Develop an information security governance and management program that aligns with organizational strategies by evaluating business requirements, applicable laws, regulations, standards, and best practices. Analyze and evaluate political, legal, economic, social, cultural, and technology factors which drive cybersecurity related investments by customers, suppliers, manufacturers, and investors.

Briefing Paper: Exploring Factors which Drive Market Demand for Cybersecurity Products and Services

Introduction to the Case Study

In this case study, you will learn about how a fictional company, Nofsinger Consulting Services, LLP, uses Business Analysis to assist its clients in performing cybersecurity-focused risk analyses and risk assessments. Readings from the course textbook, Business analysis for practitioners: A practice guide (Project Management Institute, 2015), will be used to support your learning in this course and will introduce students to the knowledge, skills, and techniques which are collectively know as business analysis. This case will also introduce you to the business characteristics of companies and the types of risks they may face when doing business online (i.e. as an e-commerce firm) or when using the Internet to support their business operations (e.g. equipment sales and support). In addition to presenting information about businesses and their operations, this case study will help students learn more about the roles that consultants and consulting firms play in the cybersecurity industry.

This case study supports the following course outcomes for CSIA 350 Cybersecurity in Business and Industry:

Categorize, evaluate, and manage risks which impact an organization’s enterprise IT operations.

Develop an information security governance and management program that aligns with organizational strategies by evaluating business requirements, applicable laws, regulations, standards, and best practices.

Analyze and evaluate political, legal, economic, social, cultural, and technology factors which drive cybersecurity related investments by customers, suppliers, manufacturers, and investors.

Identify and evaluate opportunities to improve cybersecurity across industry sectors and internationally through cooperation, collaboration, and capacity building.

Note: the course textbook is listed as a required text in the syllabus and purchase information is available via the Course Materials link. An ebook version may be available from the UMGC library at this link:
http://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e025xna&AN=1244311&site=eds-live&scope=site&profile=edsebook

Write an essay on the impact of the Internet on Society, both positive and negative.

Impact of the Internet on Society

Write an essay on the impact of the Internet on Society, both  positive and negative.

With reference to examples of your own choice, discuss how this might alter our understanding of the radio medium? Has the internet changed how we listen to the radio and how has this affected programme content?

Digital technology

Digital technology is changing the way we consume radio. With reference to examples of your own choice, discuss how this might alter our understanding of the radio medium? Has the internet changed how we listen to the radio and how has this affected programme content?

Determine what they are proposing their API will do. Explain what the information in the schematic diagram and claims means for the end user. Explain whether this patent information is easy to understand. Why or why not? Propose different ways that the communication can be clearer to an end-user audience like a customer. Explain how the graphic schematic diagram is useful and how you might change it to make it more useful. Explain whether the diagram fits well with the written communication. Why or why not?

Wk 1 – Apply: Summative Assessment: Communication Plan Analysis

This week you will use your communication and critical thinking skills to propose a strategy to better communicate an API for an automatic lawnmower.

You have been assigned by your company to help communicate the meaning of an API to the marketing team. The team wants to create content for an end user who is not a computer engineer and who wants to understand why this new automatic lawnmower would be a good purchase.

Study the Automatic Lawn Mower Schematic Diagram, along with the accompanying 4 claims made by the researchers. This content was generated by an actual research team of computer engineers who are developing and have a patent for an API to be integrated with an automatic lawnmower.

Determine what these researchers are claiming about their patented API by using the schematics and reading the first four claims they are making.

NOTE: Draft a 750- to 850-word email communication to the marketing team that provides your analysis of the schematic diagram.

NOTE: Create your draft in Microsoft Word and complete the following:

Determine what they are proposing their API will do.
Explain what the information in the schematic diagram and claims means for the end user.
Explain whether this patent information is easy to understand. Why or why not?
Propose different ways that the communication can be clearer to an end-user audience like a customer.
Explain how the graphic schematic diagram is useful and how you might change it to make it more useful.
Explain whether the diagram fits well with the written communication. Why or why not?

Cite at least 1 source beyond your textbook to support your assignment. (Wk 1 – Apply: Summative Assessment: Communication Plan Analysis [due Day 7]
Exam Content

This week you will use your communication and critical thinking skills to propose a strategy to better communicate an API for an automatic lawnmower.

You have been assigned by your company to help communicate the meaning of an API to the marketing team. The team wants to create content for an end user who is not a computer engineer and who wants to understand why this new automatic lawnmower would be a good purchase.

Study the Automatic Lawn Mower Schematic Diagram, along with the accompanying 4 claims made by the researchers. This content was generated by an actual research team of computer engineers who are developing and have a patent for an API to be integrated with an automatic lawnmower.

Determine what these researchers are claiming about their patented API by using the schematics and reading the first four claims they are making.

Draft a 750- to 850-word email communication to the marketing team that provides your analysis of the schematic diagram.

Create your draft in Microsoft Word and complete the following:

Determine what they are proposing their API will do.
Explain what the information in the schematic diagram and claims means for the endWk 1 – Apply: Summative Assessment: Communication Plan Analysis [due Day 7]

Exam Content

This week you will use your communication and critical thinking skills to propose a strategy to better communicate an API for an automatic lawnmower.

You have been assigned by your company to help communicate the meaning of an API to the marketing team. The team wants to create content for an end user who is not a computer engineer and who wants to understand why this new automatic lawnmower would be a good purchase.

Study the Automatic Lawn Mower Schematic Diagram, along with the accompanying 4 claims made by the researchers. This content was generated by an actual research team of computer engineers who are developing and have a patent for an API to be integrated with an automatic lawnmower.

Determine what these researchers are claiming about their patented API by using the schematics and reading the first four claims they are making.

Draft a 750- to 850-word email communication to the marketing team that provides your analysis of the schematic diagram.

 

Create your draft in Microsoft Word and complete the following:

Determine what they are proposing their API will do.
Explain what the information in the schematic diagram and claims means for the end user.
Explain whether this patent information is easy to understand. Why or why not?
Propose different ways that the communication can be clearer to an end-user audience like a customer.
Explain how the graphic schematic diagram is useful and how you might change it to make it more useful.
Explain whether the diagram fits well with the written communication. Why or why not?

Cite at least 1 source beyond your textbook to support your assignment.

Explain whether this patent information is easy to understand. Why or why not?
Propose different ways that the communication can be clearer to an end-user audience like a customer.
Explain how the graphic schematic diagram is useful and how you might change it to make it more useful.
Explain whether the diagram fits well with the written communication. Why or why not?

NOTE: Cite at least 1 source beyond your textbook to support your assignment. Read the Introduction and watch the video in MyEducator.

What strengths did Nokia have as a company and how have these been offset by new companies (such as Apple)?

Disruptive technologies: when do firm capabilities become liabilities, and vice versa?

The case would focus on the mobile phone/smartphone industry, specifically on Nokia and its demise as an established value in this industry. What strengths did Nokia have as a company and how have these been offset by new companies (such as Apple)? Don’t only focus on how Nokia’s strengths became a weakness, but also on how “weaknesses” of other companies became a strength.

Wireless technology’s greatest strength, allowing access without being connected to the network by wires, is also its greatest weakness. True or false?

Wireless Communications quiz

Part I

In 250 words discuss the advantages of wireless communications for businesses.

Part 2

Question 1 (10 points)

_________tags are read-only.

STAC
Class 1
Class 0
Blocker

Question 2 (10 points)

1-bit tags _____________.

store a unique identification code
can only be read by a passive reader
do not carry any information about the product
are also known as RF fibers

Question 3 (10 points)

One of the main characteristics of sensory tags is that __________.

they can sense the presence of other tags
they can block the signal from other tags
they only respond to the reader if a password is sent first
they can capture information about environmental conditions

Question 4 (10 points)

What is the purpose of an interrogator?

To read information from the tags
To prevent unauthorized access to the tags
To increase the read distance
To store a charge that powers passive tags

Question 5 (10 points)

Reader antennas are designed for the specific application. True or False?

True
False

Question 6 (10 points)

The principal advantage of wireless technology is _____________ .

universal access to corporate data
lower cost
newer technology
reduced bandwidth

Question 7 (10 points)

A help desk can provide service to users by performing all of the following tasks, except for __________.

having one telephone number
creating a method to track problems effectively
reporting users’ questions to their supervisor
using surveys to determine user satisfaction

Question 8 (10 points)

If customers can see data about themselves on the business’ computer system, it will enable them to ____________.

gain access to secret corporate data
sell this data to other people
reduce the amount of bandwidth needed for their home computer
make better and more informed decisions

Question 9 (10 points)

 

Wireless technology’s greatest strength, allowing access without being connected to the network by wires, is also its greatest weakness. True or false?

True
False

Question 10 (10 points)

There is a shortage of qualified IT professionals to install, support, and maintain wireless systems. True or false?

True
False

Source: Olenewa, J (2013), Guide to wireless communications https://www.virtualsource.com Chapter 11 & 12

Note: There is no need for a cover page or abstract.

State professional plans and career objectives. Include your personal qualities and development and how they have influenced your career choice; your reasons for Cyber Security degree in relation to your academic background, professional work experience, and career goals; and your reason for selecting your program at George Mason University.

Personal Statement

State professional plans and career objectives. Include your personal qualities and development and how they have influenced your career choice; your reasons for Cyber Security degree in relation to your academic background, professional work experience, and career goals; and your reason for selecting your program at George Mason University.

Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail.

Assignment:
The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information about the differences between the IEEE 802.11a and IEEE 802.11g standards so that their salespeople will be better equipped to sell this wireless technology to schools.

Deliverables

1. Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail. Your presentation should last 15-20 minutes.

Explain your selected technology. What is it? How does it work? What is its purpose? Develop three to five ethical questions that surround your selected technology. Identify one to two ethical theories that you think will help you further develop your analysis of your selected technology.

Historical Context and Ethical Questions

This week, you will consider the historical and ethical contexts of your Course Project topic. This will provide a factual foundation to help guide your analysis in the coming week. For this assignment, complete the following.

• Definition: Explain your selected technology. What is it? How does it work? What is its purpose?

• Timeline: Provide a timeline of major events concerning your technology. Include major developments, regulations, successful events, controversies, or issues.

• Ethical Questions: Develop three to five ethical questions that surround your selected technology. These questions will help guide your analysis in future assignments.

• Ethical Lens: Identify one to two ethical theories that you think will help you further develop your analysis of your selected technology.

As part of this assignment, you must consult and cite at least three high-quality, academic sources. These sources should be from reputable publications that can be found in the DeVry Library or industry publications.

A successful assignment will • be one to two pages in length;

  • • be composed using Microsoft Word and using 12-point Times New Roman;
  • • include a minimum of three sources; and
  • • include properly formatted and cited sources using the seventh edition of APA.

Identify why traditional key performance indicators MP’s) or metrics foe evaluating business risks are inefficient for understanding cyber risks.

Cyber security and risks management

Criteria

Identification of why Traditional Key Performance Indicators MP’s) or metrics foe evaluating business risks are inefficient for understanding cyber risks.
Identification of relevant problems and issues with information security and risks for management.
Identification of relevant examples of current strategies for mitigating nsks and threats.
Evidence of research and correct use of references to provide evidence and support any claims nude.