Chat with us, powered by LiveChat IT | Writedemy

IT

IT

Case Study 2: Data Breaches and Regulatory Requirements Due Week 6 and worth 100 points

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located at http://csrc.nist.gov/groups/SMA/fisma/index.html. Additionally, review the information, located at http://www.govtech.com/blogs/lohrmann-on-cybersecurity/Dark-Clouds-Over-Technology-042212.html, about the data breaches within government systems.

Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.

Write a three to five (3-5) page paper on your selected case in which you:

1. Describe the data breach incident and the primary causes of the data breach.

2. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).

3. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.

4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the source list are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

· Describe legal compliance laws addressing public and private institutions.

· Examine the principles requiring governance of information within organizations.

· Use technology and information resources to research legal issues in information security.

· Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Assignment 3: Intellectual Property Laws and Security Measures

Due Week 7 and worth 100 points

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. As an information security manager in an IT consulting company, your executive management team is concerned about the potential intellectual property violations in the organization. To address these concerns, they have asked you to develop an intellectual property policy to implement within the organization.

Develop a policy document in which you:

1. Provide an overview of intellectual property law.

2. Describe who the policy applies to.

3. Create policy, standards, and guidelines concerning:

a. Patents

b. Trademarks

c. Copyrights

d. Ownership of company material

4. Develop intellectual property violation reporting procedures.

5. Develop intellectual property infringement ramifications.

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your written paper must follow these formatting requirements:

This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

(Note: You’ll be prompted to enter your Blackboard login credentials to view these standards.)

. Your paper should include a cover page.

·

. Your paper should be of sufficient length to fully develop your own ideas that address the items called for in the instructions, and not be filled with “filler” information. Write clearly and concisely.

. The paper should be double-spaced, 12-point font.

The specific course learning outcomes associated with this assignment are:

· Analyze intellectual property laws.

· Use technology and information resources to research legal issues in information security.

· Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Assignment 2: Structural Modeling and Behavior Modeling

Due Week 6 and worth 120 points

 

Refer to the functional model you verified and validated for ABS in the Week 4 assignment to complete this assignment.

 

Based on your performance, ABS management was so satisfied that it wants you to develop both the structural and behavior models. This way, ABS can fully understand both the interaction that would take place between the users and the system, and the system itself in greater detail.

 

Note: You may create and / or assume all necessary assumptions needed for the completion of this assignment.

 

Write a four to five (4-5) page paper in which you:

1. Create Class-Responsibility-Collaboration (CRC) cards and a class diagram based on the functional models through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

2. Identify each use case in the functional model and create a sequence and communication diagram for each scenario of each use case identified through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

3. Create a behavioral state machine for each of the complex classes in the class diagram.

4. Perform a CRUDE analysis to show the interactivity of the objects in the system.

5. Perform a verification and validation walk-through of each:Revise the requirements document created in Assignment 1 with additional information found in this assignment and document the assumptions.

1. Functional model

2. Structural model

3. Behavioral model

6.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

· Describe object-oriented modeling, structural modeling, and behavioral modeling.

· Develop class diagram based on business scenarios.

· Use technology and information resources to research issues in procuring and designing project requirements.

· Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.

Assignment 3: Design with UML

Due Week 7 and worth 120 points

Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships with Fortune 500 companies. Its areas of services range from software development and network engineering to geo-information systems. It has fifty (50) plus regional offices in U.S. and five (5) offices in Canada. It plans to expand to other countries in the future.

When an ABS client company determines that it will need a contractor or temporary professional, it issues a staffing request against the contract it had previously negotiated with ABS. The contract manager in ABS reviews the staff request and ensures that the request is valid with its current contract with its client from the database.

· If the request is not valid, the contract manager sends the staffing request back to the client and explains the reasons and asks for the need for starting a new contract.

· If the request is valid, the contract manager will start recruiting requests by putting the request into its staffing database. The staffing request is then sent to ABS placement department.

In the placement department, the placement specialists will check the job requirements and candidates qualifications.

· If there is a qualified candidate, the specialist will notify the candidate and put a note in the database.

· If a qualified candidate cannot be found or not immediately available, the specialist notifies contract managers and recruiting department; the recruiting department starts search outside immediately.

The recruiting department normally has thirty (30) days to find an outside candidate and send the qualified candidates to the placement department to review. If an internal qualified candidate is confirmed with his / her availability, the confirmation will be sent to the arrangement department. In the arrangement department, the candidate works with the specialists to further confirm the placement details, such as starting date, location, compensation (e.g., per diem), and travel arrangement. The final confirmation will be sent to the client along with a billing schedule. If the client agrees with the arrangement, he/she acknowledges the arrangement with contract managers in the contract department. The contract manager then puts a memo into its database and closes the request.

Note: You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to four (3-4) page paper in which you:

1. Create a package diagram of the problem domain layer using the communication diagrams and the CRUDE matrix through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

2. Perform and explain the verification and validation walk-through of the package diagram.

3. Create a set of invariants for attributes and relationships and add them to the CRC cards for each class in the structural model using Object Constraint Language (OCL).

4. List the classes in the structure model. Choose one (1) class and create a contract for each method in that class. Note: Be sure to use OCL to specify the preconditions and the post conditions.

5. Create a method specification for each method using both structured English and activity diagram for the algorithm specification through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

6. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

· Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

· Determine the steps and principles of design modeling with UML.

· Document and describe the different state of objects throughout the life cycle.

· Use technology and information resources to research issues in procuring and designing project requirements.

· Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions.

Discussions (around 200 words each)

1

“Data Breach Notification” Please respond to the following:

Data breach laws have made us more aware of how our PII and other corporate data is compromised in recent years.  Intellectual property is often the target of attacks from foreign entities and even governments.  Banks don’t like people to know how much money is stolen annually by hackers; despite their best efforts to prevent such theft.  Discuss your thoughts on the subjects mentioned here based on your learning from this week.

2

“Online Contracts” Please respond to the following:

Online contracts are becoming ubiquitous these days.  They’re sometimes signed online even in face-to-face meetings between parties. Based on your study this week, what are some pitfalls you previously didn’t know?  Describe an online contract or end-user license agreement you signed that made you think.  Do you ever agree to things without fully reading them, even when the signature block says, “I have read and understand”?  What do you think about this now that you have learned about online contracts?

3

“Policies, Standards, Procedures, and Guidelines” Please respond to the following:

This week you studied policies, standards, procedures and guidelines.  If you were the project leader at a small company being spun off from a larger company, how would you tackle the task of adapting your company’s policies regarding information security?  What are some of your greatest concerns?  What rules are you likely to keep and which won’t really apply?  Remember to keep a balance.  You don’t want the employees to be so locked down by rules that they can’t efficiently do their jobs.

4

Object-Oriented Design” Please respond to the following:

· Select an organization that you are familiar with and determine the most advantageous benefits of using object-oriented design in this organization and state why. In addition, explain the places within this organization that object-oriented design is not advantageous.

5

“Data Management Layer Design” Please respond to the following:

· Recommend one to two (1-2) methods to reduce space consumption and increase performance for object-oriented database. Provide a rationale for your recommendations.

6

“Cloud Computing” Please respond to the following:

· Identify the main challenges for provisioning the physical architecture layer with cloud technologies. Additionally, recommend methods to mitigate those challenges.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order