Answered You can hire a professional tutor to get the answer.

QUESTION

Subject: Access Control-Privacy and Compliance (need 2 copies of answers)Question 1: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words) Learning Objectiv

Subject: Access Control-Privacy and Compliance (need 2 copies of answers)

Question 1: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)

Learning Objectives and Outcomes: Analyze the importance of privacy and compliance with privacy regulations. Identify information that is protected by the Privacy Act.

Assignment Requirements: Read the attached worksheet named “PrivacyCompliance.pdf” and address the following:

Using what you have learned about the importance of privacy and compliance with the privacy regulations, identify information that is protected by the Privacy Act.

Subject: Emerging Threats and Countermeasures (need 2 copies of answers)

Question 2: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)

Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this essay, we'll cover threats to our nation's pipelines. To get started, read this article:

https://www.eenews.net/stories/1060054924

ANSWER IN SHORT ESSAY: After reading the article, write a short essay and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity (as discussed in chapter 4- attached chapter4.pdf ) could help mitigate these threats.

For reference use attached Chapter4.pdf

Subject: Analyzing and Visualizing Data

Question 3: Prepare a 8-10 power point slides (APA format & 2 latest scholarly journal article references 2016 on words)

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

Begin with a description of the organization and the computer system you have chosen.

Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.

Draw from the assigned readings (and independent research) to identify what topics should be included.

If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

Subject: Information Governance

Question 4: Write a 400 word essay (APA format & latest scholarly journal article references 2016 on words)

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.

For this Essay, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring.

Question 5: Write a 400 word essay (APA format & latest scholarly journal article references 2016 on words)

Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behaviour of Internet users. Do you feel the behaviour change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.

Arinze, U., Ezema, M. (2016). Information Privacy: Issues, Concerns, and Strategies. Retrieved from https://pdfs.semanticscholar.org/dad7/ab8ea4007048e54af41c27c4eda8bbf4abbd.pdf Section 6.0 Industry-Standard Information Security, Section 6, pages 23 – 24.

Subject: Emerging Threats and Countermeasures

Question6: Write a 2000 word essay (APA format & 5 latest scholarly journal article references 2016 on words)

A threat is an event which has the potential to adversely affect assets. Write a paper in which you discuss information security issues faced by organizations and describe in detail a minimum of five specific threats to information assets.

The requirements for the assignment are as follows:

* The paper should include a minimum of five peer-reviewed scholarly references published since 2016

* Citations and references should be in APA format

* The paper should be a minimum of 2000 words

Subject: Enterprise Risk Management

Question7: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)

For this week, Research the internet for an example of a violation of sensitive information (data breach). Post a summary of the situation and outcome (as well as the source) and evaluate if controls were adequate to prevent the violation. What would you have done to protect the organization from this type of exposure in the future?

Question8: Write a 6 page(excluding titile and reference pages) APA formated paper (APA format & 4 latest scholarly journal article references 2016 on words)

For details of the question refer ERM_Paper.docx

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question