Skip to content
Menu
Timeless College
  • Alex Cavazzoni
  • Art Classes Near Me
  • AWS Training in Virginia
  • Bad Influence On Children
  • BROWZ safety compliance
  • Clarence McClendon
  • Digital Marketing Consultancy Kelowna
  • Freedom of speech on social media
  • Https://timelesscollege.xyz/
  • Https://timelesscollege.xyz/ – Timelesscollege.xyz
  • Https://www.timelesscollege.xyz/
  • Https://www.timelesscollege.xyz/ – Timelesscollege.xyz
  • In Home Tutoring
  • Integrated Atpl
  • Jewish Intimacy
  • Learn to play guitar online
  • Online Baseball Hitting Trainer
  • Prince George School
  • Quickbooks Classes
  • Sample Page
  • Schreibwettbewerb
  • STOCKS CRYPTO FOREX Trading
  • Timeless College
  • Timeless College – Timelesscollege.xyz
  • Timelesscollege.xyz/
  • Timelesscollege.xyz/ – Timelesscollege.xyz
  • Training as a Pilot
  • Website Creation Atlanta
Timeless College
ITM323 Security – Privacy and Compliance-senate intelligence committee

ITM323 Security – Privacy and Compliance-senate intelligence committee

November 23, 2021 by seo_automation_owner

Task:

Final Project Instructions

Students will apply the learnings from the class participation through a project and present their findings to the class at the end of the course. Students will choose one topic from the three announced in the first week and will apply all the principles learned in the classes as well as supplement it with individual research. The student will submit the paper in the thirteenth week. There will be discussions on the projects in the class regularly during the 12 sessions to share the progress and findings. After the submission of the papers, students will present their research and conclusions to the class during the 14th and 15th weeks. The output of the project consists of:

1. A paper which must contain at least the following elements:
• Executive summary 
• Problem statement 
• Key requirements to address the problem 
• Key research findings 
• Solution options/conclusion/recommendations 
• List of references 
• Supporting material in Appendices

The three topics that the student can choose one from are:

1. Exploiting cloud resiliency and efficiency without compromising on security for information processing:

Your company has its main office in San Jose and two branch offices in New York and Dallas.  You would like to use the cost-effectiveness and resiliency of “Cloud Computing” without jeopardizing the “private” information and security.  Propose a total solution with security, high availability and disaster recovery.  Make reasonable assumptions regarding your company and state them.  Define the requirements for a total solution, investigate various options and propose a solution that meets the requirements, return on investment criteria, and is compelling enough to convince the CEO to authorize the implementation.

 
2. Addressing security breaches in a retail company IT department:

You have been recently appointed as the CIO for a large retail company. You are charged with addressing data security that has been a major news item in the past six months where the customer sensitive data has been stolen by hackers. Fortunately, your company has not yet been significantly affected. Your CEO is very nervous and has tasked you to propose a plan to assure him that proper processes and policies are in place. At the same time, he has also cautioned that the IT budget cuts are forcing to do more with less. You are asked to provide a short term plan to put in place processes and policies to assure sensitive data confidentiality, integrity, and availability and a long term plan to proactively prevent security breaches in a cost-effective manner. Your proposal is due on April 15th. Make appropriate assumptions on current IT processes and policies in place and state them.  Identify gaps and propose counter measures.

3. Preparation of a congressional brief on cybersecurity for legislative action:

You are working for a senator who is in the senate intelligence committee. Your senator has commissioned you to provide a brief on the appropriate legislative action to address the increasing demand for enacting major legislative provisions relating to cybersecurity since the Federal Information Security Management Act of 2002 (FISMA). Cybersecurity represents one of the most serious national security threats and economic challenges confronting our country. Cybercrime costs the United States approximately $100 billion annually. At the same time, the quantity and sophistication of cyberattacks continue to accelerate at a frightening pace.  From 2006 to 2012, cybersecurity attacks on the federal government alone increased by 782%, reaching 48,000 reported incidents in 2012. Your brief should address the challenges posed by emerging technologies such as cloud computing, biometrics, mobile devices, and drones. The senator is especially interested in balancing privacy and national security with fairness.

 
4. A project of your choice relevant to Information Security that would help you at work.

tag Read less
  • Assignment status: Already Solved By Our Experts
  • (USA, AUS, UK & CA PhD. Writers)
  • CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Consolidation of Contemporary Nursing Practice in
  • Quantity And Quality Of Evidence
  • MBS680 Auditing: The Assurance Practitioner
  • MBS680 Auditing: Cost of Sales Process
  • MBS680 Auditing: Internal Control Activities

Recent Comments

  • A WordPress Commenter on Hello world!

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021

Categories

  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2022 Timeless College | Powered by WordPress and Superb Themes!