How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future? What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations? What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?

Information Security

Introduction
Contemporary organizations collect, store, and transmit a tremendous amount of highly sensitive data.
Despite the many benefits that information technology offers, these systems are not completely secure.
Proper controls must be put in place to mitigate security risks and protect vital business information.

Scenario
Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept confidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach. You are a security professional who reports to Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.

Tasks
Prepare for the meeting by deliberating on the following questions:
 How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future?
 What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations?
 What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?
 Which countermeasures would you recommend the company implement to detect current vulnerabilities, respond to the effects of this and other successful attacks, and prevent future incidents?

Write an outline of key points (related the questions above) that the team should discuss at the meeting. As a reminder, you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.

Describe assessment techniques used to determine threats and vulnerabilities. Describe physical security threats and vulnerabilities. Describe logical (technical) security threats and vulnerabilities. Describe policies and procedures used for continuous security monitoring. Describe training and continuing education policies implementation. Describe a continuity of operations plan to keep the key system operational during a disaster.

Threats and vulnerabilities

Scenario
Altamaha Tech Incorporated is a company that specializes in the development of wearable medical devices. The company has recently experienced high turnover of design engineers and scientists. Understanding the current situation, the company held a meeting on what steps can be taken to improve operations and secure its information and information systems. The company’s initial concern would focus on the possibility of internal and external threat due to high turnover of key employees. To aid the company in developing security controls that address known issues, the company has completed a security audit by a trusted third party. The independent security report has detailed information on all issues found within the security program.

You will assume the role as the CTO (Chief Technology Officer) to review the attached security report (Links to an external site.) (PDF) to develop proposed security improvements. You must determine the appropriate actions based on industry standards and best practices to create a plan to resolve security issues.

Instructions
Write your paper in the MLA format (Links to an external site.). You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Include a mix of both primary and secondary sources (Links to an external site.), with at least one source from a security journal. If you use any Study.com lessons (Links to an external site.) as sources, please also cite them in MLA (including the lesson title and instructor’s name). Ensure that your paper includes information on the following:

Describe assessment techniques used to determine threats and vulnerabilities.
Describe physical security threats and vulnerabilities.
Describe logical (technical) security threats and vulnerabilities.
Summarize required policies to protect information systems:
-Acceptable Use Policy (AUP)
-Mobiles device Management (MDM)
-Personally identifiable information (PII)
-Payment Card Industry Data Security Standard (PCI DSS)
-Information system secure backup strategies

Describe policies and procedures used for continuous security monitoring.
Describe training and continuing education policies implementation.
Describe a continuity of operations plan to keep the key system operational during a disaster.

How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future? What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations? What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?

Information Security

Introduction
Contemporary organizations collect, store, and transmit a tremendous amount of highly sensitive data.
Despite the many benefits that information technology offers, these systems are not completely secure.
Proper controls must be put in place to mitigate security risks and protect vital business information.

Scenario
Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept confidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach. You are a security professional who reports to Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.

Tasks
Prepare for the meeting by deliberating on the following questions:
 How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future?
 What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations?
 What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?
 Which countermeasures would you recommend the company implement to detect current vulnerabilities, respond to the effects of this and other successful attacks, and prevent future incidents?

Write an outline of key points (related the questions above) that the team should discuss at the meeting. As a reminder, you may use the book for this course and the Internet to conduct research. You are encouraged to respond creatively, but you must cite credible sources to support your work.

Describe Your Personality in Three Words: If I were to ask someone who knew you pretty well, but was not a friend, to describe you; what would that person say? Have you ever seen or heard things that were not really there? Yes or No? If yes, please describe the experience: Do you have problems managing anger? How do you deal with stress?

Project: Psychotherapy Initial Interview

This research project is twofold and will involve active participation and observation as well as a written report portion.

Choose a participant and conduct an in-depth biopsychosocial interview. The interview should take between 45 minutes to 1 hour and should be in the participants’ natural setting (home, school, work, etc.). Try to ask them about different moments in their day and how they are accomplishing a variety of tasks. Make sure to take notes on the behaviors that you observe in your participant.

Then, create a biopsychosocial interview report, similar to the one attached below to these directions. Do not provide any personal information (names, identification numbers, and specific incidents) on your participants that may affect their confidentiality. Your written report should be no shorter than 2 pages, but no longer than 4 pages.

Psychotherapy Initial Interview/Intake Format

 

Name:                      Date of Birth:

 

Age:            Date of Initial Evaluation:

 

Examiner:

Identifying Information & Referral Source:

Presenting Complaint and Symptoms (Tell me a little about yourself):

History of Presenting Complaint

Medical and Psychiatric History

 

Personal History/Family Background

  • Born:
  • Raised:
  • Childhood:

 

Parents

Still together?  Y   N

If divorced, age of client when parents divorced ____ who did client live with? ________

Parental Employment:

Problems in the house growing up:

Siblings:

 

Marital Status: Single ___ Married ___ Separated ___ Divorced ___

Children (ages):

Relationship W/ Children:

Children at Home:

Family History of Mental Disorders:

Family History of Alcohol & Drug:

 

Social Relationships

Social Activities:

Peer Relations:

Recreation:

Church Attendance:

Importance of Religion to the Client:

Notes on Social Relationships:

 

Education

 

High School:    Graduated:

Special Education Classes:

Retained:

Suspensions/Expulsions:

Extracurricular Activity:

 

College/University:     Graduated:

Major:

Attendance:    GPA:

Favorite/Least Favorite Classes:

Future Goals:

Notes on Education:

 

Physical Health

Current Health:

Allergies:

Medications:

Medical History

Notes on Physical Health:

 

Employment

Work History:

Were you fired from a job?

Problems with Peers/Supervisors?

Opinion of Job:

Notes on Employment:

 

Mental Health

Typical Mood:

Describe Your Personality in Three Words:

If I were to ask someone who knew you pretty well, but was not a friend, to describe you; what would that person say?

Have you ever seen or heard things that were not really there? Yes or No?

If yes, please describe the experience:

Do you have problems managing anger?

How do you deal with stress?

Mental Health History (Hospitalizations/Therapy? Who? What? When? Was it effective?)

***Note whether there is evidence of delusional material. (Do not ask this)***

Notes on Mental Health:

 

Alcohol & Drug Use

Use of Alcohol: (Frequency? Amount per Day?):

Use of Tobacco: (Frequency? Amount per Day?):

Use of Caffeine: (Frequency? Amount per Day?):

Use of Controlled Substances/Recreational Drugs & Medication:

(Frequency? Amount per Day?):

Alcohol & Drug Rehab? (Dates? Length of Stay?):

Notes on Alcohol or Drug Use:

 

Legal History

Traffic Citations:

Accidents:

Arrests/Charges:

Notes on Legal History:

 

Cultural/Individual Differences That May Impact Treatment

Clinical Descriptions, Impressions, and Observations:

Mental Status:

Tentative Diagnosis (DSM-5):

Clinical Formulation & Treatment Plan Recommendations:

Identify and justify a research methodology appropriate to your proposed research. Identify and justify research methods and data appropriate to your proposed research. Identify key ethical considerations relevant to your proposed research.

Dissertation/Management Project

Assessment guidelines
Task: You will prepare a report outlining further details of your chosen research that will form the basis of your Dissertation/Management Project.
Format: You should use the following structure for your Report – Research Proposal. You should present your proposal in a single document with an appropriate front page, contents page, headings and a correctly formatted reference list (Harvard style).

The proposal should include the following:

● Section 1: Research topic, aim and objectives Assessment guidelines
Task: You will prepare a report outlining further details of your chosen research that will form the basis of your Dissertation/Management Project.
Format: You should use the following structure for your Report – Research Proposal. You should present your proposal in a single document with an appropriate front page, contents page,
headings and a correctly formatted reference list (Harvard style).

The proposal should include the following:
● Section 1: Research topic, aim and objectives
○ Identify your proposed research topic and offer a clear rationale, along with aim and objectives

■ In this section you should present your research topic and explain the topic area. The section should include appropriate background information and it should explain the rationale for selecting this research topic and what is the potential contribution of the proposed research. Also, the section should clearly present the aim and objectives of the proposed research.

● Section 2: Methodology, methods and ethical considerations
○ Identify and justify a research methodology appropriate to your proposed research.
○ Identify and justify research methods and data appropriate to your proposed research.
○ Identify key ethical considerations relevant to your proposed research.

■ In this section you should discuss your research methodology. You should consider your epistemological approach and how this impacts your research design. Also, you should discuss your data collection methods as well as the types of data that you will collect for your research and the sources of this data. You should be able to justify your choice of methodology and methods referring to your research aim and objectives. Also, you should comment on the feasibility of your research and your ability to access the required data. Finally, this section should outline the ethical considerations related to your research.

● Section 3: Research schedule/plan
○ Induce a provisional project schedule/plan for your proposed research

■ In this section you should outline the key milestones for the completion of your research project and propose the length of time that each milestone will require to complete. You should try to be as realistic as you can and you should consider things like work schedule and busy periods at work as well as holidays and other breaks. It will be useful to present your schedule/plan on a table listing the milestones, the duration of each milestone as well as a brief note for each milestone that will offer a description of the role of the milestone in the process and a justification for the assigned duration, including any concerns, contingency plans, or limitations completing the milestone.

○ Identify your proposed research topic and offer a clear rationale, along with aim and objectives

■ In this section you should present your research topic and explain the topic area. The section should include appropriate background information and it should explain the rationale for selecting this research topic and what is the potential contribution of the proposed research. Also, the section should clearly present the aim and objectives of the proposed research.

● Section 2: Methodology, methods and ethical considerations
○ Identify and justify a research methodology appropriate to your proposed research
○ Identify and justify research methods and data appropriate to your proposed research
○ Identify key ethical considerations relevant to your proposed research

■ In this section you should discuss your research methodology. You should consider your epistemological approach and how this impacts your research design. Also, you should discuss your data collection methods as well as the types of data that you will collect for your research and the sources of this data. You should be able to justify your choice of methodology and methods referring to your research aim and objectives. Also, you should comment on the feasibility of your research and your ability to access the required data. Finally, this section should outline the ethical considerations related to your research.

● Section 3: Research schedule/plan
○ Induce a provisional project schedule/plan for your proposed research

■ In this section you should outline the key milestones for the completion of your research project and propose the length of time that each milestone will require to complete. You should try to be as realistic as you can and you should consider things like work schedule and busy periods at work as well as holidays and other breaks. It will be useful to present your schedule/plan on a table listing the milestones, the duration of each milestone as well as a brief note for each milestone that will offer a description of the role of the milestone in the process and a justification for the assigned duration, including any concerns, contingency plans, or limitations completing the milestone.

Identify and justify a research methodology appropriate to your proposed research. Identify and justify research methods and data appropriate to your proposed research. Identify key ethical considerations relevant to your proposed research.

Dissertation/Management Project

Assessment guidelines
Task: You will prepare a report outlining further details of your chosen research that will form the basis of your Dissertation/Management Project.
Format: You should use the following structure for your Report – Research Proposal. You should present your proposal in a single document with an appropriate front page, contents page, headings and a correctly formatted reference list (Harvard style).

The proposal should include the following:

● Section 1: Research topic, aim and objectives Assessment guidelines
Task: You will prepare a report outlining further details of your chosen research that will form the basis of your Dissertation/Management Project.
Format: You should use the following structure for your Report – Research Proposal. You should present your proposal in a single document with an appropriate front page, contents page,
headings and a correctly formatted reference list (Harvard style).

The proposal should include the following:
● Section 1: Research topic, aim and objectives
○ Identify your proposed research topic and offer a clear rationale, along with aim and objectives

■ In this section you should present your research topic and explain the topic area. The section should include appropriate background information and it should explain the rationale for selecting this research topic and what is the potential contribution of the proposed research. Also, the section should clearly present the aim and objectives of the proposed research.

● Section 2: Methodology, methods and ethical considerations
○ Identify and justify a research methodology appropriate to your proposed research.
○ Identify and justify research methods and data appropriate to your proposed research.
○ Identify key ethical considerations relevant to your proposed research.

■ In this section you should discuss your research methodology. You should consider your epistemological approach and how this impacts your research design. Also, you should discuss your data collection methods as well as the types of data that you will collect for your research and the sources of this data. You should be able to justify your choice of methodology and methods referring to your research aim and objectives. Also, you should comment on the feasibility of your research and your ability to access the required data. Finally, this section should outline the ethical considerations related to your research.

● Section 3: Research schedule/plan
○ Induce a provisional project schedule/plan for your proposed research

■ In this section you should outline the key milestones for the completion of your research project and propose the length of time that each milestone will require to complete. You should try to be as realistic as you can and you should consider things like work schedule and busy periods at work as well as holidays and other breaks. It will be useful to present your schedule/plan on a table listing the milestones, the duration of each milestone as well as a brief note for each milestone that will offer a description of the role of the milestone in the process and a justification for the assigned duration, including any concerns, contingency plans, or limitations completing the milestone.

○ Identify your proposed research topic and offer a clear rationale, along with aim and objectives

■ In this section you should present your research topic and explain the topic area. The section should include appropriate background information and it should explain the rationale for selecting this research topic and what is the potential contribution of the proposed research. Also, the section should clearly present the aim and objectives of the proposed research.

● Section 2: Methodology, methods and ethical considerations
○ Identify and justify a research methodology appropriate to your proposed research
○ Identify and justify research methods and data appropriate to your proposed research
○ Identify key ethical considerations relevant to your proposed research

■ In this section you should discuss your research methodology. You should consider your epistemological approach and how this impacts your research design. Also, you should discuss your data collection methods as well as the types of data that you will collect for your research and the sources of this data. You should be able to justify your choice of methodology and methods referring to your research aim and objectives. Also, you should comment on the feasibility of your research and your ability to access the required data. Finally, this section should outline the ethical considerations related to your research.

● Section 3: Research schedule/plan
○ Induce a provisional project schedule/plan for your proposed research

■ In this section you should outline the key milestones for the completion of your research project and propose the length of time that each milestone will require to complete. You should try to be as realistic as you can and you should consider things like work schedule and busy periods at work as well as holidays and other breaks. It will be useful to present your schedule/plan on a table listing the milestones, the duration of each milestone as well as a brief note for each milestone that will offer a description of the role of the milestone in the process and a justification for the assigned duration, including any concerns, contingency plans, or limitations completing the milestone.

Read various sources to learn more about your information system, or about information systems in general. Explain what you learned from your research and what you know from your own experience with the system, in your own words.

DEFENSE TRAVEL SYSTEM ASSIGNMENT 2

Your essay must be at least 1500 words (approximately 4-5 pages). Microsoft Word has a word count feature, and you can usually view the word count in the bar at the bottom of Word. If necessary, search Google for help on how to view the Word count in Microsoft Word. Download the attached template, which contains additional instructions (and make sure you follow all instructions in the template!). The template document is also formatted correctly for your essay, so you are encouraged to write directly in the attached document (replacing the paragraphs of instruction with your paragraphs addressing each section). Also note that the template is organized into the specific sections you are required to write about in your essay. Leave all centered sub-headings in the essay, and do not change the wording of them — they are important for organizing your essay and facilitating grading by the rubric.

Write only in your own words. You are encouraged to read various sources to learn more about your information system, or about information systems in general, but due to the brief length of the essay, you are discouraged from directly quoting from your sources. Instead, explain what you learned from your research and what you know from your own experience with the system, in your own words. List the references you consulted in your research at the bottom of your essay in APA format (minimum of 3 references).

In Analysis Essay #2, you will address the following:

  1.  a brief reminder of the name and purpose of your chosen information system,
  2.  description of networking, communications, and security components of your information system,
  3.  impact of the information system on the users and/or the organization,
  4.  competitive analysis of the system, including how the system helps users and/or the organization address its business processes (or personal tasks, if not a business system)
  5.  3 well-developed recommendations for improving and enhancing your chosen information system, and
  6.  conclusion. Specific details about what to include in each section can be found in the attached template.

Read various sources to learn more about your information system, or about information systems in general. Explain what you learned from your research and what you know from your own experience with the system, in your own words.

DEFENSE TRAVEL SYSTEM ASSIGNMENT 2

Your essay must be at least 1500 words (approximately 4-5 pages). Microsoft Word has a word count feature, and you can usually view the word count in the bar at the bottom of Word. If necessary, search Google for help on how to view the Word count in Microsoft Word. Download the attached template, which contains additional instructions (and make sure you follow all instructions in the template!). The template document is also formatted correctly for your essay, so you are encouraged to write directly in the attached document (replacing the paragraphs of instruction with your paragraphs addressing each section). Also note that the template is organized into the specific sections you are required to write about in your essay. Leave all centered sub-headings in the essay, and do not change the wording of them — they are important for organizing your essay and facilitating grading by the rubric.

Write only in your own words. You are encouraged to read various sources to learn more about your information system, or about information systems in general, but due to the brief length of the essay, you are discouraged from directly quoting from your sources. Instead, explain what you learned from your research and what you know from your own experience with the system, in your own words. List the references you consulted in your research at the bottom of your essay in APA format (minimum of 3 references).

In Analysis Essay #2, you will address the following:

  1.  a brief reminder of the name and purpose of your chosen information system,
  2.  description of networking, communications, and security components of your information system,
  3.  impact of the information system on the users and/or the organization,
  4.  competitive analysis of the system, including how the system helps users and/or the organization address its business processes (or personal tasks, if not a business system)
  5.  3 well-developed recommendations for improving and enhancing your chosen information system, and
  6.  conclusion. Specific details about what to include in each section can be found in the attached template.

A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance?

How to Avoid Violations of E.U. Data Protection Laws

Assignment #8

Instructions

In order to complete assignment #8 you will need to answer the below questions. Complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Be sure to follow APA guidelines for citing and referencing source.

Chapter 14

A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance?

Describe some soft skills you possess. How did you gain these skills? How might you recommend to others to improve these skills? Describe a soft skill you need to work on developing. What are some tips you’ve picked up that you plan to put into practice? How will this skill help you in your career?

Developing Soft Skills

Respond to the following in a substantive post (2–3 paragraphs):

In one paragraph, describe some soft skills you possess. How did you gain these skills? How might you recommend to others to improve these skills?
In another paragraph, describe a soft skill you need to work on developing. What are some tips you’ve picked up that you plan to put into practice? How will this skill help you in your career?
One assumed soft skill is downloading software. This is something you’ll be expected to do regularly in an IT role. What sort of things might you need to know in order to download software on the job?