Categories
Technology

Do you believe the United States plays a key role in cyber espionage?

1. Cyber espionage has become common in the last decade. Can you name at least two cyber espionage incidents that occurred in 2020-2021?
2. Do you believe the United States plays a key role in cyber espionage?

Categories
Technology

Describe two IT practices aligned to either COBIT or ITIL that contribute to the viability of your plan and provide two examples from your plan demonstrating the application of each practice.

TASK 1: IT OPERATIONS PLAN
INTRODUCTION
Throughout your career in IT management, you will be asked to develop and improve a company’s IT department to help support its strategic goals and mission. When a company develops a new strategic plan, the process typically begins with the chief executive officer (CEO) and various stakeholders writing strategic goals, with the assistance of subject matter experts (SMEs) from the business. Next, these strategic goals are finalized and assigned to team members and others who will formulate solutions to achieve the goals within a specific time frame and budget. Then, the team creates operational goals in alignment with the company’s strategic goals and an operations plan. Finally, a workflow is developed to move from the current environment to the future state.
For this assessment, you will create an IT operations plan from the provided strategic goals in the attached “TreasureChest Case Study.” The case study should be read before beginning this task. The attached “IT Operations Plan Template” can be used to complete this task.
The skills you showcase in your completed IT operations plan will be useful in your career in responding to the demands you will receive from leadership. This IT operations plan may also be added to your portfolio to show to future employers.
SCENARIO
You were recently hired as the new chief information officer (CIO) at a SaaS treasury management company, TreasureChest. Your main responsibility is to implement innovative changes and become the direct report for the entire IT department. The CEO has been doing this prior to your hire. The first project the CEO has assigned to you is to produce a new IT operations plan for the company. You have been given the strategic goals for the company (see attached “TreasureChest Case Study”) and need to ensure your IT operational goals are in alignment with the company’s strategic vision and mission.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
Using the “TreasureChest Case Study” in the Supporting Documents section, create an IT operations plan by doing the following:
Note: The attached “IT Operations Plan Template” can be used to complete this task.
A. Analyze each of the following six components of TreasureChest’s current IT environment, including how each component’s current state affects the company’s operational efficiency and future innovation opportunities:
• SaaS operation
• hardware
• operating systems (OS)
• networks
• software
• database
1. As part of your analysis in part A, provide one or more examples from the case study of how each of the following six elements is affected by TreasureChest’s current IT environment:
• service and delivery
• scalability
• flexibility
• interoperability
• resilience
• security
B. Design an IT strategy for TreasureChest’s IT operations by doing the following:
1. Select one strategic goal from those listed in the case study and complete the following:
a. Create three IT operational goals that support the strategic goal selected in part B1, one of which must include a software solution.
i. Explain how the proposed software solution solves one operational challenge in the case study.
b. Describe two unique enhancements for each of the three IT operational goals created in part B1a that support the goal’s objectives.
i. Describe two unique planned activities for each of the six enhancements described in part B1b that need to be executed to implement your strategy.
Note: You must provide a minimum total of six enhancements and twelve planned activities.
c. Describe two unique security risks associated with each of the six enhancements described in part B1b.
i. Describe two unique steps for proactively mitigating each of the twelve identified security risks from part B1c to protect the IT security posture of the organization.
Note: You must provide a minimum total of 12 security risks and 24 proactive mitigation steps.
2. Select one additional strategic goal from those listed in the case study that is different from the goal selected in part B1 and complete the following:
a. Create three IT operational goals that support the strategic goal selected in part B2, one of which must include a software solution. These goals must be different from those in part B1a.
i. Explain how the proposed software solution solves one operational challenge in the case study that is different from the challenge in part B1ai.
b. Describe two unique enhancements for each of the three IT operational goals created in part B2a that support the goal’s objectives. These enhancements must be different from those in part B1b.
i. Describe two unique planned activities for each of the six enhancements described in part B2b that need to be executed to implement your strategy. These activities must be different from those in part B1bi.
Note: You must provide a minimum total of six enhancements and 12 planned activities.
c. Describe two unique security risks associated with each of the six enhancements described in part B2b. These security risks must be different from those in part B1c.
i. Describe two unique steps for proactively mitigating each of the twelve security risks to protect the IT security posture of the organization. These steps must be different from those in part B1ci.
Note: You must provide a minimum total of 12 security risks and 24 proactive steps.
C. Design an implementation plan for TreasureChest’s IT operations by doing the following:
1. Explain how either the COBIT framework or ITIL practices will be incorporated into your IT operations plan to ensure the flexibility and sustainability of TreasureChest’s IT infrastructure through each of the following operating years:
• year one
• year three
• year five
2. Prepare a comprehensive operational workflow representing how TreasureChest will transition from the current IT environment to the environment proposed in your IT operations plan.
Note: Your workflow may be in a variety of formats (e.g., a diagram, list, etc.).
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
TASK 2
INTRODUCTION
Throughout your career in IT management, you will be asked to develop and improve a company’s IT department, including staffing and innovative solutions. Once a company has finalized its strategic goals and budget, an organizational and resource plan needs to be developed. Then, innovative staffing solutions and job descriiptions need to be developed with assistance from Human Resources (HR).
For this task, you will create an IT organizational and resource plan that includes an annotated hierarchical organizational chart for the company described in the attached “TreasureChest Case Study.” The case study should be read before beginning this task. Once the chart is complete, you will write a job descriiption for one of the positions and then propose innovative replacements for two other positions. Finally, you will write a recommendation to the Steering Committee summarizing your plan and its alignment with business processes.
The skills you showcase in your IT organizational and resource plan and recommendations will be useful in collaborating with the various stakeholders you will work with during your career. This IT organizational and resource plan may also be added to your portfolio to show to future employers.
SCENARIO
You were recently hired as the new chief information officer (CIO) at the SaaS treasury management company, TreasureChest. Your main responsibility is to implement innovative changes and become the direct report for the entire IT department. The CEO has been doing this prior to your hire. You have been assigned to review the department staffing to ensure you have the right people and resources in the right positions. The CEO is looking for innovative ways to solve the staffing problem and wants you to collaborate with HR to fill these positions. You have been given TreasureChest’s case study and strategic goals and need to ensure your IT organizational and resource plan aligns with the company’s business demands.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Create an IT organizational and resource plan to meet the needs outlined in the attached “TreasureChest Case Study” by doing the following:
1. Create an annotated hierarchical organizational chart illustrating 10–12 individuals in six various roles in the IT departmental structure and processes, including the type of resources (e.g., full-time employees [FTEs], outsourcing, contracting, inshore, offshore, etc.) for each of the six roles.
Note: An annotated organizational chart is a chart to which you add labels for each role and resource type.
a. Write a job descriiption for one of the roles in your organizational chart that includes information for each of the following aspects:
• heading information (e.g., job title, pay grade, relationships)
• summary of the role components and their overall benefit to the organization
• objective summary of the job
• job duties and responsibilities
• qualifications
2. Propose an innovative strategy to improve efficiency and reduce headcount by doing the following:
a. Describe a collaborative partnership with an internal or external business resource to replace one FTE or role in your organizational chart, including two examples of how the replacement is innovative and will move the company forward.
b. Describe a technology to implement to replace one FTE or role in your organizational chart, including two examples of how the replacement is innovative and will move the company forward.
B. Write a recommendation to TreasureChest’s Steering Committee detailing your IT organizational and resource plan from part A by doing the following:
1. Summarize how your plan meets the company’s business goals and provide two examples from your plan that support your claims.
2. Describe two IT practices aligned to either COBIT or ITIL that contribute to the viability of your plan and provide two examples from your plan demonstrating the application of each practice.
3. Recommend two innovative organizational resource technologies to improve service at the company and provide two research-based examples demonstrating the successful application of each technology.
C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
D. Demonstrate professional communication in the content and presentation of your submission.

Categories
Technology

Discuss the advantages and disadvantages of hierarchical vs. threat–asset matrices.

Threat modeling should account for the importance or value of an asset and its prioritization. As discussed in previous modules, protecting assets should be commensurate with their value. For this activity, create a list of the top five threats you perceive important in the current technological environment. If you are using threats to your work, school, or home, please generalize specific references to avoid disclosing sensitive information.
Provide details to the list you created and create a hierarchical structure with tree, root, and leaf nodes as necessary. Access the following web pages for more information on hierarchical and threat–asset matrices:
Crio. “Diagram of Binary Tree Links to an external site..” Accessed May 2, 2022.
https://www.crio.do/blog/content/images/2022/02/Diagram-of-Binary-Tree.png
IEM. “Ranked Critical Resources Links to an external site..” Accessed May 2, 2022.

Using Threat Vulnerability Asset (TVA) Methodology to Identify Cyber Threats and System Vulnerabilities in Emergency Management


Finally, discuss the advantages and disadvantages of hierarchical vs. threat–asset matrices.

Categories
Technology

Directions: Be sure to make an electronic copy of your answer before submitting

Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” link on the course homepage for specific format requirements.
In your course, turn to Lesson 8. Skim through it to refresh your memory. Next, carefully study and review the section titled “Measuring Technological Progress.”
Use your own words to write a short compare-and-contrast essay that defines and explains three distinct perspectives on the evolution of technology. As you write, imagine you are talking to a friend who has no knowledge of this topic. In short, write the way you speak, using a conversational tone. Also, try to alternate short sentences and longer sentences to make your writing more readable.
Be sure to create a title and cite yourself as the author. For example:
A Comparison of Three Perspectives on the Evolution of Technology
Mei Quoran
Your essay should include five paragraphs, as follows:
Paragraph 1 is your lead paragraph. It will contain an overview of what you have to say in comparing and contrasting the perspectives of Gerhard Lenski, Leslie White, and Alvin Toffler with respect to the evolution of technology.
Paragraphs 2, 3, and 4, are your body paragraphs.
In your essay, use paragraph 2 to describe the perspective of Gerhard Lenski.
In paragraph 3, you’ll write about the perspective of Leslie White.
In paragraph 4, you’ll describe and discuss the perspective of Alvin Toffler.
Paragraph 5 is your summary and conclusion. Here, you’ll compare the three perspectives to show how they are, or may be, similar. You’ll contrast the three perspectives to describe how they’re different. You’ll end this process–and your essay–by expressing your view as to which of these theorists (one or more) offer the most useful insights into the evolution of technology, in your opinion.
Use direct quotes from your reading to support your ideas, but don’t use too many. One to three such quotes should be your limit. This means that you must include citations and a reference page. Be sure to put a direct quote in quotation marks. For example: According to Smith, “Carbon dioxide is both our friend and our enemy.” Also, be sure to include a citation for any material you paraphrase.
Begin by writing a first publish. Then, edit and rework your material to make it clear and concise. After you have reached a final publish, proofread the essay one last time to locate and correct grammar and spelling errors.

Categories
Technology

Explain how an e-commerce site can be developed to allow catalog items to be managed by an employee of the organization who has no programming skills or experience.

Create a 3-5 page MS Word document about managing e-commerce Websites. Your paper must contain the following:
Cover page (does not count toward the page requirement)
Your full name
Course code, session, and section (e.g., ITSD-325 2202A-01)
Submission date
Assignment name (e.g., Unit 1 Individual Project)
Explain how an e-commerce site can be developed to allow catalog items to be managed by an employee of the organization who has no programming skills or experience. Describing what is needed to allow these functions:
Add new items to the catalog
View and/or edit information about existing items
Remove items from the catalog
Mark items unavailable (and how this might differ from “remove”)
Manage sales and promotional events
Discuss reporting and its importance, including:
The kinds of reports might be useful, such as weekly sales reports, sales by employee or customer, current inventory, shipping, etc.
How the visibility and execution of reports might be separated by role
Reference page in APA format (does not count toward the page requirement).
Note: Your paper must include citations and references (at least three, in addition to the textbook if used) to support your work.

Categories
Technology

“The readings attached challenge you to adopt a dramatically new perspective on

“The readings attached challenge you to adopt a dramatically new perspective on the human/technology relationship as a starting point for understanding conflict.”
– In a short paragraph or two – Is it necessary to adopt a perspective this theoretically removed in order to understand the concepts of security and conflict today? Why or why not?
– Your post should reflect that you have done the readings but not simply regurgitate the reading material.
***COURSE MATERIALS ARE ATTACHED TO THIS ORDER (4 ARTICLES/CHAPTERS). THIS IS A DISCUSSION POST SO PLEASE SPEAK IN FIRST PERSON NARRATIVE. PLEASE USE AS MANY SOURCES AS NEEDED IN MLA FORMAT***

Categories
Technology

Explain the properties of digital signatures, the difference between direct and arbitrated digital signatures.

Develop a 12-slide PowerPoint presentation that will explain the properties of digital signatures, the difference between direct and arbitrated digital signatures, explain a suppress replay attack, and advantages and disadvantages of using digital signatures.
Include diagrams and examples.
Add appropriate speaker notes to each slide.
Be sure to include a cover slide and reference slide in APA format in addition to the 12 main slides.

Categories
Technology

What steps would you take to address the matter and seek to secure and safeguard the organization?

Prior to beginning work on this activity, access the following resources:
Meltdown Attack: “Meltdown and Spectre Links to an external site..”
CSO: “Spectre and Meltdown Explained: What They Are, How They Work, What’s at Risk Links to an external site..”
TechRepublic: “Spectre and Meltdown Explained: A Comprehensive Guide for Professionals Links to an external site..”
Microsoft: “Understanding the Performance Impact of Spectre and Meltdown Mitigations on Windows Systems Links to an external site..”
The cybersecurity space is an ever-evolving field. As such, new vulnerabilities may emerge, and new protocols may be called upon at any time. The emergence of Meltdown and Spectre is a very good illustration and case study of this specific phenomenon in action. With their existence, it can change the risk profile of at-risk organizations and change the ways that organizations may need to address this specific vulnerability within an enterprise risk context.
Respond to the following scenario:
You learn that there has been an immediate and significant change in the threat level that affects your enterprise. You have received notification that a subsidiary organization has hundreds of systems that are likely to be susceptible to the Spectre and/or Meltdown vulnerabilities.
With this in mind, provide in detail how you would respond to this situation. What steps would you take to address the matter and seek to secure and safeguard the organization?
Submission instructions: Your initial post should be a minimum of 200 words.

Categories
Technology

Describe the organizational approach for reviewing and ranking risk within the organization.

Before beginning work on this activity, please review the Microsoft Security Update Guide FAQs Links to an external site..
https://www.microsoft.com/en-us/msrc/faqs-security-update-guide
As discussed, to effectively rank risks, we often include input from multiple stakeholders to ensure we get a clear picture of the risk picture regarding the enterprise. Depending on the specific risk items, we may need to work closely with network administrators, policymakers, or technical staff to make a clear determination of the veritable risk for certain areas, as well as the recommended steps required to address it.
Citing this, your task is to apply the consensus-building dynamic for risk ranking to a very common procedural workflow that you may be all too familiar with: Patch Tuesday.
Part 1:
Your task is to determine prioritization based on the provided data and facts about specific patches in relation to known vulnerabilities and security issues. As you more than likely know, Microsoft issues system patches on a regular cadence in an event often referred to as Patch Tuesday.
Using this as an example, discuss your organization’s approach to reviewing, assessing, and ranking risk efforts as it may apply to patching vulnerable Microsoft systems or applications after updates are released. Please use the following questions as a discussion guide:
Describe the organizational approach for reviewing and ranking risk within the organization.
How would this construct apply to the regular Patch Tuesday release?
Does routine Microsoft patching differ from other patching or vulnerability management activities in general?
Please describe the method of incorporating input from stakeholders into a risk prioritization plan.
Which key stakeholders, relevant third parties, or various departments are included as part of the process?
What specific role(s) do they play in assisting, advising, or supporting the risk ranking activities?
Discuss how you incorporate the input(s) from multiple parties into a risk prioritization plan.
Part 2:
Now assume that you become aware of an immediate release of security updates for critical vulnerabilities that are pertinent to your organization.
Would the expedited deployment differ from the Patch Tuesday process?
Would different stakeholders be involved in general?
Submission instructions: Your initial post should be a minimum of 250 words.

Categories
Technology

What are a few key characteristics that a CISO must have to succeed?

Connect and have a short conversation with one or two CISOs from a different industry. Remember that a CISO’s time is valuable, so please limit your questions to the following plus one or two other questions:
As a CISO, what have been one or two of the role’s most rewarding aspects? Any frustrating aspects?
What are a few key characteristics that a CISO must have to succeed?
Record your questions and their responses in your playbook. Then, based on their responses, describe in detail your perspective on the role of the CISO.
Entry should contain a minimum of 500 words.