Security Policies

There are three types of security policies whch an organization or company must define including an Enterprise Information Security Policies (EISP), Issue-Specific Security Policies (ISSP), and Systems-Specific Security Policies (SysSP). Please conduct an Internet search, define each in your own words citing any sources used in APA format, and provide real-world examples of all three types of security policies. A minimum of 5 sources and two pages are required.

Research Paper On Webscraping And R

 The website the data is collected from must allow webscraping. There are numerous websites that offer directions on how to webscrape. Have you visited any of these sources? How many mention legality? 

After scraping data from a site write a research paper to describe:
  • The data collected, how you chose this data and how legality was confirmed
  • What issues you may have ran into in the data collection
  • How you may use webscraping in a practical setting, such as research or for an employer
  • Discuss the legality of webscraping outside the scope of this data, what problems can webscraping cause?
The following documents should be submitted for full credit:
  • The research paper
  • The .r file with your webscraping code

Your research paper should be at least 3 pages (and at least 800 words), double-spaced, saved in MS Word format. All research papers in this course should be written in APA format (no abstract is necessary). Properly cite and reference any websites or documents you include to support the requirements of this assignment. 

Module 2 Discussion Question

Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? 

250 words with reference from above site.

App Security

Objective: The objective of this discussion is to understand the threat and vulnerability of the Microsoft operating systems and to find ways to mitigate the security breach. Microsoft operating system is widely used in various organizations and finding strategies to defend against an attack is becoming difficult.

DQ1: Therefore, your task is to read the one of  book titled security strategies in windows platforms and application and layout strategies you could use to mitigate the risk of an attack in Microsoft windows platform.

DQ2: Discuss the telnets of information security and how windows and application could be mapped into a typical IT Infrastructure that could help to secure the system?

Note: All discussions must adhere to APA 6th edition format. Please, do not post more than 200 words for the discussion. Please, don’t forget to create in-text citations before referencing any article. You may visit the content area to learn about the APA format.