Course Project

User Generated

gnevd1018

Other

Description

Course Project

digital assignment

The project for this course is really one large paper (approximately 12-14 pages, single-spaced) broken into four parts. The project will use the precepts of Integrated Reflective Practice (IRP) as you write a series of papers that apply to information assurance and your work place. Write to the subjects requested below in terms of the six IRP Areas of Management Practice, as relevant:

  1. Measurement and Process Improvement
  2. Values-Based Leadership
  3. Innovation Through Information
  4. Financial and Economic Resources
  5. Customers, Markets, Sales, and Marketing
  6. Human Resources and Organizational Relationships

Be sure to follow the guidelines in the Course Logistics Overview page, particularly those items related to assignment format and the cover page.

Deliverable 1

Deliverable 1 will be a 3-4 page, single-spaced annotated list of Web sites, journals, e-mail lists, seminal papers, etc. that relate to information security in your discipline or workplace — which might be based upon your current work or even your future professional aspirations! For example, one might choose either "Network Engineer" or "Health Records Compliance Officer" as the discipline of choice.

Put this information together as if you were providing it to your manager, such as the CIO, CEO, CISO, or board chair of your organization. Don't just list a bunch of resources; provide an introduction and a capsule summary of what each provides, its usefulness, etc. Some of the resources might be oriented towards management, some may be purely technical. Relate to IRP where possible. You may wish to break things up by subject area for clarity.

In an effort to keep anyone from feeling cast adrift, kick around some ideas with your classmates during the first week of the project (i.e., Week 2) about just what this means — i.e., what is the relationship between the areas of management practice, your workplace, and reference materials? Use the discussion forum for Deliverable 1 to exchange some ideas. This is not intended to result in a template that you all have to follow but, instead, to really just get your creative juices flowing. The instructor will monitor the discussions and may pipe in. This is a great opportunity to help each other and learn another perspective.

There should be no problem coming up with three or more full pages. The cover sheet, references, and any tables or figures do not count towards the page count.

This deliverable is due at the end of Week 3.

Deliverable 2

Deliverable 2 is a 4-5 page, single-spaced paper that provides an opportunity for you to share some war stories. Discuss a project in which you have been involved where information security was not taken into account in the design process. What were the results? Did this cause a problem? If so, what problem and how was it resolved? Was this lack of forethought not a problem when you thought that it might be? Was there a project where InfoSec was added later? How did it work out? Include some relevant resources and/or references to strengthen your case.

This project is fairly open-ended. If this topic isn't an exact fit, see if you can adapt the idea to your situation. Write your paper as if it were an honest, after-action report to your CIO, CEO, or CISO. Sanitize the information as much as you'd like! There is no need to include any company confidential information.

Follow the same general instructions as for Deliverable 1 and use the discussion forum for Deliverable 2 to kick around ideas during Week 4.

This deliverable is due at the end of Week 5.

Deliverable 3

Deliverable 3 is a 4-5 page, single-spaced paper describing how you might design cybersecurity considerations into a real project at your workplace. Start by defining your workplace and the target project. Then describe the information aspects, where you might want to consider adding protection or improving it, how you would justify the return-on-investment and/or cost-benefit of adding security, determining how "much" security is necessary, the impact of your security measures on productivity, system efficiency, and usability, etc. If you don't have a workplace situation that lends itself easily to this topic, see if you can use a colleague's workplace as a case study, apply it to a former workplace as if you were returning as a consultant, or create a fictitious project/company. The important thing is to write it, as before, as if you were addressing your CIO, CEO, CISO, etc. (If you're still having trouble finding a scenario, drop the instructor an e-mail and work something out).

Follow the same instructions as for Deliverable 1 and use the discussion forum for Deliverable 3 to kick around ideas during Week 6.

This deliverable is due at the end of Week 7.

Deliverable 4

Prepare a presentation containing the high points of your Deliverable 3 paper, as if you were giving a 5-10 minute briefing to professional colleagues. This portion of the assignment will be posted to the Course Project Deliverable 4 discussion forum for class viewing and comment during Week 9.

You can be as creative as you'd like with this. At a minimum, prepare a PowerPoint (or equivalent) presentation. Refrain from using fancy effects in your presentation; use bullets and do not write essays and/or lengthy paragraphs in your slides. The file format of the presentation as delivered to the class must be one that is commonly available, such as PowerPoint (.ppt or .pptx) or PDF.

Alternatively, you can try to use other media option. Try narrating the presentation with a tool such as Screencast-O-Matic (Links to an external site.) (or in PowerPoint (Links to an external site.), etc.), or create an audio, video, or interactive presentation that you upload to the MyMedia (Links to an external site.) (pdf) section of the course.

If you have other ideas, feel free to run them by the instructor.

The Course Project Deliverable 4 discussion forum is intended to wrap all of this up. After you post Deliverable 4 in the forum, each of you should view each others presentations, then react and comment.

Please contact the instructor with any questions, comments, or concerns.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Deliverable 1: Annotated Bibliography
Author
Reg. No
Instructor
Submission Date

E.U., C. (1964). Science and Security. Science, 656-670.
Many people usually think that information security is a discipline which is a relatively present
concern, after going through this topic which was published back in 1948 it is very evident that
the topic has been existence for more than 60 years. The only difference with present technology
is that the past information security was not adequately supported by computer technology as it
is the case today.
I find this journal to be very resourceful in my future job as a network engineer in one of these
big global companies. The author of this paper discusses disciplines such as science tradition
sharing knowledge in the post-war era and during the World War II. During this time the safest
and or protected information was the formula for making atomic bombs and where they were
being hidden and where to be applied. This is similar to present information security in our world
where every network engineer is working day and night to protect his or her company’s secret
information from leaking into competitors systems.
The author also mentioned that there were problems related to storing this information in a
secured place for a long time. The problem in obtaining these confidential data includes not
knowing where to access the right information within the organization or whether one is
duplicating the protected information without knowledge.
The writer of this article put it clear that innovation through technology must be protected at any
cost. This will save the company/country’s economic resources while their money multiply.
Information on measurement and process improvement must also be kept away from
manufacturers or producers of similar products. This helps the company avoid stiff competition
from similar manufacturers with the same market. Information security helps protect one’s
customers apart from just securing new markets and sales opportunities.
Joseph N. Pelton and Singh, Indu B. I. (2013). Securing the Cyber-City of the Future. Futurist ,
20-29.
This great work was brought into light by duo writers. Indu B., an executive director at a Global
Institute of Los Alamos and Joseph N., the developer of International Space University and Clark
Foundation. The pair addressed Cyber Security topic in a more objective way claiming that both
natural and human-made disasters also forms part of information threat to our cities, business
included. Furthermore, they outlined in this article how social media is monitor by the right
government agencies to help reduce the spread of cybercrimes. Homeland security in the United
States of America is what ensures that all online media platforms are not used by terrorists to
cause harm or destabilize peace in the country. Also, the authors also noted that over dependence
on electronic means of surveillance is not encouraged in all cases. Over-reliance on electronic
monitoring could result in ultimately uncontrolled problems which the process of solving them
could not be that easy.
After going through this work, I strongly feel that it has covered all the essential security details
that could help any person in a managerial position seeking help with security management
challenges. The author has also outlined basic possible sources of information security leakages.
After knowing such potential loopholes, one can set backup measures. This will help curb any

sudden system failure that might be as a result of a security breach by hackers or loss of
information due to natural forces like earthquakes, flood, falling off a building during rainy
seasons or as a result of war where the company’s data control room is hit or destroyed.
Nevertheless, business network engineers must be updated with the current technology of
safeguarding their control room from attack or being hacked. There are companies such as
Symantec which has professional internet/software security managers and engineers working
every hour to ensure that both small and large corporations under their care have their
information backed up from human made and non-manmade intrusions. This company ensures
that all its clients (individuals, businesses, local and multinational corporations) maintain their
secret without letting the out for their competitors.
Matt, Z. (2013). Cyber. General-Reference Center Gold .
Matt Zalaznick is a senior associate editor of Tufts University in New York. Matt is a passionate
author with a substantial commitment to a sense of responsibility and equality to readers.
Through his work, the writer educates the community in many ways. This article is of
significance to my research because it covers information security in educational institutions.
Very few organizations around the world have the ability to hire network engineers due to low
risk of cyber security challenges. Currently, hackers are now being sent to every corner of
academic institutions to steal personal information, intellectual properties, and sensitive research.
This activity is costing learning institutions with good reputations to lose the trust of new
students thus ruining their reputation.
The writer further states that the latest cyber-attacks in colleges and universities computer
database to steal private information demand that all institutions hire smart network engineers
that can create complex passwords. Complex passwords could help reduce chances that hackers
could crack them. In addition to complex passwords, antiviruses being used by these institutions
must at all time be up to date. Rooms with a computer having vital data must be kept out of
internet reach so as to cut any possibility of hackers cracking any open password through sharing
internet connections. When it comes controlling information theft at learning institutions, it is a
tough task now that the technology is advancing at lightning speed. Most students have very
multiple handsets which accessing school’s password is just a few clicks. The case is expected to
worsen if there will be no appropriate measures set to secure passwords and other secrets for
business persons.
The writer also points out vividly that you might have a complex password but if you are an old
antivirus, losing your information takes few seconds. The same case applies to those with simple
passwords but yet updated antivirus. Both the password and the antivirus must be secure for
hackers to get tough time while trying to break them. For my future workplace, I would employ
these steps in ensuring that my company or institution’s secrets are at every point in the safest
hands possible. This means that as an Engineer, I would put into place robust and complex
passwords alongside sophisticated antivirus software. A combination of strong password and
updated antivirus software provide an active shield against competing companies, student, and
other criminals. Other ways of securing company information are ensuring that those exposed to
them are the top officials who have expressed an extended period of ethical relationships with

the company officials and other junior workers. Not every employee is trusted when it comes to
vital information.
Weippl, E. F. (2016). The role-and security of firewalls in Cyber physical cloud-computing.
Journal of Information Security, 2-19.
This article brings up the idea of cloud computing and firewalls’ role played information
security. The writers have detailed it to cover cloud computing’s providers, background, and
several advantages of cloud computing to users. The central concept was for network engineers
like myself to bring in scenarios of putting together solid frameworks and the cloud yielding
architectural prospects on procedures for setting up firewall security. The concluding remarks of
this article is that firewall is the key element when it comes to the safety of cloud computing.
This article is essential to businesses and companies that use cloud computing technology as one
of its primary services and are interested in integrating firewall technology for security purposes.
The author has more information when it comes to network engineering, computer technology,
and firewall integration depending on the security that is needed.
Hulme, V. (2015). Cloud Security comes-of-age. Forbes, 196 (7).
The writer discusses how problems on information security have been on the run since the onset
of cyber security. The good thing with this cyber security is that solutions have been initiated to
help cut down any possible threats. The author discusses how everyone is now connected to
cloud computing in the present day. The writer goes deeper about how companies have initiated
programs to secure their cloud systems from hacke...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags