Description
Part 4 (20 points) – Questions - Complete discussion questions #1, #4, #5, #6, and #7.
Mechanics (20 points) Excellent mechanics can be achieved through professional presentation, good grammar and correct spelling. Parts 1, 3 and 4 should follow APA guidelines for in-text citations and referencing source material.
Unformatted Attachment Preview
6.
Discussion Questions
1. Give two examples of why al project might be ter-
minated early for cause and two examples of why a
project might be terminated early for convenience.
2. How can a project manager help to prevent a
project from being terminated early?
3. If
an early termination of his project seems likely,
what two avenues can a project manager explore
to increase the likelihood of being able to con-
tinue the project?
4. A project manager is in the finishing stage of her
project. It is apparent that one of the project's
deliverables will not be completed before the proj-
ect is wrapped up. What options does the project
manager have for this uncompleted deliverable?
5. Provide an example of how poor escalation of a
project problem can create additional problems.
How does celebrating the completion of a project
benefit the project manager?
7. Why is it important to go through the process of
closing, even for projects that are terminated
early?
8. Why is it important as a project manager to help
your team members secure follow-up work
toward the end of your project?
9. Imagine you are creating a lessons learned data-
base for a recent project you have completed.
What would you list as your top issues? Your top
successes?
10. The sponsor of a large multiphased project you
are managing suddenly decides to terminate the
project early. How do you respond? How and
when do you notify your team members?
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! 10/10 would recommend using Studypool to help you study.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Harrisburg University of Science and Technology Security Audit Procedure Guide Paper
Scenario
Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for ...
Harrisburg University of Science and Technology Security Audit Procedure Guide Paper
Scenario
Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.
Tasks
Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.
For each application, fill in details for the following general steps:
1. Acquire and install theapplication.
2. Scancomputers.
3. Review scanresults.
4. Identify issues you need toaddress.
5. Document the steps to address eachissue.
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
5 pages
Job Description For A Computer System Architect
Computer system architecture is a branch in engineering that describes how computer systems function and how they are impl ...
Job Description For A Computer System Architect
Computer system architecture is a branch in engineering that describes how computer systems function and how they are implemented. It involves the ...
Live quiz exam
20 quiz questions to be answered now. Multiple choice questions to be answered on real time............................... ...
Live quiz exam
20 quiz questions to be answered now. Multiple choice questions to be answered on real time.......................................................
CYB 606 Master Program Cyber Security Essay
Your answers should be written in essay form which includes having a clear introduction, body, and conclusion; these are ...
CYB 606 Master Program Cyber Security Essay
Your answers should be written in essay form which includes having a clear introduction, body, and conclusion; these are not section headings, just basic components of an essay (this implies at least 3 paragraphs). Use examples as applicable. There is no minimum length, as long as you have the three basic components and you clearly answer the question. Your answers should be in your own words; although, short quotes can be used as needed, and you should make reference to course materials to support your position. Cite any references used, in APA format.
Answer the following three Essay Questions:
EQ1 - Scenario: You have recently been promoted from an intermediate-level Security Analyst to a Cybersecurity Supervisor, in a medium-sized business with 800 employees located in three office facilities in Orange County, California. The privately-owned company provides a variety of administrative support services for its clients, including transcription, accounting/bookkeeping, office lease management, physical security management, and IT help desk support. You have been tasked by the CISO to create a plan and recommendations for improving the overall cybersecurity operations for certain monitoring and incident response services across the three facilities. Currently, there is a single Security Operations Center (SOC) that monitors each of the three facilities separately; however, the CISO wants to consolidate the monitoring and response for all three combined. Question: In your own words, using external references when needed, describe the factors you would consider and the steps you would take to accomplish the CISO's goal of having a consolidated monitoring and incident response function at the SOC. Include hardware/software components, policies and procedures, and staffing requirements in your considerations. The audience for this essay is the company CFO and CEO - you would present your recommendation with the CISO in attendance. [70 points]
EQ2 - As a follow-up to the MidTerm Essay question [ its been submitted as an order last weekend] explaining the linkages between NSM data and Incident Response functions, describe the inter-relationship between between staffing assignments for the cybersecurity staff, IT staff, and management related first to performing Network Security Monitoring, which includes data and packet analysis, and second for the Cybersecurity Incident Response Team working an actual event. Include the type and nature of any training you would conduct between the teams in advance of an actual incident. [65 points]
EQ3 - Explain what data files and what logs should be monitored and reviewed on a regular basis as part of NSM, what types of potential attack information can be derived from each of those data sources or logs; and how the results of the analysis can be use for both (1) security operations and (2) incident response. [65 points]
Similar Content
two assignment
Question 1 Read the paper, carefully and summarize it with your own words using the Paper Summary Template2 Review Questio...
William Jessup University Database Security Blockchain Discussion
Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in ...
CMPSCF132 Saint Xavier Automated Teller Machine Innovation Essay
Select one innovation Include the computer science principlesDiscuss the negative and positive impacts it had on the world...
Cloud computing
What are at least 3 advantages to using cloud platforms to deploy NoSQL solutions. Describe each advantage and cite source...
Chapter 2 Apple Inc Busniess Jobs Vs. Cook Leadership Case Study
Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. ...
South Carolina State University Symmetric Key Encryption Computer Science Task
this is cryptography class and i want you to answer the four questions with yellow highlight in the word file. ...
Scanned Document
...
Dfd Response
The student has done great work but I would like to add a few points. To understand how data flow diagrams are applied in ...
Completed File All Steps
Although Google has become the most used search engine, it is not necessary the best when searching for good research on t...
Related Tags
Book Guides
Silas Marner
by George Eliot
The Odyssey
by Homer
The Life-Changing Magic of Tidying Up
by Marie Kondo
Crippled America
by Donald J Trump
You Are a Badass
by Jen Sincero
Tess of the DUrbervilles
by Thomas Hardy
Blink
by Malcolm Gladwell
We Were Eight Years in Power
by Ta-Nehisi Coates
The Underground Railroad
by Colson Whitehead
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Harrisburg University of Science and Technology Security Audit Procedure Guide Paper
Scenario
Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for ...
Harrisburg University of Science and Technology Security Audit Procedure Guide Paper
Scenario
Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.
Tasks
Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.
For each application, fill in details for the following general steps:
1. Acquire and install theapplication.
2. Scancomputers.
3. Review scanresults.
4. Identify issues you need toaddress.
5. Document the steps to address eachissue.
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
5 pages
Job Description For A Computer System Architect
Computer system architecture is a branch in engineering that describes how computer systems function and how they are impl ...
Job Description For A Computer System Architect
Computer system architecture is a branch in engineering that describes how computer systems function and how they are implemented. It involves the ...
Live quiz exam
20 quiz questions to be answered now. Multiple choice questions to be answered on real time............................... ...
Live quiz exam
20 quiz questions to be answered now. Multiple choice questions to be answered on real time.......................................................
CYB 606 Master Program Cyber Security Essay
Your answers should be written in essay form which includes having a clear introduction, body, and conclusion; these are ...
CYB 606 Master Program Cyber Security Essay
Your answers should be written in essay form which includes having a clear introduction, body, and conclusion; these are not section headings, just basic components of an essay (this implies at least 3 paragraphs). Use examples as applicable. There is no minimum length, as long as you have the three basic components and you clearly answer the question. Your answers should be in your own words; although, short quotes can be used as needed, and you should make reference to course materials to support your position. Cite any references used, in APA format.
Answer the following three Essay Questions:
EQ1 - Scenario: You have recently been promoted from an intermediate-level Security Analyst to a Cybersecurity Supervisor, in a medium-sized business with 800 employees located in three office facilities in Orange County, California. The privately-owned company provides a variety of administrative support services for its clients, including transcription, accounting/bookkeeping, office lease management, physical security management, and IT help desk support. You have been tasked by the CISO to create a plan and recommendations for improving the overall cybersecurity operations for certain monitoring and incident response services across the three facilities. Currently, there is a single Security Operations Center (SOC) that monitors each of the three facilities separately; however, the CISO wants to consolidate the monitoring and response for all three combined. Question: In your own words, using external references when needed, describe the factors you would consider and the steps you would take to accomplish the CISO's goal of having a consolidated monitoring and incident response function at the SOC. Include hardware/software components, policies and procedures, and staffing requirements in your considerations. The audience for this essay is the company CFO and CEO - you would present your recommendation with the CISO in attendance. [70 points]
EQ2 - As a follow-up to the MidTerm Essay question [ its been submitted as an order last weekend] explaining the linkages between NSM data and Incident Response functions, describe the inter-relationship between between staffing assignments for the cybersecurity staff, IT staff, and management related first to performing Network Security Monitoring, which includes data and packet analysis, and second for the Cybersecurity Incident Response Team working an actual event. Include the type and nature of any training you would conduct between the teams in advance of an actual incident. [65 points]
EQ3 - Explain what data files and what logs should be monitored and reviewed on a regular basis as part of NSM, what types of potential attack information can be derived from each of those data sources or logs; and how the results of the analysis can be use for both (1) security operations and (2) incident response. [65 points]
Earn money selling
your Study Documents