CIS 505 Discussion Post Response

CIS 505 discussion post responses.

Respond to the colleagues posts regarding:

After reading about and studying VPNs this week, describe a scenario where you might find a VPN useful in the business world. What are some major concerns you might have as a network manager?

There are two discussions here that need to be responded to thoroughly. Responses must be on APA format 150+words 1-2 legitimate verifiable sources per response.

GS post states the following:

As a company that utilizes VPN for the past 10 years we have found it a productive way for employees to conduct business in a secure fashion. We implemented a RSA token for extra security and this eases executives over security concerns. With our VPN (Checkpoint) we offer two ways to access our internal network:

-RSA token: This is handed out to personnel that use a laptop for business. This 3 part authentication requires username/pin/token code in order to access our network.  This is very secure for a machine that was compromised. Now I said compromised not data that has been transmitted.

-VPN Web: This is usually offered to users that need to access our network temporarily from a desktop.

Now remote access software such as GOTOMYPC have incorporated two-way authentication which has upped the security level and offers the user access from any location with internet access. Our VPN RSA needs the software client installed. We as a company now offer GOTOMYPC to internal employees that wish to work from home, but salesreps still are provided with RSA tokens.

VPN is not a new technology; it is more like a legacy security/connectivity approach of VPN and not conceived for todays world of multi-cloud and mobile configurations and not on premise settings. There has been documentation of VPNS weak link architecture.  The issue centers around the fact that data cant be routed securely at the application level with a VPN. So if your organization is still relying on VPNs to transmit sensitive data over the VPN providers server, then youre taking a big risk that you may be exposing that data to people who shouldnt see it and may compromise it. A study that included researchers from UC Berkeley and the University of South Wales revealed that the vast majority (more than 80 percent) of VPN apps on Android devices wanted access to personal user data.

The research also verified that:

Nearly 40% of the VPN apps injected malware to try to access user data.

84% leaked user traffic.

Around 20% failed to encrypt traffic.

The fact that VPNs simply cant protect privacy to the degree that is required in todays enterprises.

https://www.cpomagazine.com/cyber-security/why-virtual-private-networks-arent-very-private/

RR post states the following:

A scenario where I might find a VPN useful in the business world, would be if I were the CEO of a pharmaceutical company who was looking to do a Merger and Acquisition (M&A) of another company. Without a VPN, the companys data would be vulnerable to hackers who can see data in transit, and eventually reach the companys IP address. If hackers compromise the companys system during the M&A, confidential information may be exposed which could affect the outcome of the M&A.

As a network manager, the main concern I might have is when the company uses VPNs to provide third-party vendors access to their network. When they do, those vendors either have full access or they dont. There are no shades of gray, no ability to give partial access only to required resources. The more servers, applications, and network equipment vendors can access, the more the company has at risk (Howlett, 2019). Other network manager concerns are connection speed and performance decrease, and third-party vendors may not have in-house technical support 

References:

Howlett, T. (2019). 7 common VPN problems: The not-so-good, the bad, and the ugly. Retrieved from https://www.securelink.com/blog/vpn-problems/

Process Analysis

Using the case study, assignment instructions, Content readings, and external research, develop your Section II. Process Analysis.  The case study tells you that the executives and employees at MTC have identified a need for an effective and efficient hiring system.  As you review the case study, use the assignment instructions to take notes to assist in your analysis.  As the stakeholders provide their needs and expectations to improve the process, identify steps that could be improved with the support of a hiring system.  Also look for examples of issues and problems that can be improved with a technology solution. 

Use the outline format, headings and tables provided and follow all formatting instructions below. 

Process Analysis
A.    Hiring Process

At the beginning of this section, write an introductory opening sentence for this section that addresses what the complete table provides.  Reference processes and analyzing process improvements.  Additional research can expand your knowledge of these areas.

The first step in analyzing the process is to document what the current process steps are and who is responsible for doing them. Therefore, the table provides the current steps in the manual hiring process provided by the case study. Remember, a process is a series of steps to perform a task; therefore, think about what the users are doing as part of the hiring process. Retain the as-is process steps provided; do not remove or revise these.  Complete the second column by identifying the stakeholder responsible for this step based on the interviews in the MTC Case. 

The next step is to identify how a hiring or applicant tracking system could improve each step in the process and how the business will benefit from that improvement. For each of the as-is process steps provided, complete the To-Be Process column in the table. indicating how this step in the process will be done using the hiring or applicant tracking system. For each process step, the statement should be concise and include an action verb and align with improving or replacing the current manual, as-is process step provided.  Then complete the Business Benefits of the Improved Process column by explaining how this part of the process can contribute to the overall business strategy think at a higher level than the specific process step.  Review the examples provided in the Hiring Process table. For each to-be process step, identify the result of using the system, as shown in the two examples.  While it is true that the system will speed up each step of the process, think about how MTC would benefit more strategically from using an automated system to perform that step.

BUS 517 Discussion Post Response

BUS 517 discussion post responses.

Respond to the colleagues posts regarding:

Dedicated or Non-Dedicated Resources

You are now deciding on resources for a project team. You have a choice to staff a team of resources who will be dedicated (or allocated) 100% to the project, or staff a team of resources who will be dedicated (or allocated) three days each week to your project. Using information from the readings, explain how you can use either set of resources.

There are two discussions here that need to be responded to thoroughly. Responses must be on APA format 150+words 1-2 legitimate verifiable sources per response.

SW post states the following:

This weeks review is in regards to dedicated project staff versus temporary project staff. The dedicated project team consists of 100% project staff allocation for project activities. The ability to have a support staff that is dedicated to the project with no external activities ensures the project is the main focus. Advantages of a dedicated team are as follows:

Primary focus on tasks, risk mitigation, and results.

Removal of loyalty conflicts due to sharing across multiple roles.

Assurance that project activities can be completed with a consistent set of people.

However, a dedicated team has its negatives to the business more than the project itself.

100% dedication to the project means normal duties are not completed.

oThis can mean a loss of productivity in other parts of the business at the cost of project success.

Can create a Us vs Them dynamic as the dedicated project team builds a sense of ownership of the project results.

Can also create an atmosphere of Project over normal operation creating departmental separation.

As can be seen from the two lists the bonus that arises from a dedicated team benefits the project heavily but in turn, can create undesired assumptions and attitudes in the workplace. Whether this is an outcome that is manageable or one you wish to avoid would depend on understanding the companies governing principles and work environment. Regardless, the ability to maximize the project activities and meet objectives with a consistent team of professionals is a stable and optimal situation for most projects.

A temporary team that works three days a week is the second option for our project. This means that our project staff will provide three days of dedicated work to the project. This type of staffing can fix many of the negative issues to the business advised for the dedicated team. With less of a project first focus, other teams and departments lack the assumptions that the project comes before normal work. Three days a week can mean that project activities need either a focused approach maximizing progress or a longer timeline to avoid missing deadlines. The positives of a dedicated team become your negatives. Shared responsibilities can build an unintentional hierarchy with regards to project tasks and normal work procedures. Loyalty issues arise causing focus issues with project tasks. A good project manager will manage the staff to ensure that dont feel pressure to prioritize their different work hats and get the best out of the staff during the three days.

KR post states the following:

In deciding which resources is best suitable for this EHR Project team a dedicated support staff was chosen. The support staff will carryout the project tasks identified. The implementation of this system is critical to the organization and this structure will facilitate a successful project implementation. experienced staffing will be strategically selected in house. 

As experience staffing will be required and select in house 1st before deciding to outsource missing expertise. Staffing is one of the partial risk profile which will required great emphasis. Projects and project management are integrative by nature for example, When additional risks associated with various staffing alternatives are identified, then one or more of those processes may be revisited. Human Resources along with the head of department will oversee staffing alternatives. This includes moving people to different assignments, outsourcing some of the work, or replacing team members who leave during EHR Project. 

References:

Larson, E. W., & Gray, C. F. (2018). Project Management; The Managerial Process (7th Edition ed.). New York: McGraw-Hill.

A Guide to the Project Management Body of Knowledge (PMBOK Guide) – Sixth Edication

(466) 3-5 Pages With References And No Plagiarism

Assignment Details

Scenario: You are an investigator for Child Protective Services in your community. One of the most difficult aspects of interviewing is the interview of a suspected victim of child sexual abuse. Often, the first interviewers are detectives or investigators from the police department with little or no training for interviewing child sexual abuse victims. The Commander of the Sex Crimes Unit would like to you to identify errors in interviewing by police investigators when questioning child sex crime victims about the circumstances during the alleged offense(s). The psychopathology of the suspect and the victim are very important, but the victim can be misled unintentionally by police resulting in false or inaccurate complaint information.

The Commander of the Sex Crimes Unit would like you to outline and explain the specific areas to be avoided when questioning a child as a sex crime victim.

Specifically, he is concerned with the following:

  • The use of suggestive questions
  • The implication of confirmation by other people
  • Use of positive and negative consequences
  • Repetitious questioning
  • Inviting speculation

In a 35-page paper, address the specific concerns, and explain why it is preferable to have the child interviewed by a person with the qualifications to potentially testify as an expert witness in subsequent criminal trials