions to policy problems introduced from the readings in this class.

5. Cite specific examples in your research and compare/contrast the specific policies

6. Deliverable Guidelines:

a. Follow APA format on the overall paper and listing peer-reviewed articles used to support your research. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

b. This assignment must be YOUR WORK! This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper.

c. You must reference at least two (2) peer-reviewed articles or papers that support your thesis statement. Cited sources must directly support your paper (i.e., not incidental references). One of these papers may be from your annotated bibliography assignment.

d. To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper.

e Please review the attached rubric for details on how the paper will be graded.

Propose the main investigative techniques that you would use to investigate the murder in this case. Provide a rationale for your response.

Read the case below and complete this assignment.

A child was playing in a local park with his brother. A car pulled up as they were leaving the playground. A man inside the car motioned for the two (2) boys to come over. The man asked the two (2) boys where the nearest convenience store was located. He then stated that he was not familiar with the area and asked the boys to show him the way and he would take them home afterwards. He also stated that he would buy them whatever they wanted if they agreed to show him. The youngest brother got into the car with the man and they drove away. The older sibling ran home and told his mother what had happened. The younger brother was not heard from that night and a report was made to the police. The next day a body was found in a dumpster behind a local garage. It was the younger brother, who had been strangled to death and was nude.

Imagine that you are the lead investigator in this case and develop a three (3) page investigation plan in which you:

  1. Outline the main steps that you would take immediately as it relates to the investigation of this case. Support your response.
  2. Propose your methods for evidence collection. Next, predict the main evidence that you would expect to find regarding the investigation of the death of the boy and the arrest of the suspect. Support your response.
  3. Propose the main investigative techniques that you would use to investigate the murder in this case. Provide a rationale for your response.
  4. Use at least two (2) quality academic resources as references, such as journal articles, newspapers, magazines, and publications from law enforcement associations. Note: Wikipedia, blogs, and similar websites do not qualify as quality academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Describe concepts for planning risk mitigation throughout an organization.

Provide a reflection of at least 700 words (pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

please provide a minimum of 700 words

Course   Name:

ISOL   533—Information Security and Risk Management

Description : 

This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of instruction include how to assess and manage risk based on defining an acceptable level of risk for information systems. Elements of a business impact analysis, business continuity plan, and disaster recovery plan will also be discussed.

 

Course Objectives/Learner Outcomes:

 

Upon completion of this course, the student will:

· Explain the basic concepts of and need for risk management.

· Explain methods of mitigating risk by managing threats vulnerabilities, and exploits.

· Identify compliancy laws, standards, best practices, and policies of risk management.

· Describe the components of an effective organizational risk management program.

· Describe techniques for identifying and analyzing relevant threats, vulnerabilities, and exploits.

· Describe the process of performing risk assessments.

· Identify assets and activities to protect within an organization.

· Identify threats, vulnerabilities, and exploits.

· Identify risk mitigation security controls.

· Describe concepts for planning risk mitigation throughout an organization.

· Describe concepts for implementing a risk mitigation plan.

· Perform a business impact analysis.

· Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization.

· Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.

· Create a computer incident response team (CIRT) plan for an organization.

Main Instructional Areas:

· Risk management basics

· Risk assessment plan

· Risk mitigation plan

· Cost-benefit analysis

· Business continuity plan

Disaster recovery plan