ompliance and Ethics” Please respond to the following:
Just Click on Below Link To Download This Course:
https://bit.ly/2QhyW2o
CIS 527
Information Technology Risk Management STR
CIS 527 Full Course
Discussions STR
CIS 527 Week 1 Discussion STR
“Risk
Management” Please respond to the following:
- Assess the
level of risk to an organization that allows employees to use wearable
devices (i.e., Google Glass, Apple Watches, Pebble, etc.) to interact with
company network assets. Make sure that you directly address the level
(e.g. low, medium or high) and support your assessment with a real life
situation or scenario.
CIS 527 Week 2 Discussion STR
“Compliance
and Ethics” Please respond to the following:
- Read the
article on NPR titled “U.S. Threatened to Fine Yahoo $250K a Day if it
didn’t Release User Data” located at http://www.npr.org/blogs/thetwo-way/2014/09/11/347778189/u-s-threatened-to-fine-yahoo-250k-a-day-if-it-didnt-release-user-data. Then, debate the ethical conflicts
that can arise with compliance. Defend one side of the argument.
I’m adding an
alternative question to this week’s discussion thread. You can address this one
instead of or in addition to the Yahoo case. Amazon’s Echo has been in the news
recently. Read the article on NPR “As We Leave More Digital Tracks, Amazon Echo
Factors in Murder Investigation” located at Echo. Then
debate the ethical conflicts that can arise with compliance in this or similar
cases. Choose a side, as if you were the lead attorney for that side and
defend your chosen side (even if your chosen side isn’t how you totally feel is
the correct response about the issue).
CIS 527 Week 3 Discussion STR
“Protected
Assets” Please respond to the following:
- Determine
the top five (5) IT assets to include in a risk assessment for a typical
manufacturing facility. Justify your selection. The emphasis here is on IT
assets not general company assets.
CIS 527 Week 4 Discussion STR
“Identifying
and Analyzing Vulnerabilities” Please respond to the following:
- Assess the
effectiveness of offering a reward to individuals external to the
organization in exchange for them to identify vulnerabilities on a new
technology.
CIS 527 Week 5 Discussion STR
“Risk
Mitigation Security Controls” Please respond to the following:
- Read the
subsections of the risk mitigation security control of the Federal
Financial Institution Examination Council (FFIEC) located at http://ithandbook.ffiec.gov/it-booklets/operations/risk-mitigation-and-control-implementation.aspx. Next, infer on the five (5) controls
likely to be found in small community financial institutions such as
credit unions. Justify your choices
CIS 527 Week 6 Discussion STR
“Risk
Mitigation Plans in Multinational Organizations” Please respond to
the following:
- Review the
locations of Google data centers presented on the following Website http://www.google.com/about/datacenters/inside/locations/. Then research at least two (2)
domestic and three (3) international locations and predict five (5) risks
that Google must include in their risk mitigation plans that are different
depending on the geographical location of the data centers.
CIS 527 Week 7 Discussion STR
“Business
Continuity Plan” Please respond to the following:
- Click hereto read the Business Continuity Plan for
MIT. Then, recommend two (2) additional components to improve the plan.
Justify your recommendations.
CIS 527 Week 8 Discussion STR
“Disaster
Recovery Plan” Please respond to the following:
- Click hereto read the Disaster Recovery Plan
(DRP). Next, explain its relationship to MIT’s BCP from the previous
week’s discussion (Click here). Then, based on the established relationship,
assess whether or not there is anything missing from the DRP. Provide a
rationale for your response.
CIS 527 Week 9 Discussion STR
“Security
Breach Response” Please respond to the following:
- Read The
Wall Street Journal’s article titled “Target Warned of Vulnerabilities
Before Data Breach” located at http://online.wsj.com/articles/SB10001424052702304703804579381520736715690. Then, read Target’s response at https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ. Critique Target’s response to the
security breach in the context of ethics, regulations, and best
practices. If you can’t get the WSJ article an alternative is located
here –
http://www.usatoday.com/story/money/business/2014/02/14/target-warned-breach/5494911/.
CIS 527 Week 10 Discussion STR
“Business
Impact Assessment Priorities” Please respond to the following:
- Recommend
one (1) consideration that in your opinion should always be considered top
priority when performing a business impact analysis. Support your
recommendation.
CIS 527 Week 11 Discussion STR
“Course
Conclusion” Please respond to the following:
- You have
just completed ten (10) weeks of an introduction to networking course.
Imagine you have been asked to create a one-day training course that
highlights the important elements of what you have just learned within the
past ten (10) weeks.
Create
a hierarchy of no more or no less than five (5) of the most important topics
that you believe that a one-day course entitled “IT Risk management: The
Essentials Presented in One Day” should address. Provide a detailed rationale
for each of the five (5) topics
CIS 527 Full Course
Assignments STR
CIS 527 Week 1 uCertify Assessment 1 STR
Students,
please view the “Submit a Clickable Rubric Assignment” video in the Student
Center.
Instructors, training on how to grade is within the Instructor Center.
Instructors, training on how to grade is within the Instructor Center.
Week 1 uCertify Assessment 1: Pre-Assessment (15
items)
|
Week
Due
|
Title
|
|
1
|
uCertify Assessment 1:
Pre-Assessment (15 items)
Note: You are encouraged to
complete the Week 1 uCertify Assessment during the first week of class.
However, you may submit the completion of the Week 1 uCertify Assessment up
to the end of Week 2. This extension is designed to allow for any issues you
may have purchasing, registering for, and / or accessing required materials
during the first week of class.
|
Note: Students
are allotted 120 minutes to complete each uCertify Assessment.
For
help on utilizing uCertify, please review the walk-through video located in
your online course.
Grading of
uCertify assessments is based on student participation and is not scored on the
objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading
details.
uCertify
Setup Requirements
- uCertify Assessments
·
- You must
use the preset test options
for the graded submission of the pre-assessment, quizzes, and
post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).
uCertify
Submission Requirements
- Complete the assessment; your results
will be displayed.
- Select “Share your result” from the
results page menu items.
- Copy the URL and paste it into the
assignment submission area in the Blackboard online course .
- Summarize, in two to three (2-3) sentences,
both your strengths and weaknesses with respect to the topics you covered
in the assessment. Note: The
written summary may be submitted in the assignment submission area along
with the results URL, or it may be submitted as a separate attachment.
- Once you
have successfully pasted the results URL and included the assessment
summary, you may submit your assignment for grading. Note: Failure to submit the results URL
into the assignment submission area within the Blackboard online shell
will result in 0 points for the assignment. Evidence of purposely skipped
answers, incomplete answers, or limited effort is at the instructor’s
discretion and may result in partial or incomplete credit for the
assignment.
CIS 527 Week 2 Assignment STR
Assignment 1:
Risk Management
It is an
accepted truth that without risk there can be no gain. Every individual and
organization who wants to succeed must take some risks. Risk management is not
about not taking risks, but
about taking risks in a controlled environment for which one must understand
the risks their triggers and their consequences.
Write
a four to five (4-5) page paper in which you:
- Contrast risk, threat, and
vulnerability.
- Explain the relationship between risk
and loss.
- Describe risk management and assess its
level of importance in information security.
- Argue the need for organizations to take
risks with its data (e.g., Is it a risky practice to store customer
information for repeat visits.)
- Describe the necessary components in any
organizational risk management plan.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your professor for
any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Explain the basic concepts and need for
risk management.
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 4 Assignment STR
Assignment 2:
Assets and Risk Management
In
order to successfully manage risk, one must understand risk itself and the
assets at risks. The way one goes about managing risk will depend on what needs
to be protected, and from what to protect it.
Write
a three to four (3-4) page paper in which you:
- Explain at least two (2) different risk
assessment methodologies.
- Describe the key approaches to
identifying threats relevant to a particular organization.
- Describe different types of assets that
need protection.
- Explain the relationship between access
and risk, and identify the tradeoffs of restricting access to the
organization’s assets.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 6 Assignment STR
Assignment 3:
Threat, Vulnerability, and Exploits Assessment Practices
There are
multiple ways to bring threats and vulnerabilities to light. Common practices
and lessons learned can help us explore for known or common threats, but how
does an organization with a unique or highly unusual setup discover its
vulnerabilities? Many organizations turn to ethical hackers.
Write a four to five (4-5) page paper in which you:
Write a four to five (4-5) page paper in which you:
- Describe common tools and techniques for
identifying and analyzing threats and vulnerabilities.
- Critique the practice of offering
rewards for discovering vulnerabilities.
- Explain the risks of challenging
individuals to exploit vulnerabilities in your systems.
- Give your opinion on the formation of
ethical hackers.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Describe techniques for identifying
relevant threats, vulnerabilities, and exploits.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 8 Assignment STR
Assignment 4:
Business Continuity Plan
The
phrase “the show must go on” is perhaps more true in business than in
performing arts. Organizations need to be prepared to run continuously
regardless of environmental conditions.
For
this assessment, imagine that you are the IT manager for the only print shop in
a small town in Idaho. The shop is connected to the internet by satellite link.
Orders are received via the internet as well as by walk-ins with portable
storage drives or smart phones that can transfer files via Bluetooth network.
Write
a four to five (4-5) business continuity plan (BCP) in which you:
- Identify the organization’s exposure to
internal and external threats.
- Identify ways that the organization can
maintain its risk.
- Describe the foreseen security risks.
- Assess the importance of training the
shop personnel on security risks.
- Recommend at least two (2) strategies
for continually improving the quality and effectiveness of the BCP.
- Analyze the
organizational risks inherent in the execution of the BCP plan.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Perform a business impact analysis for a
provided scenario.
- Create a business continuity plan (BCP)
based on the findings of a given risk assessment for an organization.
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 9 Assignment STR
Assignment 5:
Disaster Recovery Plan
This
assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a
written DRP analysis. You must submit both sections as
separate files for the completion of this assignment. Label
each file name according to the section of the assignment it is written for.
Additionally, you may create and /or assume all necessary assumptions needed
for the completion of this assignment.
Acme National
Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY,
Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has
workstations or terminals that are connected to a central data center located
in Chicago, IL. Each branch also has local servers and desktop computers that
are not connected to the central data center.
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:
- Malfunctioning software
- Workstations and servers malfunctions
- Failed hard drives
- Large-scale natural disasters such as
hurricanes and earthquakes
- Office fires
- Computer virus outbreaks
- Power outages caused by winter storm
- Terrorist
attacks
Section 1:
Disaster Recovery Plan
- Download the
DRP template CIS527_A5_W9_ANBA-DRP.docx. Modify the template to create a
Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate
information for the areas outlined in the DRP template.
Section 2:
Disaster Recovery Plan Analysis
2.
Write a five to seven (5-7) page paper in which you:
- Describe the main objectives of the ANBA
DRP.
- Explain the key ways that ANBA’s DRP can
help mitigate risk in the organization.
- Defend the need for DRPs in an
enterprise organization such as ANBA.
- Infer on the difference between the
elements of DRP between different branches of a multinational
organization.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Create a disaster recovery plan (DRP)
based on the findings of a given risk assessment for an organization.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 10 Term Paper STR
Students,
please view the “Submit a Clickable Rubric Assignment” video in the Student
Center.
Instructors, training on how to grade is within the Instructor Center.
Instructors, training on how to grade is within the Instructor Center.
Term Paper:
Managing Organizational Risk
No longer
than a decade ago, IT security professionals had to work hard to persuade
organizational leaders about the importance of developing effective risk
management plans. Nowadays, due to the plethora of cautionary tales that
organizations history provide, business leaders are informed on the need to
manage risk and understand the crucial role of an organization’s IT
infrastructure on its ability to perform business.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.
Write
an eight to ten (8-10) page paper in which you:
- Describe the objectives and main
elements of a CIRT plan.
- Analyze the manner in which a CIRT plan
fits into the overall risk management approach of an organization and how
it supports other risk management plans.
- Provide at least two (2) examples of how
CIRT plans define the who, what, when, where, and why of the response effort.
- Analyze the manner in which the
development of a CIRT plan enables management to adopt a more proactive
approach to risk management. Include recommendations for remaining
proactive in the continual improvement and update of CIRT plans.
- Infer on the evolution of threats over
the last decade that organizations must now consider.
- Predict the evolution of regulatory
requirements mandating risk management processes and plans.
- Use at least
three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Create a Computer Incident Response Team
(CIRT) plan for an organization in a given scenario.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions
CIS 527 Week 11 uCertify Assessment 2
Students, please view the “Submit a Clickable
Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Week 11
uCertify Assessment 2: Post-Assessment (150 items)
|
Week
Due
|
Title
|
|
11
|
uCertify Assessment 2:
Post-Assessment (150 items)
|
Note: Students
are allotted 120 minutes to complete each uCertify Assessment.
For
help on utilizing uCertify, please review the walk-through video located in
your online course.
Grading of
uCertify assessments is based on student participation and is not scored on the
objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading
details.
uCertify
Setup Requirements
- uCertify Assessments
·
- You must
use the preset test options
for the graded submission of the pre-assessment, quizzes, and
post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).
uCertify
Submission Requirements
- Complete the assessment; your results
will be displayed.
- Select “Share your result” from the
results page menu items.
- Copy the URL and paste it into the
assignment submission area in the Blackboard online course .
- Summarize, in two to three (2-3)
sentences, both your strengths and weaknesses with respect to the topics
you covered in the assessment. Note: The
written summary may be submitted in the assignment submission area along
with the results URL, or it may be submitted as a separate attachment.
- Once you
have successfully pasted the results URL and included the assessment
summary, you may submit your assignment for grading. Note: Failure to submit the results URL
into the assignment submission area within the Blackboard online shell
will result in 0 points for the assignment. Evidence of purposely skipped
answers, incomplete answers, or limited effort is at the instructor’s
discretion and may result in partial or incomplete credit for the
assignment.


Comments
Post a Comment