please answer the discussion question with citations and references

Question Description

Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

Follow APA format writing style

Question Description

follow APA format writing style. 125 to 225 word count. (Replies are 100-175 words- with meaningful dialogue).

Sentiment (pp. 319-332):

Simply put what is Sentiment? How could a person or business greatly benefit from it?

Thinking about Sentiment Analysis and Speech Analytics…

Pick a large company, which we might know (let’s say the top 500/1000 companies). How does a savvy company find ways to better to “listen” and improve their customers experience? Add a reference link to support your findings.

Or

Social media analytics (pp. 380-386) companies provide integrated support that is helpful to many parts of a business. List and briefly describe the best practices in social media analytics.

Social Network Analysis (pp. 373-377) can help companies divide their customers into market segments by analyzing their interconnections. Why is this important? What are some of the benefits a company can use?

Task-Scenario_2-ETC

Question Description

Subject: Emerging threats & countermeasures

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario:

The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Task:

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

  • 1) APA
  • Minimum 1 page
    • Title page
    • Abstract
    • Body (in-text citations)
    • Conclusion
    • References (3 minimum)
  • 2) Respond to 2 peer topics

Required Resources

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely

Question Description

Usingthe guidelines provided in this week’s chapter (and other resources asneeded), create a step-by-step IT security policy for handling useraccounts/rights for a student who is leaving prematurely (drops, isexpelled, and so on).

Youwill need to consider specialized student scenarios, such as a studentwho works as an assistant to a faculty member or as a lab assistant in acomputer lab and may have access to resources most students do not.

Write your answer using a WORD document.

Required Videos

VIDEO. System Admin Tools

Click HERE to watch or click embedded video below.

Required Readings

Read Chapter 10 of the Easttom text, Security Policies

text book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3

Primary topics:

  • Recognizing the importance of security policies
  • Understanding the various policies and the rationale for them.
  • Knowing what elements go into good policies
  • Creating policies for network administration.

— PPT Attcahed .

Write advising a CEO for a foreign to adopt a new software tool for personnel management. (2000 Words)

Question Description

Please develop a short paper describing how you would advise a CEO for a foreign (not of your ethnic background and not the US) to adopt a new software tool for personnel management. The software was developed in the US.

1. Designate your country of choice

2. Discuss nuances that your chosen country has with business (conduct research)

3. Discuss pros and cons with doing business with US companies from your chosen country’s point of view (conduct research)

4. What would be your approach to convince the CEO?

Evaluation criteria:

a) Minimum of 2000 words.

b) Minimum of 3 relevant, significant sources

c) Captured nuances of the country of choice

d) Solid pros & cons of doing business from country’s point of view

e) Solid advice to CEO concerning approach to this innovation

f) APA formatting with solid grammatically context and doctorate level writing

Please submit as a MS Word document only.

Please go through the description and answer required questions. 0% plagiarism.

Question Description

Chapter 3 presented the approach Mars, Incorporated used to implement ERM, and chapter 5 presents the University of California Health System’s ERM development. In what ways are the two organization’s approaches to ERM similar? How do they differ? Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.

Assignment requirements:

  • Create a new thread.
    • As indicated above, describe in what ways the two organization’s approaches to ERM are similar.
    • Also, explain how they differ.
    • Choose one aspect of each ERM implementation from which the other organization would benefit and explain why.
    • Post substantive comments on those threads by evaluating the pros and cons of that student’s recommendations.
    • Your comments should extend the conversation started with the thread.
    • “I agree” is not enough.
  • Need citation in APA 6th.

**https://youtu.be/WIhRji-bcUY – Chapter 3 Link

**https://youtu.be/UtllhYJe_Bw – Chapter 5 Link

Discussion about SNMP and 802.1x and 802.AE:

Question Description

Please discuss the following three topics separately.(Since this is a discussion, I may ask for a short rrply in a few days, just a few words). Thank you. Each discussion needs more than 150 words.

1. SNMP:

On pages 169 – 170 the author discusses SNMP please research and post a case study of how an organization has implemented SNMP to manage and protect their network. You may also discuss a company that has solutions to implement SNMP.

2. 802.1x and 802.AE:

The author discusses 802.1x and 802.AE on pages 171 – 172 please research and post a case study of how an organization that has implemented 802.1x or 802.AE to protect their switches. You may also discuss a company that has solutions to implement 802.1x or 802.AE to protect switches.

3. Chapter 6 – Page 211: Test Your Understanding parts a – c.

e-book: https://drive.google.com/file/d/1iIu8r57PoxlIcYAwR…

Java: Part 1: Unit Testing – Course Registration approval

Question Description

Part 1: Unit Testing – I just need Part 1: A, don’t need Part B.

Course Registration approval (10 Points)• Complete all steps in the video tutorial named Unit Testing in Java, Part 2 (canRegister method)using Eclipse. Pay special attention to the very last frame, where a table is shown. You must use atable like this to add more unit tests to your program. I want to see the table either in an ExcelSpreadsheet or in a nice table in a Word document. You should have the four listed canRegistertests, plus you must add at least four additional tests to your program. They should all be listed inthe Spreadsheet or Word document. This program does not have to work at the command line likeother Java programs so do not worry about package statements.

Link to the 9 min video: https://online.fiu.edu/videos/?vpvid=10f7cc82-019b-453c-8c5a-4c33603f0773

Information Governance – one discussion question

Question Description

Q1: When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases. Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

BACKGROUND:

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.

Please look at the Requirement below.

Question Description

Please develop a short paper describing how you would advise a CEO for a foreign (not of your ethnic background and not the US) to adopt a new software tool for personnel management. The software was developed in the US.

1. Designate your country of choice

2. Discuss nuances that your chosen country has with business (conduct research)

3. Discuss pros and cons with doing business with US companies from your chosen country’s point of view (conduct research)

4. What would be your approach to convince the CEO?

Evaluation criteria:

a) Minimum of 2000 words.

b) Minimum of 3 relevant, significant sources

c) Captured nuances of the country of choice

d) Solid pros & cons of doing business from country’s point of view

e) Solid advice to CEO concerning approach to this innovation

f) APA formatting with solid grammatically context and doctorate level writing

Please submit as a MS Word document only.