NEED DISCUSSION IN 10 HOURS

What is the difference between relational and spatial data?

What special properties do spatial data have that require specialized techniques for spatial data analysis and modeling? 

Are you using spatial data for anything now?

What are some of the special techniques used for spatial data? 

PLEASE EXPLAIN WHY YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS? (A MINIMUM OF 125 WORDS)

                                             CLASSMATE’S POST

In a relational database the data is stored and tabulated in an organized format of a series of data columns and rows, with the columns (attributes) containing well-defined field data, while the rows (tuples) contain the individual records.  The relational aspects of these databases are contained within the attributes, and each record has a unique attribute called a primary key, which distinguishes that record from the others (Galati, 2006). 

Spatial is the term which refers to anything which is located within a space which has physical and measurable dimensions, and spatial analysis is a type of geographical analysis of these items using mathematics and geometry.  Spatial data, also known as geospatial data, is the information about the physical object represented by numerical value in geographic information systems (GIS).  GIS systems are designed to system designed to acquire, record, store, analyze, manage and manipulate spatial or geographic data (Galati, 2006). 

Although this sounds similar to a relational database, because of the characteristics of the spatial type of data, a programmer or developer can query the database based on location rather than straight numbers or text.  An example of the differences between the two systems:

In relational databases, data of different types (numeric, text, and images) is stored, and when needed, the program queries (fetches) the data to answer a question, such as “How many people made purchases in the store on Friday?” In a GIS spatial database, the questions would be along the lines of “Where is the closest store?” or “Is the store located within the city of Miami?” with the answers showing geographical elements. The features of spatial data allow the programs and databases to be more robust and dynamic (Tjukanov, 2018). 

There are numerous uses for spatial data and GIS, with benefits including allowing law enforcement agencies to do crime mapping of individual neighborhoods, allowing fire department personnel to map areas of concern for wildfires, and allowing first responders to determine the fastest routes for quicker response times.  Spatial data allows meteorologists to track bad weather storms and to determine which areas could receive the heaviest damage from flooding or wind, and allows scientists to track the movements of people, animals, insects and reptiles.  Spatial data allows governmental officials to perform different functions in municipalities, from determining water and sewer infrastructure needs to resolving which areas or communities require different resources (Galati, 2006).    

                                                       References

Lance, M. (2016). “Commercial Spatial Database Management Systems include IBM DB2’s Spatial Extender [42], Oracle’s Spatial and Oracle Locator [66], and Microsoft’s SQL Server 2008 [58]”. An Efficient Query System for High-dimensional Spatio-temporal Data, 23-31.

Scott, A. (2015). “Relational Databases 101: Looking at the Whole Picture”. 16-19. Retrieved August 19, 2018

week 9 case study

 

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 6: VoIP Part 4 (Risk Register)
Due Week 9 and worth 100 points

Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified. 

 

 

#

Risk

Likelihood (1-5)

Impact
(1-5)

Response Type

Response

1

Project Delayed due to lack of resources

3

5

 

 

2

Project runs out of funds before completion

1

5

 

 

3

Users reject new system

2

2

 

 

4

Defective Hardware

1

5

 

 

5

New government regulations introduced during deployment increase the cost of running VoIP

2

3

 

 

6

Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system

1

4

Mitigation

Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized. 

Write a three to five (3-5) page paper in which you:

  1. Explain risk management and its associated activities and defend the need for a risk management plan.
  2. Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.
  3. Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
  4. Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.
  5. Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one (1) engineer – 80%; With both engineers – 98%.
  6. Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.
  7. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include the decision tree created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Examine the human resource factors that can impact project management.
  • Summarize how the PMBOK® process groups and knowledge areas are involved throughout the project life cycle.
  • Compare and contrast the sources and mitigating factors of project risk.
  • Use project management and graphic software to plan and manage a project throughout the project life cycle.
  • Use technology and information resources to research issues in IT project management.
  • Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions

Discussion- 1 Chepter- 1

 

Chapter 1 

provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

You must do the following:

1) Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

To guide your discussions, please consider the following questions:

  • What did you learn from your classmate’s posting? 
  • What additional questions do you have after reading the posting? 
  • What clarification do you need regarding the posting? 
  • What differences or similarities do you see between your posting and other classmates’ postings?

Week 1 discussion (Chapter 1) 

Due date is 05/10/2019 on Friday

3-1 man

Reply to the students response to the question in 150 words and provide 1 reference

 question

 

  • What is your company’s Inventory Carrying Cost rate? (Ask your Director of Logistics or the CFO.  If that’s not possible, provide an estimation using all 4 categories presented in class.)  Do you think it’s an accurate computation, a good estimate or a not-even-close estimate?  Recommend one action that should be taken to improve the accuracy of this number.

Students response

Inventory carrying cost is a controversial topic as it is necessary for the supply chain to determine its cost of keeping an inventory. I am part of SK Hynix on the analytics side but since I have cross functional teams located in the Logistics side, I was able to obtain ours. Based on last year’s date, our inventory carrying cost rate was 24%. Hynix is the world’s second-largest memory chipmaker and the world’s 3rd-largest semiconductor company so it’s common to us to maintain a large number of inventories to keep up with the large demand. We basically need to have a good strategy as well in order for us to avoid seeing our costs surge. We have seen on the discussions in our book that U.S. inventory carrying costs since 2010 consistently have been between 19% and 20%. Fair enough, I can consider that our company is doing its objective to maintain our percentage in a healthy level.

As to its accuracy, I can say that these are close to estimate since our products are always moving. We have dead stocks, but these are part of obsolescence risks every company suffers. One action that I will recommend to improve the accuracy of your numbers is to maintain an updated carrying cost monitoring. Fixed costs such as rent can be reflected over a long period of time but your variable costs such as warehouse staff salaries, utilities, insurance of inventory and damages or expiration occurrence should always be tracked so you can get the right percentage accurately.

Reference:

Murphy Jr., P. Knemeyer, M. ” Contemporary Logistics, Twelfth Edition ” Chapter 8. (2018) p. 346

week 2 case 1

 

If you are using the Blackboard Mobile Learn IOS App, please click “View in Browser.”

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.

Assignment 1: Error Handling in an Activity Diagram
Due Week 2 and worth 150 points

Refer to the activity diagram Figure 2-15 on page 59 of the textbook. The diagram omits several error-handling pathways.

Write a two to three (2-3) page paper in which you:

  1. Using Microsoft Visio or an open source alternative such as Dia, update the diagram to include two (2) error-handling pathways. Note: The graphically depicted solution is not included within the required page length.
  2. Produce a narrative which describes the added error-handling pathways that includes:
    1. an overview of the errors being checked
    2. an explanation of the main reasons why checking for such errors is important
    3. an overview of other possible errors
  3. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Analyze techniques for requirements determination, collection, and organization.
  • Use technology and information resources to research issues in systems analysis and design.
  • Write clearly and concisely about advanced systems analysis and design topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

IS216 DISCUSS

  ***DUE IN 4 HRS***

Please answer each question in AT LEAST 75 words. 

1. Describe the difference between a NAS and a SAN and give examples where each are best suited in business.

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

2. Describe the evolution from IPv4 to IPv6. Why was it necessary to begin the move from IPv4 to IPv6?

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

3. Describe the process for Network Address translation. Why was this concept created and what are the main uses?

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

4. Describe the components of an ICS and a SCADA system. Provide examples of how each are configured and used in the industry.

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

5. Describe a WAN. How does it differ from a LAN and what are the major benefits and downfalls of a WAN?

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

6. Describe the difference between IPS and IDS.

Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

7. Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

The Clinton Server/Email/Blackberry Scandal

ISOL 633 – Legal Regulations, Investigations and Compliance

HOMEWORK II – The Clinton Server/Email/Blackberry Scandal

Summer Main – 2016

Over the past year, a scandal has erupted over Former Secretary of State, Hillary Clinton’s

use of a private server during her tenure as Secretary of State which she had set up in her home,

and which she used exclusively to carry out U.S. State Department business, as well as her use of

a personal blackberry rather than a government issued communication device. The implications

of this related to cybersecurity is enormous. On the following pages are excerpts from the New

York Times and from Wikipedia related to this scandal.

You, in your capacity as cybersecurity professionals, may someday find yourself in an

employment position or as a consultant with the Federal government. It is imperative that you have

an overview of federal laws related to what U.S. government employees and officials may and

may not do as it relates to electronic communications, the need to protect electronic

communications, and to safeguard them from cyber threats.

A complete investigation and analysis of the Hillary Clinton email/personal server scandal

is an excellent learning experience for you. To that end please do the following:

1. Research completely the facts related to the Hillary Clinton home server/email/blackberry

scandal and give a thorough chronology of the facts as you understand them to be.

2. Explain how, if at all, Secretary of State, Clinton’s use of a home server/emails and

personal blackberry created potential cybersecurity threats. Include evidence of potential

breaches that you discovered through your research.

3. Outline the investigation(s) that have resulted from Secretary of State, Clinton’s, conduct

as it relates to her use of a personal server and blackberry.

4. Discuss to the best of your ability State Department protocol and procedures that Secretary

of State, Clinton, is believed to have violated, if any.

5. List and discuss to the best of your ability Federal laws and regulations that Secretary of

State, Clinton, is believed to have broken. For each, discuss the penalty for such violations.

6. Discuss the defenses that Secretary of State, Clinton, her supporters and legal staff have

raised in response to allegations that Secretary of State, Clinton, violated State Department

protocol and procedures and that she broke a number of federal laws.

7. Discuss how, in your opinion, the conduct of Secretary of State, Clinton, will (if at all)

impact the future of cybersecurity and cybersecurity laws in the United States.

8. Based upon the research you have conducted this semester related to Secretary of State,

Clinton’s conduct, and the laws you have researched, state your position as to whether you

believe that Secretary of State, Clinton, broke the law, and if so, which law(s), how she

broke them, and whether she should be prosecuted.

This assignment is due on August 19, 2016 at 11:30 p.m. NOTE THIS IS DIFFERENT FROM

THE SYLLABUS WHICH STATED THE ASSIGNMENT WAS DUE ON AUGUST 21,

2016. THE ASSIGNMENT IS DUE ON AUGUST 19, 2016 AS STATED IN CLASS AND

NOT ON AUGUST 21.

It is not necessary that you use any particular model formatting. However, your paper should be

submitted in a WORD format, using no less than a 1 inch margin, top, bottom, left and right.

Further the paper should be double spaced, and you should use subheadings where appropriate.

Cite all sources. You decide whether you will use endnotes or footnotes. Please include your name

and student id on your submission. You should plan to give your submission a title. Please

include page number on the bottom center of each page.

BELOW ARE DIRECT EXCERPTS FROM: New York Times; What We Know About Hillary Clinton’s

Private Email Server; by Alica Parlapiano, May 27, 2016;

http://www.nytimes.com/interactive/2016/05/27/us/politics/what-we-know-about-hillary-clintons-
private-email-server.html?_r=0

What Happened While Clinton

Was Secretary of State

January 2009

Mrs. Clinton becomes secretary of state and begins using hdr22@clintonmail.com, an

email account housed on a private server. At the time, the State Department’s policy

stated that “normal day-to-day operations” were to be conducted on an authorized

October 2009

Federal record-keeping guidelines for the use of personal accounts are tightened,

requiring that any such records be preserved in federal systems.

September 2012

A United States diplomatic outpost and a C.I.A. facility in Benghazi, Libya, are

attacked. Four Americans are killed.

December 2012

The chairman of the House Oversight Committee asks Mrs. Clinton in a letter if she has

used a private email account. She does not reply. The State Department later responds,

without answering the question.

February 2013

Mrs. Clinton leaves office. Four months later, State Department staff members

reviewing the Benghazi attacks discover correspondence, for the first time, between

her private email account and the government accounts of her immediate staff.

An Investigation Into the

Benghazi Attacks Puts More

Focus on Clinton’s Emails

Hearings on Benghazi spur the House speaker, John A. Boehner, to create a special

select committee to investigate the attacks and how the government responded.

Officials begin negotiating with Mrs. Clinton’s representatives, including her former

chief of staff, Cheryl D. Mills, to obtain all of her emails. Ms. Mills says Mrs. Clinton will

turn them over, but cautions that it will take some time.

The State Department provides the select committee on Benghazi with 15,000 pages of

documents, including a handful of emails from Mrs. Clinton, all from her private

account. The committee asks for the rest of the emails.

Clinton Hands Over Emails, and

They Are Eventually Made Public

December 2014

After a formal request by the State Department, Mrs. Clinton hands over 55,000 printed

pages of more than 30,000 emails.

January 2015

During a hearing of the Benghazi committee, State Department officials are criticized

for not providing all documents related to the investigation. Two weeks later, they hand

over roughly 900 pages of emails.

February and March 2015

Before The New York Times publishes an article about Mrs. Clinton’s personal email

account, the State Department tells committee investigators that she relied on it

exclusively as secretary of state. Soon after, Mrs. Clinton announces that she has asked

the State Department to release emails from the 30,000 she handed over, and says that

she deleted another 32,000 personal messages.

Mrs. Clinton announces her candidacy for president.

The State Department begins releasing several thousand pages of her emails, many of

them partly redacted. The releases continue until the last of the roughly

30,000 messages are made public in February 2016.

As the Campaign Continues,

Classified Information Is Discovered

Government investigators say they found classified information in emails from Mrs.

Clinton’s server. The emails were not marked classified at the time, and it is unclear if

Mrs. Clinton knew that the information was classified. The investigators refer the matter

to the Justice Department and shortly thereafter the F.B.I. opens an investigation.

January 2016

The State Department announces that it will not release 22 emails that contain “top

secret” material. The classifications of the emails were increased after the fact; they

were not marked when they were sent. Three days later, the first presidential primary is

held in Iowa.

The State Department’s inspector general releases a report criticizing Mrs. Clinton’s use

of the private server, saying that she should have asked for approval and that

she violated department policies by not surrendering her emails before leaving office.

How Many Investigations and

Legal Proceedings Are Happening?

F.B.I. investigation

An investigation by the F.B.I., which is expected to interview Mrs. Clinton, will

determine whether any laws were broken in the handling of classified information. The

investigation could drag on past the Democratic National Convention this summer.

Judicial Watch lawsuit

A conservative legal advocacy group, Judicial Watch, has brought a lawsuit against the

State Department under the Freedom of Information Act for records relating to the

special employment status of Mrs. Clinton’s top aide at the department, Huma Abedin.

Depositions are scheduled through the end of June, with Mrs. Clinton’s former chief of

staff, Ms. Mills, scheduled to testify.

Congressional and agency reports

The select committee on Benghazi interviewed Mrs. Clinton in October, and the

investigation is still in progress. Separate inquiries by the Senate Homeland Security

Committee, the Senate Judiciary Committee and the Inspector General of the

Intelligence Community may also result in reports.

New York Times; What We Know About Hillary Clinton’s Private Email Server; by Alica Parlapiano, May

27, 2016; http://www.nytimes.com/interactive/2016/05/27/us/politics/what-we-know-about-hillary-
clintons-private-email-server.html?_r=0

According to the New York Times, 30,322 emails have been released. Of those, 2,028

emails have since been classified “confidential,” the lowest level of classification;

65 have been classified secret; 22 have been classified “top secret” information; 18

communications with President Obama, to be held until he is out of office, and it is unknown

how many missing emails, some discovered when they were handed over to investigators by

people she corresponded with.

THE EXCERPTS BELOW ARE TAKEN DIRECTLY FROM: Wikipedia;

https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy. June 10, 2016

The Hillary Clinton email controversy began in earnest in March 2015, when it became

publicly known that Hillary Clinton, during her tenure as United States Secretary of State, had

exclusively used her family’s private email server for official communications, rather than official

State Department email accounts maintained on federal servers. Those official communications

included thousands of emails that would later be marked classified by the State Department.

Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.

Debate continues as to the propriety and legality of various aspects of Secretary Clinton’s

arrangement. Some experts, officials, and members of Congress have contended that her use of

private messaging system software and a private server, violated State Department protocols and

procedures, as well as federal laws and regulations governing recordkeeping.

Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy, Hillary Clinton Email controversy.

Security experts such as Chris Soghoian believe that emails to and from Clinton may have

been at risk of hacking and foreign surveillance. Marc Maiffret, a cybersecurity expert, said that

the server had “amateur hour” vulnerabilities. For the first two months after Clinton was appointed

Secretary of State and began accessing mail on the server through her Blackberry, transmissions

to and from the server were apparently not encrypted. On March 29, 2009 a “digital certificate”

was obtained which would have permitted encryption.

Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.

Former Director of the Defense Intelligence Agency Michael T. Flynn, former United

States Secretary of Defense Robert Gates, and former deputy director of the Central Intelligence

Agency Michael Morell have said that it is likely that foreign governments were able to access the

information on Clinton’s server. Michael Hayden, former Director of the National Security

Agency, Principal Deputy Director of National Intelligence, and Director of the Central

Intelligence Agency said “I would lose all respect for a whole bunch of foreign intelligence

agencies if they weren’t sitting back, paging through the emails.”

Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email

controversy. June 10, 2016

Clinton’s server was configured to allow users to connect openly from the Internet and

control it remotely using Microsoft’s Remote Desktop Services. It is known that hackers in Russia

were aware of Clinton’s non-public email address as early as 2011. It is also known that Secretary

Clinton and her staff were aware of hacking attempts in 2011, and were worried about them.

Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.

In 2012, according to server records, a hacker in Serbia scanned Clinton’s Chappaqua

server at least twice, in August and in December 2012. It was unclear whether the hacker knew

the server belonged to Clinton, although it did identify itself as providing email services

for clintonemail.com. During 2014, Clinton’s server was the target of repeated intrusions

originating in Germany, China, and South Korea. Threat monitoring software on the server

blocked at least five such attempts. The software was installed in October 2013, and for three

months prior to that, no such software had been installed.

EXCERPTS TAKEN DIRECTLY FROM: WASHINGTON POST, MARCH 27, 2016;

https://www.washingtonpost.com/investigations/how-clintons-email-scandal-took-
root/2016/03/27/ee301168-e162-11e5-846c-10191d1fc4ec_story.html?tid=magnet

How Clinton’s email scandal took root

By Robert O’Harrow Jr. March 27

Hillary Clinton’s email problems began in her first days as secretary of state. She insisted on

using her personal BlackBerry for all her email communications, but she wasn’t allowed to take

the device into her seventh-floor suite of offices, a secure space known as Mahogany Row.

For Clinton, this was frustrating. As a political heavyweight and chief of the nation’s diplomatic

corps, she needed to manage a torrent of email to stay connected to colleagues, friends and

supporters. She hated having to put her BlackBerry into a lockbox before going into her own

Her aides and senior officials pushed to find a way to enable her to use the device in the secure

area. But their efforts unsettled the diplomatic security bureau, which was worried that foreign

intelligence services could hack her BlackBerry and transform it into a listening device.

On Feb. 17, 2009, less than a month into Clinton’s tenure, the issue came to a head. Department

security, intelligence and technology specialists, along with five officials from the National

Security Agency, gathered in a Mahogany Row conference room. They explained the risks to

Cheryl Mills, Clinton’s chief of staff, while also seeking “mitigation options” that would

accommodate Clinton’s wishes.

“The issue here is one of personal comfort,” one of the participants in that meeting, Donald Reid,

the department’s senior coordinator for security infrastructure, wrote afterward in an email that

described Clinton’s inner circle of advisers as “dedicated [BlackBerry] addicts.”

Clinton used her BlackBerry as the group continued looking for a solution. But unknown to

diplomatic security and technology officials at the department, there was another looming

communications vulnerability: Clinton’s BlackBerry was digitally tethered to a private email

server in the basement of her family home, some 260 miles to the north in Chappaqua, N.Y.,

documents and interviews show.

Those officials took no steps to protect the server against intruders and spies, because they

apparently were not told about it.

Security Regulation Compliance

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.
 
In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance.  Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.
 
Section 1: Written Paper
1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.
c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.
d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
 
Your written paper must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
Section 2: PowerPoint Presentation
2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency’s employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:
  • Include a title slide, six to eight (6-8) main body slides, and a conclusion slide. 
The specific course learning outcomes associated with this assignment are:
  • Explain the concept of privacy and its legal protections. 
  • Describe legal compliance laws addressing public and private institutions. 
  • Analyze intellectual property laws.
  • Examine the principles requiring governance of information within organizations.
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

dq 4-2 michael

 

reply to the students’ response and not the question  in 150 words minimum and provide 1 reference. Respond to the students response as though you are talking to them, use name 

question

 What do you plan to do with your hard-won degree? Set a SMART goal for yourself and then comment on a classmate’s. Add research but doesn’t have to be from a journal. 

students response

 

This is a question that I have been throwing around for many years, asking myself what do I want to do when I grow up. As I have made this journey through my bachelor’s and halfway to my masters, I have looked at many different directions to pursue. After I graduate with my masters, I still have to play this game in the Navy for a couple of more years before I can grow up and get a real job. After researching the smart goals, I have learned that it is an excellent approach that brings the focus, clarity, and motivation that people can often neglect when goal-setting (Cechova, 2019).  Right now, at this point in my career, I have been a leader, trainer, and mentor.

That being said, my goal right now utilizing the smart concept is first retiring from the Navy in two and half years then:

Specific: Working in a corporate company in the HR training and development department. One of my greatest rewards is being able to train and educate people; nothing is better than when they grasp a concept, and you see that light spark and turn on inside of them.

Measurable: When I get a job post-military, this is the direction that I will be heading in, so when I get the job in two and a half years, I will have accomplished this step.

Attainable: This is a very obtainable goal every company needs trainers, as we have learned in this class a successful company and employee never stop trying to learn and grow. When I retire from the Navy, I will have been leading, guiding, and training sailors for the last 22 years. I have been in many leadership roles, done a tour as a teacher teaching hundreds of sailors. I think I am pretty confident to say that I am qualified to teach.

Result-committed: The goals and that dreams that I have in mind are very obtainable, I live by the ideals and philosophy that no-one will outwork me, out hustle me, do more than me or work harder than me. There are 24 hours in a day right now I utilize 20 of them between work, family, and school. I will do whatever it takes and work harder and longer than anyone else to accomplish my goals.  

Time Target: I have two and a half years to retire, and I will have a job in the HR field within six months of retiring or before I retire because failure is not an option for me I will not let myself fail. 

Respectfully, 

Michael

Reference

Cechova, D. (2019). What is the purpose of SMART goals? Retrieved from People goal: https://www.peoplegoal.com/blog/what-is-the-purpose-of-smart-goals

A++ WORK

DISCUSSION BOARD DUE WEDNESDAY

Effective Techniques for Making Decisions

Having read Chapter 5 on decision making, learning, creativity, and entrepreneurship, you are now familiar with some of the techniques and tools that managers use for making good decisions or having good decisions in place. You should have a clear understanding of the difference between programmed and non-programmed decisions.

Post by WEDNESDAY a 150 – to 300- word statement in the Discussion thread that answers both of the following questions:

  • What techniques or tools can managers use to improve programmed and non-programmed decisions?
  • Why are these techniques effective?
  • Which techniques or tools would you use as a manager and why?

Support your work with specific citations from the Learning Resources. You are allowed to draw from additional sources to support your argument, but you must cite using APA standards. All quoted material must be identified, cited, and referenced per APA standards.

You are encouraged to enrich your posting with your personal examples, experience, or insights.

 

Edit your postings carefully for spelling, grammar, and punctuation errors.

ASSIGNMENT 1 DUE BY FRIDAY………………………………………………………………..

Application: Microsoft CEO Satya Nadella Looks to Future Beyond Windows

Having read Chapter 6 in your course text, you should now be familiar with the concepts of planning, strategy, and a competitive advantage. It is now time to examine the case ofof “Microsoft CEO Satya Nadella Looks to Future Beyond Windows.” See Chapter 6 of your course text.

Submit by FRIDAY a 300 – to 700- word paper which answers all of the following questions:

 

  • What kind of planning missteps helped cause Microsoft’s decline over the past few years?
  • How is Nadella trying to eliminate some of the bureacracy that has hurt the company’s ability to innovate?
  • What business strategies has Nadella implemented that will help revitalize the technology giant?

RESOURCES………………………………………………………………………………………………………………………………………

Jones, G. R., & George, J. M. (2017). Essentials of contemporary management (7th ed.). New York, NY: McGraw-Hill.

  • Chapter 5, “Decision Making, Learning, Creativity, and Entrepreneurship” (pp. 160-187)

    This chapter addresses the concepts of “programmed” and “non-programmed” decisions. The authors also review the rational or classical approach to decision making, as well as the administrative model, which seeks to explain why decisions are often flawed. This chapter also introduces the possibilities and the problems inherent in group decision processes, and describes the role of creativity and learning in decision making and entrepreneurship.

  • Chapter 6, “Planning, Strategy, and Competitive Advantage” (pp.192-225)

    This chapter addresses the concept of a “competitive advantage” and how, through planning and strategic decisions, a competitive advantage can be obtained. The authors explain planning levels, types, and time frames, along with their correlation to levels of management and perspectives of the company’s operations and environment. The concept of “strategy” is discussed at length, along with various approaches to formulating a strategy with examples provided to help the reader understand the complexity and variety of strategic planning.