Analyze information security systems compliance requirements within the Workstation and LAN Domains.

Assignment 4: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.
Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:

Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual activity
hide internal IP addresses

Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Analyze information security systems compliance requirements within the Workstation and LAN Domains.
Use technology and information resources to research issues in security strategy and policy formation.
Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

For your primary post, provide a link to a current news article or science article that is related to at least one topic from Chapter 20 “Rocks & Minerals” and/or Chapter 21 “Plate Tectonics and Earth’s Interior.”

1. “Chapters 20 and 21”

For your primary post, provide a link to a current news article or science article that is related to at least one topic from Chapter 20 “Rocks & Minerals” and/or Chapter 21 “Plate Tectonics and Earth’s Interior.”
In addition to the link, write a paragraph of at least 125 words describing the article and how it relates to the material from the textbook. Which concepts from the text does it mention, cover or depend on? Is the article more or less detailed on the science than the textbook?( I    ADDED SCREEN SHOTS OF THE TOPIC) 
Make a substantive reply to at least one fellow student.

2. “Remote Access” 

Remote access via Virtual Private Networks (VPN’s) to corporate resources for the purposes of e-commerce, telework and remote administration is becoming commonplace. From an auditing perspective, suggest two or more controls that should be in place to prevent the loss or theft of confidential information.
Give your opinion on what you believe are the essential elements of an acceptable use policy for remote access. Elaborate on each item and justify its importance.

3.”Risk Management” Please respond to the following:

Imagine you are the software engineer primarily concerned with managing the technical aspects of software development. When evaluating, your team has no process for addressing, identifying, or evaluating options from a risk perspective or for optimizing the use of resources by allowing teams to work in parallel on independent sub-goals. 

In this discussion, you will use your week 3 assignment related to WBS (Work Breakdown Structure) and create the risk management process by identifying the risk related to your every task, probability (low, high, medium) of the risk with effects, and the strategies to manage the risk. Note: You need to include your WBS in the discussion to allow your peers to see the relationship between task and risk activities.
Post your WBS from week 3 and your initial thoughts on risk by Wednesday. Return a couple of other days to interact with your classmates before the due date on Sunday.

Analyze and evaluate laws and regulations relative to product safety, liability and representations.

 Assignment 2: The Gig Economy
Uber is largely hailed as the advent of the gig economy, which is the idea that people will not work for any one employer, but instead will work on projects for any variety of companies desiring their services.  While creating a new type of entrepreneurship for individuals, it raises a host of new legal questions for companies around the law of agency.
An investment firm has asked you to evaluate Uber’s legal exposure for the conduct of its drivers.

Write an interoffice memo in which you:

Summarize the main principles of agency.
Analyze the circumstances under which Uber might be liable for the conduct of its drivers.
Identify the steps Uber can take, if any, to limit its legal exposure for the conduct of its drivers.
Use at least three (3) quality resources in this assignment. Note: Wikipedia is not an acceptable reference and proprietary Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:

Your news brief or memo should include a heading, summary statement, background and recommendations.
The specific course learning outcomes associated with this assignment are:

Analyze and apply the concepts of ethical decision making,  corporate governance and  corporate social responsibility.
Analyze and evaluate the employment-at-will doctrine and the statutory protections afforded employees.
Analyze and evaluate laws and regulations relative to product safety, liability and representations.
Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics.
Click here to view the grading rubric.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

How does global sourcing and procurement impact the overall effectiveness of the supply chain? What are the benefits and challenges that have occurred when outsourcing logistic and other functions?

Details:

Supply chain integration is a major contributing factor to organizational success. The goal of supply chain integration is alignment within the supply chain. As a business leader, how can you achieve greater supply chain integration with suppliers and customers?

Amazon is a prime example of a company that has successfully managed its supply chain to achieve growth and profitability. Research the progression of Amazon’s supply chain integration. Write a 1,000-1,250-word paper that address the following questions:

How do sales and operations planning in supply chain integration impact the company overall? What would Amazon’s medium- and long-term forecast inform the operations management department? How do logistics, transportation modes, and warehouse locations impact Amazon’s competitiveness?
How does global sourcing and procurement impact the overall effectiveness of the supply chain? What are the benefits and challenges that have occurred when outsourcing logistic and other functions?
How has Amazon successfully leveraged e-commerce strategies to promote supply chain integration and boost sales and growth for the organization? Which strategies have been particularly effective and why?
Do you feel that Amazon sets an example for other companies to model regarding supply chain integration? Be sure to explain your rationale. Consider the ethical implications in your response.

Incorporate five to seven resources to support your paper.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to Turnitin. Please refer to the directions in the Student Success Center.