Entries by Sarah Kaelo

Describe all business stakeholders you should consult with to determine whether your proposed solution meets their needs.

Write a three-page paper that includes the following: · Explanation of the business problem and the requirements for its solution. · A proposal for an information technology solution. · Description of how the information technology solution aligns with the current business needs. Be sure to: · Describe all business stakeholders you should consult with to […]

Project: Problem Identification Assignment

Project: Problem Identification Assignment Overview The objective of the final comprehensive project is to show you are competent in the Information Assurance discipline and prepared for the final capstone systems analysis and design course. You will show competence through the execution of a final information security plan. The objective of the plan is to identify a current […]

What do we have to do to protect the authentication system?

Chapter#3 from Textbook What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the authentication system to a tier behind […]

Which functions are relevant?

Chapter# 3 in textbook System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.  This definition immediately raises some important questions: What are “components”? Which functions are relevant? What is a communication flow? Answer the questions with an APA-formatted paper (Title page, body and references only).  Your […]

Given the absence of actuarial data, what can a poor security architect do?

Chapter# 4 from textbook Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do? Answer the question with a short paragraph, with a minimum […]

Internet acceptable use policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas: Computer and email acceptable use policy Internet acceptable use policy Make sure you are sufficiently specific in addressing each area. There are […]

Legal Protections for E-commerce

Legal Protections for E-commerce In this assignment you’ll examine the legal protections for e-commerce. From the readings or from your own research, choose three U.S. laws that regulate the use of the internet for commercial purposes. You can choose laws that protect the consumer, the provider, or both. In your discussion, also include the issue […]

How thorough is the privacy protection offered by each ruling, law or regulation?

From this module’s Global Internet Law in a Nutshell readings choose three rulings, laws, or regulations that relate in some way to your use of the internet. In a well-written paper, briefly summarize each case, law or regulation and describe the effect it has or could have on your internet use. How thorough is the privacy protection offered […]

What is a communication flow

System architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components. This definition immediately raises some important  questions: What are “components”? Which functions are relevant? What is a communication flow? Answer the questions in an APA-formatted paper (Title page, body and references only) with in-text citations.  Response should have […]

Propose the IS architecture for the IS for the bike sharing system.

BUSINESS CASE A healthy lifestyle advocacy group is aiming to build a bike sharing system within a medium size metropolitan area. The group has signed a contract with a company to provide the bike sharing technology and hardware (bike stations, bikes, network equipment, a server, and bike sharing software that automates the process of checking […]