Each week that a Packback submission is due you should:
submit your own original question and
submit a response to TWO other questions posed that week by your classmates
Try to make your submissions achieve a curiosity score of at least an 80 out of a 100. Here are a few things to ensure that you reach 80:
Don’t have spelling errors
Use paragraph breaks (and don’t type one long 350 word paragraph)
Include a link to an external source
Add a description (where you insert your text)
Week 1: Write a question about any computing or management topic that interests you. Respond to two questions posted by your classmates. (The purpose of this week’s assignment is mainly to get you comfortable with the Packback system.)
Classmates Post to respond:
How should management teams handle post Covid workforce?
There is no question that Covid-19 changed how the majority of workforce will operate forever. Companies requiring employees onsite like health and industry have adopted more health safety practices to reassure their employees, while other companies have adopted a more virtual work life. As we approach year one of the Covid-19 pandemic, how will management teams begin planning for post Covid workforce. Will they adopt a permanent hybrid/virtual work schedule or will they send employees back to the office? How will the plan for office reentry if they decide to go back to 100 percent? How will the ensure their employees health and safety upon reentry?
What security issues have you faced with IoT devices?
More and more, IoT devices are making their way into our daily lives. Amazon’s Alexa and the Google Assistant are interactive devices, while Apple “AirTags”, Tile squares, and similar devices constantly report data about us to their corporate handlers.
These devices and the data they collect are beneficial, at least in some way. Alexa can control the lights and thermostat, while the Tile square attached to the car keys helps prevent morning panic.
Most tools have a dark side, however. Some can be easily manipulated; turning off someone’s lights may be comical. Setting an early-morning alarm isn’t quite so funny.
Location tracking is of great concern to many. Location tags place individuals into a dangerous situation when used by a stalker to maintain an up-to-the-moment location of a target. (https://9to5mac.com/2021/05/06/airtag-stalking/).
What issues have you faced with your IoT devices?
Discuss the process of deploying and securing an Android phone application. What important considerations and steps should the programmer follow? Include a discussion about testing steps necessary prior to deployment of the application to ensure that quality and security goals are met. (350 words)
how stored data can be shared between Android Apps? (100 words)
how security can be compromised in applications that allow user input? (100 words)
what application security permissions are and how they work in Android? (100 words)
The project involves depicting a Security Architecture for one of the following businesses:
· Financial (Bank, brokerage, Insurer, etc.)
· Hospital/Medical Services
· Social Media Company
· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
· Manufacturer (Automobile, Computer, Consumer Electronics, etc.)
Respond to the following:
· Identify the business type you have selected for your paper.
· Provide a brief overview of the business
· Provide the goals and approach to the project
· Architectural diagrams and annotations
Need 900 Words & two APA most recent references.
After reviewing this week’s resources and your research, in your own words how would you explain idea generation and the role it
plays in the new product
development process? Share one method of idea generation and apply it to a product you personally use. (Do not reuse the examples provided in the video.) Remember that all new products are not truly new, but can be modified based on consumer feedback and/or moving towards a new market segment.
The criteria for responses are as follows:
Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting. Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.
For the Research Proposal, you will write a research-oriented proposal in current APA format. The paper must include at least 5 scholarly references in addition to the course textbook, must also include biblical integration, and be at least 1,200 words (not including the title or reference pages).
As this is a research proposal as opposed to a typical research paper, students will need to propose at least two research designs needed to test the efficacy of the information system they are designing in this class. Students will focus their proposed research designs around a hypothetical organization where their proposed information systems will be implemented. The fundamental question to be answered is how will an organization know that their design is effective? For example, how can the organization prove the new system is more efficient, faster, or higher quality for their users than the previous system?
Students will need to support their particular type of research design with at least 5 scholarly, peer-reviewed journal articles and thoroughly outline their research methodology for testing their hypotheses.
The outline of this proposal should include at least the following sections:
1. Introduction (statement of the problem, research questions, hypotheses, and key terms)
2. Brief Review of Literature
3. Research Method (variables used, measurement methodology, statistical techniques)
Grading Rubric is attached. Please make sure to check grading rubric.
Given the following, describe how you would improve security for this system.
There is a system containing unencrypted sensitive information (Social Security numbers, driver’s license numbers, first names, last names, and credit card numbers). The system, running a Windows 2008 server, is used only by employees but is on the public Internet, as employees need to access the system from home. Authentication is provided by NTLM, using username and password. The machine is currently directly plugged into its own dedicated cable modem.
Can you recommend five ways we can improve the security of this system, given a $10,000 budget? We should make sure to recommend solutions for software, hardware, and network security improvements. The data is used by 15 users and is secured using a powerful system with decent authentication.
Make sure to provide costs for all features.
Discuss how the software can be improved.
Discuss how the hardware can be improved.
Discuss how the network can be improved.
During this semester, we examined several areas of governance and ways in which governance models are applied and regulated by governments and industryAs you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT 736, so it is essential to start preparing.This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics.Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.Visit the University of Cumberlands’library, go to the Dissertation Database, and locate an interesting topic on governance models, frameworks, regulations, etc.Here are some pointers that will help critically evaluate some viable topics.•Is the topic attainable for a first-time dissertation student?•Is the problem rooted in the literature?•Is the research empirical, i.e., is there a survey, is therean interview guide, has the data been analyzed via some statistical tool?•Is there a theoretical model or framework discussed?Discuss the topic, the problem the model has been used in the research, and any present findings.Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research
Two questions should be no longer than one page using no smaller than 11 point size
font and must restate and address the following questions.
1.What skills and experience qualify you for this Salesforce data analyst /developer?
Include your personal or professional accomplishments that have prepared you to
serve in the role as a Salesforce data analyst /developer.
2. What steps would you take to deal with frequently changing priorities and high
customer demands? Please include examples from your work history.
1,At what level the security policy should be developed?
2,Why is the cloud of concern from a security point of view?
3,Name and explain the mitigation methods to control the employee threats?
4,Why are the world wide web and internet have so much concern for the security?
5,Explain the difference between incident response plan, dissaster preparedness plan and the business continuity plan?
One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.
As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.
Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.
Use the following column headings:
Use the following row headings:
Chief Executive Officer (CEO)
Chief Operations Officer (COO)
Chief Financial Officer (CFO)
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Senior Security Manager
Information Security Architect
Information Security Engineer
Information Security Auditor
Information Security Analyst
Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
Concisely describe cybersecurity governance, including major components like organizational oversight and security processes.
Recommend an information security control framework.
Logically explain how an information security control framework benefits a business.
Describe one organizational challenge of implementing information security and provide an example of how you, the CISO, would address the challenge.
Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.
Format all citations according to APA guidelines. A minimum of three academic sources is required for this assignment.