Entries by Sarah Kaelo

Communicate effectively and employ constructive professional and interpersonal skills

our priority is that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own […]

Compile a high-level schedule for completing the project scope.

The purpose of the project proposal is to describe a project (i.e., to describe how to automate or improve the automation of a specific business process) and then to explain how completing the project will positively affect the business. Once a project proposal is accepted, project work can begin; therefore, a successful project proposal must […]

How do we ensure that the remote site is protected like we would the main location?

We develop good DR plans and some of those plans will include a remote recovery site (hot or cold).  How do we ensure that the remote site is protected like we would the main location? Discuss the challenges of maintaining information security at a remote recovery location.***Standard for all discussion posts:Please make your initial post and […]

Research the role of chatbots in helping patients with dementia. 

Research the role of chatbots in helping patients with dementia.  Discuss how IBM Watson will reach 1 billion people by  2018 and what the implications of that are Exercises   Discussion questions 1.  Some people say that chatbots are inferior for chatting. Others disagree. Discuss. 2. Discuss the financial benefits of chatbots. 3. Discuss how […]

Analyze various cyber threat models used to identify and protect against cybercrime threat vectors

Analyze various cyber threat models used to identify and protect against cybercrime threat vectors Security professionals need to understand that compliance, along with strong security policies, can make organizational security stronger, but not completely hacker-proof. In 500-750 words, explain how compliance with governing standards can fail to provide security even when using the Diamond Model […]

Cybersecurity professionals, must we be ever vigilant in our ethical decisions?

ybersecurity professionals, must we be ever vigilant in our ethical decisions? According to research, social engineering makes up a majority of successful data breaches across the world. However, this simple attack vector is often forgotten in cybersecurity for more technical approaches. OSINT and other online tools provide a wealth of information about individuals. However, this information can be used […]

Define the difference between a threat and a vulnerability.

Your C-Suite Presentation with the upper-level management in the last topic provided a glimpse into threat actors and their abilities. The CEO has decided that an in-depth training on this topic is needed from a top-down perspective to educate employees company-wide. The CIO has tasked you to modify your C-Suite Presentation to include potential system attacks […]

internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch

Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; […]

what other precautions do you use to prevent virus

Chapter#8 from the textbook If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this […]