Need computer science help with Information Security Management

Nov 9th, 2015
Computer Science
Price: $50 USD

Question description

Critical Thinking - 8 : Learning Objective: Assess risk based on the likelihood of adverse events and the effects on information assets when events occur.

Assignment Requirements: 

Watch the 57-minute video, Cyber crime: The Invisible Threat, from Films on Demand.  Take notes during the viewing to identify and assess risks associated with the threats presented in the video.

  • Introduce the term cyber crime and why IT professionals should be concerned about it.
  • Identify the threats/vulnerabilities presented in the video.
  • Discuss if the threats controllable.
  • What part of risk management addresses these threats?
  • Can they be quantified?
  • Should SETA come into play?.
  • Conclude with your recommendation on how your organization can address these risks.

Submission Requirements

  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Video Link : 

Critical Thinking - 2

IT Idea from Concept to Fruition

Learning Objective: Synthesize the process of taking a technology idea to fruition.

Assignment Requirements

View the video, ICT Project Management, from Films on Demand.  After viewing the 20-minute video and completing the reading assignment, critically think about the process of taking a technology idea to fruition. That is, how do we turn our idea into something we can actually use.

  • Write you synthesis following the stages described in the video - conception and planning to building, testing, implementing, and evaluating the finished product, looking at the personnel, tools, and methodologies used along the way.
  • Don't forget about the tools used in project management (e.g., Gantt charts, collaborative software, systems analysis and planning tools, and formal documentation).
  • Also, address the value of teamwork and conflict resolution within the team.

Submission Requirements:

Critical Thinking - 1

Online Security 

Learning Objective: Recognize key terms, concepts, and practices associated with online security.

Assignment Requirements

Watch Cyber Security (20:52)

Write a paper describing your thoughts on:

  1. The importance of setting up a firewall and keeping one’s operating system up-to-date.
  2. How to protect against hackers, viruses, Trojan horses, spyware, adware, phishing e-mails, and other high-tech threats.
  3. The importance of maintaining multiple passwords and not sharing personal information.

The video is located in the Bellevue Library's Films On Demand.

If you have trouble accessing the video, contact your professor or the Help Desk.

Submission Requirements: 

  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)

Critical Thinking - 11

Interviewing for an IT Position

Learning Objective: Identify the skills, requirements, and certifications for information security positions.

Assignment Requirements: 

Watch the video, Strategies for the Interviewee, from BU's Films on Demand. This video is designed to help the viewers determine what types of jobs or careers they are most qualified for and what to expect during any type of interview, which includes online interviews.

Using the information you learned from the reading assignment and viewing the video, write an interview strategy for a person preparing for an interview. The person has applied for a job as an "Information Security Analyst" at Union Pacific Railroad and has an interview next week.

Submission Requirements: 

  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Tutor Answer

(Top Tutor) Daniel C.
School: UIUC

Studypool has helped 1,244,100 students

Review from our student for this Answer

Nov 10th, 2015
"AMAZING as always!"
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1821 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors