Students, please view the “Submit a Clickable Rubric Assignment
Just
Click on Below Link To Download This Course:
https://bit.ly/2rrcHrW
CIS 527
Full Course Assignments STR
CIS 527 Week 1 uCertify
Assessment 1 STR
Students,
please view the “Submit a Clickable Rubric Assignment” video in the Student
Center.
Instructors, training on how to grade is within the Instructor Center.
Instructors, training on how to grade is within the Instructor Center.
Week 1 uCertify Assessment 1: Pre-Assessment (15
items)
Week
Due
|
Title
|
1
|
uCertify Assessment 1:
Pre-Assessment (15 items)
Note: You are encouraged to
complete the Week 1 uCertify Assessment during the first week of class.
However, you may submit the completion of the Week 1 uCertify Assessment up
to the end of Week 2. This extension is designed to allow for any issues you
may have purchasing, registering for, and / or accessing required materials
during the first week of class.
|
Note: Students
are allotted 120 minutes to complete each uCertify Assessment.
For
help on utilizing uCertify, please review the walk-through video located in
your online course.
Grading of
uCertify assessments is based on student participation and is not scored on the
objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading
details.
uCertify
Setup Requirements
- uCertify Assessments
·
- You must
use the preset test options
for the graded submission of the pre-assessment, quizzes, and
post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).
uCertify
Submission Requirements
- Complete the assessment; your results
will be displayed.
- Select “Share your result” from the
results page menu items.
- Copy the URL and paste it into the
assignment submission area in the Blackboard online course .
- Summarize, in two to three (2-3)
sentences, both your strengths and weaknesses with respect to the topics
you covered in the assessment. Note: The
written summary may be submitted in the assignment submission area along
with the results URL, or it may be submitted as a separate attachment.
- Once you
have successfully pasted the results URL and included the assessment
summary, you may submit your assignment for grading. Note: Failure to submit the results URL
into the assignment submission area within the Blackboard online shell
will result in 0 points for the assignment. Evidence of purposely skipped
answers, incomplete answers, or limited effort is at the instructor’s
discretion and may result in partial or incomplete credit for the
assignment.
CIS 527 Week 2 Assignment
STR
Assignment 1:
Risk Management
It is an
accepted truth that without risk there can be no gain. Every individual and
organization who wants to succeed must take some risks. Risk management is not
about not taking risks, but
about taking risks in a controlled environment for which one must understand
the risks their triggers and their consequences.
Write
a four to five (4-5) page paper in which you:
- Contrast risk, threat, and
vulnerability.
- Explain the relationship between risk
and loss.
- Describe risk management and assess its
level of importance in information security.
- Argue the need for organizations to take
risks with its data (e.g., Is it a risky practice to store customer
information for repeat visits.)
- Describe the necessary components in any
organizational risk management plan.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Explain the basic concepts and need for
risk management.
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 4 Assignment
STR
Assignment 2:
Assets and Risk Management
In
order to successfully manage risk, one must understand risk itself and the
assets at risks. The way one goes about managing risk will depend on what needs
to be protected, and from what to protect it.
Write
a three to four (3-4) page paper in which you:
- Explain at least two (2) different risk
assessment methodologies.
- Describe the key approaches to
identifying threats relevant to a particular organization.
- Describe different types of assets that
need protection.
- Explain the relationship between access
and risk, and identify the tradeoffs of restricting access to the
organization’s assets.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 6 Assignment
STR
Assignment 3:
Threat, Vulnerability, and Exploits Assessment Practices
There are
multiple ways to bring threats and vulnerabilities to light. Common practices
and lessons learned can help us explore for known or common threats, but how
does an organization with a unique or highly unusual setup discover its
vulnerabilities? Many organizations turn to ethical hackers.
Write a four to five (4-5) page paper in which you:
Write a four to five (4-5) page paper in which you:
- Describe common tools and techniques for
identifying and analyzing threats and vulnerabilities.
- Critique the practice of offering
rewards for discovering vulnerabilities.
- Explain the risks of challenging
individuals to exploit vulnerabilities in your systems.
- Give your opinion on the formation of ethical
hackers.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Describe techniques for identifying
relevant threats, vulnerabilities, and exploits.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 8 Assignment
STR
Assignment 4:
Business Continuity Plan
The
phrase “the show must go on” is perhaps more true in business than in
performing arts. Organizations need to be prepared to run continuously
regardless of environmental conditions.
For
this assessment, imagine that you are the IT manager for the only print shop in
a small town in Idaho. The shop is connected to the internet by satellite link.
Orders are received via the internet as well as by walk-ins with portable
storage drives or smart phones that can transfer files via Bluetooth network.
Write
a four to five (4-5) business continuity plan (BCP) in which you:
- Identify the organization’s exposure to
internal and external threats.
- Identify ways that the organization can
maintain its risk.
- Describe the foreseen security risks.
- Assess the importance of training the
shop personnel on security risks.
- Recommend at least two (2) strategies
for continually improving the quality and effectiveness of the BCP.
- Analyze the
organizational risks inherent in the execution of the BCP plan.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Perform a business impact analysis for a
provided scenario.
- Create a business continuity plan (BCP)
based on the findings of a given risk assessment for an organization.
- Describe the components of an effective
organizational risk management program.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 9 Assignment
STR
Assignment 5:
Disaster Recovery Plan
This
assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a
written DRP analysis. You must submit both sections as
separate files for the completion of this assignment. Label
each file name according to the section of the assignment it is written for.
Additionally, you may create and /or assume all necessary assumptions needed
for the completion of this assignment.
Acme National
Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY,
Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has
workstations or terminals that are connected to a central data center located
in Chicago, IL. Each branch also has local servers and desktop computers that
are not connected to the central data center.
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:
- Malfunctioning software
- Workstations and servers malfunctions
- Failed hard drives
- Large-scale natural disasters such as hurricanes
and earthquakes
- Office fires
- Computer virus outbreaks
- Power outages caused by winter storm
- Terrorist
attacks
Section 1:
Disaster Recovery Plan
- Download the
DRP template CIS527_A5_W9_ANBA-DRP.docx. Modify the template to create a
Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate
information for the areas outlined in the DRP template.
Section 2:
Disaster Recovery Plan Analysis
2.
Write a five to seven (5-7) page paper in which you:
- Describe the main objectives of the ANBA
DRP.
- Explain the key ways that ANBA’s DRP can
help mitigate risk in the organization.
- Defend the need for DRPs in an
enterprise organization such as ANBA.
- Infer on the difference between the
elements of DRP between different branches of a multinational
organization.
- Use at least
two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Create a disaster recovery plan (DRP)
based on the findings of a given risk assessment for an organization.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions.
CIS 527 Week 10 Term Paper
STR
Students,
please view the “Submit a Clickable Rubric Assignment” video in the Student
Center.
Instructors, training on how to grade is within the Instructor Center.
Instructors, training on how to grade is within the Instructor Center.
Term Paper:
Managing Organizational Risk
No longer
than a decade ago, IT security professionals had to work hard to persuade
organizational leaders about the importance of developing effective risk management
plans. Nowadays, due to the plethora of cautionary tales that organizations
history provide, business leaders are informed on the need to manage risk and
understand the crucial role of an organization’s IT infrastructure on its
ability to perform business.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.
Write
an eight to ten (8-10) page paper in which you:
- Describe the objectives and main
elements of a CIRT plan.
- Analyze the manner in which a CIRT plan
fits into the overall risk management approach of an organization and how
it supports other risk management plans.
- Provide at least two (2) examples of how
CIRT plans define the who, what, when, where, and why of the response
effort.
- Analyze the manner in which the
development of a CIRT plan enables management to adopt a more proactive
approach to risk management. Include recommendations for remaining
proactive in the continual improvement and update of CIRT plans.
- Infer on the evolution of threats over
the last decade that organizations must now consider.
- Predict the evolution of regulatory
requirements mandating risk management processes and plans.
- Use at least
three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do
not qualify as quality resources.
Your
assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New
Roman font (size 12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check with your
professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
The
specific course learning outcomes associated with this assignment are:
- Create a Computer Incident Response Team
(CIRT) plan for an organization in a given scenario.
- Use technology and information resources
to research issues in IT risk management.
- Write
clearly and concisely about topics related to IT risk management using
proper writing mechanics and technical style conventions
CIS 527 Week 11 uCertify
Assessment 2 STR
Students, please view the “Submit a Clickable
Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Week 11
uCertify Assessment 2: Post-Assessment (150 items)
Week
Due
|
Title
|
11
|
uCertify Assessment 2:
Post-Assessment (150 items)
|
Note: Students
are allotted 120 minutes to complete each uCertify Assessment.
For
help on utilizing uCertify, please review the walk-through video located in
your online course.
Grading of
uCertify assessments is based on student participation and is not scored on the
objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading
details.
uCertify
Setup Requirements
- uCertify Assessments
·
- You must
use the preset test options
for the graded submission of the pre-assessment, quizzes, and
post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).
uCertify
Submission Requirements
- Complete the assessment; your results
will be displayed.
- Select “Share your result” from the
results page menu items.
- Copy the URL and paste it into the
assignment submission area in the Blackboard online course .
- Summarize, in two to three (2-3)
sentences, both your strengths and weaknesses with respect to the topics
you covered in the assessment. Note: The
written summary may be submitted in the assignment submission area along
with the results URL, or it may be submitted as a separate attachment.
- Once you
have successfully pasted the results URL and included the assessment
summary, you may submit your assignment for grading. Note: Failure to submit the results URL
into the assignment submission area within the Blackboard online shell
will result in 0 points for the assignment. Evidence of purposely skipped
answers, incomplete answers, or limited effort is at the instructor’s
discretion and may result in partial or incomplete credit for the
assignment.
Comments
Post a Comment