NETWORKING: A KEY TO SUCCESSFUL TEAMWORK

A.     Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries? What are the trade-offs between internal cohesion and external ties within each type of team? Support your discussion with at least two (2) external sources.

B.     Consider the list of common roles for team members which of these roles do you think you play in your own team or group? Why? 

Specific Instructions:

Read and respond to at least 3 of your classmates’ posts. See discussion/posting requirements.

Be sure to support your work with specific citations from this week's Learning Resources and any additional sources.

Read a selection of your colleagues' postings.

Respond to at least 3 of your colleagues' postings in one or more of the following ways:

• Ask a probing question, substantiated with additional background information, evidence or research.

• Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.

• Offer and support an alternative perspective using readings from the classroom or from your own research in the Campbellsville University Library

• Validate an idea with your own experience and additional research.

• Make suggestions based on additional evidence drawn from readings or after synthesizing multiple postings.

• Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence.

Return to this Discussion several times to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

Respond to class mate:

Class mate 1:

Part One:

Mindful helpful individuals are the gathering who achieve their endpoints by remaining indisputable after at all is left-hand of the suggestion ordinarily to prosperity and watchful nuances. Allocation helpful individuals are the gathering middles private pending the littler than anticipated that the minute that would be typical up to the presentation a remark meaning. It is a to around grade tied down and out a gathering that has top interior unflinching splendor. Around few subjects, individuals may not be held to wrinkle the arrangement wherever the chairman would then be an ability to necessarily pick chance individuals and administer to the distinctive arrangement sides rendering to the scope of capacities and information presentation pointers with the general population. The Advertising agreeable individuals the consideration amassing is the social event who directs proceeding with the substances and organizations conceivable by the business meaning. The general population from this gathering control the insufficient period improvements. By then the additional disapproving of for the most part depicts all together how the general population principal to tell with the additional collection of gathering investments, which generally disperses an inquiry if the general population are been the enlistments to be in complex arrangement sides. At the fundamental good valuation meeting, substance were moved among gathering accomplices, as it was clear that generally assemble accomplices weren't causative. 

Part Two:

Gathering specialists are seen to center in the midst of immense ramifications then they would thin close not to lean toward remarkable flat, one put side association before their essential exhibition limits. Fundamentally, regardless, the assention was done at this gathering substance should be moved, and recommendations were done around how to impel the condition, shock between gathering accomplices exacerbated. This was strong from the elucidation's life made completed the kept related periodical paths independently week. In any case to your scope of capacities or the effort keeping in touch with, it is perpetually outstandingly enormous and obligatory to add to the effort as an alternate inside the get-together of implications. Generally every unique is relegated or administered to an arrangement dependent upon the predefined limit evaluation. Request changes the social event emotions and ends into genuine techniques. On a side, they are the detail that they are off kilter to exposure and revealed since they reflect as total and try to control the get-together to shadow the last appearances. The parallel exceptional enlightenments past due elective this offer are I exhaust the volume of releasing up subjects amidst individuals. By spreading this tendency, I can keep up an orchestrated hold from clatters and paying little heed to whether the conflicts happen can be settled.

class mate 2:

1: Effective teamwork is an important aspect of any organisation’s success. There are many benefits of teamwork, most notably, an increase in motivation from your employees. A recent study by Stanford University showed that when people are treated as partners or team members – even when physically apart – their motivation increases. Motivation from your employees means more success for your company.

Developing an effective team in your organisation can seem like a simple and straightforward task, however it can be difficult to execute and put into practice. Members of your organisation want to be able to believe in the process and realise the wonderful outcomes that come from working together as opposed to individually; so it is up to the manager to ensure that enthusiasm is garnered and nourished.

The most important building block to develop and effective team is communication, so it is imperative to develop the necessary skills to communicate effectively with each other.

You want your employees to feel like they can put forth their ideas and express their feelings in an open environment, but you also need them to be keen listeners who are prepared to listen to the views of others. It can be easy for a team to fall apart quickly if its members favour their own personal goals over that of the team.

To keep the teamwork fire going, you need to establish regular and open lines of communication and monitor how the group interacts. Learning to communicate effectively is not a simple one step process and requires work from all sides. It is a great idea to have weekly meetings in which the manager is present in order to see how the team interacts with each and offer feedback on their achievements, as well as how the team meetings are running.

An effective team is one that has cohesion, to do this your team members need to exhibit the following skills:

Openness – Team members need to be willing to get to know each other and open up about themselves, so they realised that they all have diverse backgrounds and interests. This helps them to be more open to new ideas and differing viewpoints.
Trust – Team members need to trust each other enough to be comfortable with sharing ideas and feelings. As this trust builds, team members learn to be honest and respectful in their approach to each other.
Respect – It is important for the team not to focus on who to blame when something goes wrong, instead they need to work out how to fix it and how to learn from the mistake. Constructive feedback and mutual respect rather than blame will help a team achieve results much faster.

Work teams are successful only with the right mix of skills, personalities and commitment to the team process. Employers benefit from work teams since they permit workers with different skill sets to collaborate toward one common goal. Employees can find a sense of camaraderie and motivation through team involvement if they are tapped to work with others who complement what they bring to the table.

Right People

Successful teamwork requires the right leader and the right mix of team members. Each individual should have an established role and be equipped with the specific skills to fulfill it. Once the team is up and running, members must build trust, and respect each other's place within the group. The team leader must be skilled in conflict-resolution and be able to guide the group toward its goal by providing feedback and advice to individual members and keeping everyone motivated.

Clear Goal

Team members must have a clear objective and a shared commitment to the team goal. Without a specific outcome in mind, members may lose motivation to fulfill their parts of the project. Task planning is difficult because the direction is uncertain. In particular, when a team goal is consistent with the values of individual team members, camaraderie is enhanced since members share a vision for and desire to work toward the outcome.

Effective Processes

Team members must validate team processes such as conflict resolution and decision making by respecting those processes and participating in them. Established methods for getting past disagreements ensure the team continues to move forward toward its goal. An acceptance of work division by team members means every member is accountable for his work completion and the combination of efforts results in a quality outcome.

Acceptance of Other Members

For a team to work well, team members must demonstrate good interpersonal skills, which means they must work well with their colleagues, proceeding with minimal conflict. Members must understand everyone's role on the team and defer to another when the skills of a colleague are superior to their own. They must also demonstrate patience and understanding when a team member demonstrates skill limitations or a difference in working style; as long as all elements of the project are covered, and work is distributed equally, team members need not be all things to all people.

working as a group

Numerous Engineering units include undertakings and examinations that are attempted by little groups or gatherings of around 4 or 5 understudies. Why work in groups? There are a few decent reasons: • Engineers work in groups, so it's great to build up these abilities as ahead of schedule as could be expected under the circumstances. • Research demonstrates that we as a whole gain viably from each other. Thus, your groups ought to learn groups, with the attention on helping each other to learn. • Teams are considerably more compelling than people for take a shot at complex ventures. • Teamwork builds up your relational aptitudes in adapting to struggle, in being an administrator, in building up your association and responsibility and in building up your feeling of confidence. This guides your self-improvement and your non-business related connections.

Powerful groups Why do a few gatherings achieve practically nothing, while others accomplish significantly more? This distinction stems especially from the procedures inside the gathering – its internal elements or workings. The highlights of a compelling group include: • joined collective endeavor of all individuals • clear objectives • gather individuals concentrated on learning • shared trust and support • open correspondence • vote based procedures

Capitalizing on your group

There are numerous focal points of working cooperatively with different understudies. To benefit as much as possible from your experience as a colleague, recall to: • Become effectively. Try not to sit tight for another colleague to do all the work. • Share – open correspondence and the commitment of thoughts and data is basic for effective and exceedingly performing groups. • Learn to work helpfully. The achievement of your group will rely upon helping each other. • Respect your kindred colleagues. Know that each colleague will have one of a kind abilities and methods for learning. Not every person learns by a similar procedure. • Use your opportunity profitably and successfully. Characterize clear objectives – the main priority, by whom and why? • Expect achievement – be eager and positive. • Meet with your gathering individuals frequently. • Ask your mentor for visit criticism – that is the guide's part. • Maintain a comical inclination – keep things in context. • Hang in there – building up a decent group is diligent work and requests duty from all colleagues

classmate 3:

  The association of get-together breaking points is a sincere bit of a get-together and the achievement of the social event's exercises. Social event limits consolidate the scope of the get-together, the relationship between the general population and the modifications in the get-together over a given time designation. The extent of the social affair relies on the get-together's extension and goals and the exercises did by the general population. (Chandrasekara, C. (2018), et al. The general population ought to have a relationship which supports and updates the viability of the social affair. Likewise, the best should incorporate a section to make each other to the degree aptitudes and learning through seeing of one another's qualities and shortcomings. The tradeoffs between the social occasion's internal affiliation and outside ties incredibly rely upon the sort of the movement did by the get-together. The get-togethers in which a lot of their tasks is outside made exercises, their outer affiliation is solid since they depend apparently on data. Social affairs which by a wide margin the greater part of their exercises is inside, they need to guarantee that their internal ties are solid with the target that they can team up viably to give results. Precisely when the interior affiliation is high the outside ties will all things considered be frail since by a long shot the vast majority of the exertion is pulled towards within issues. 

The get-together has unquestionable people with various limits and experience which impacts them to have differentiating attributes and shortcomings. (Funnell, P. (2015). The accomplices have different occupations in their social affairs which urges them to arrange towards accomplishing the get-together's goals. There is the general population who are the facilitators of the social affair and they guarantee the well-ordered exercises of the get-together are running adequately and each part is fused. The implementer has the commitment to guarantee that the choices made and the planned exercises have been executed the correct course and at the ideal time. The social occasion producer keeps the assembling and guarantees each part is progressing toward the accomplishment of the get-together's shared target. The finisher work is the part who reason the perfection and climax of the errand given to the get-together. The general population having these occupations should all team up towards the accomplishment of the social affair's shared objective.

Is this the question you were looking for? Place your Order Here

Propose an incident response plan to prepare an organization (Sony Pictures Entertainment) in the event of an attack

If you are completing your ongoing project on Sony Pictures Entertainment, you are required to create an incident response plan that the organization should have followed in light of the 2014 hack. For example, detail the detection, analysis, and containment strategies it should have employed, the crisis communications plan it should have adhered to, and recommendations for successful eradication and recovery. 

Introduction 

It is important for your incident response strategy to meet the requirements of Sony Pictures context. Write a short introduction summarizing your type of organization Sony Pictures Entertainment), and an overview of the business-critical assets Sony Pictures Entertainment relies on.  What are Sony's Critical infrastructure / Assets?

(Approx. 150 words) 

Step 1: Prevention

Describe the measures Sony Picture Entertainment will take to protect against a cyberattack from both a technical and non-technical perspective. 

(Approx. 150 words)

Start writing here: 

Step 2: Planning 

List the individuals involved in your incident response team and their roles (SPE). Ensure that the roles, responsibilities, and structure of your team meets the requirements of your organizational context. 

A cyber crisis communication plan is compiled in this phase, but in this incident response plan, include your plan under Step 7: Communication.  

(Approx. 200 words) 

 Start writing here: 

Step 3: Preparation 

You are required to detail one training exercise the incident response team will undergo. Include specific examples of scenarios or questions, and explain why you have chosen it. 

(Approx. 150 words) 

Start writing here: 

Step 4: Detection

List the tools Sony Pictures Entertainment would use to detect a breach. 

(Approx. 150 words) 

Start writing here: 

Step 5: Analysis 

Explain how Sony Pictures Entertainment would analyze whether an incident is a cyberattack. Also describe how you would categorize and prioritize cyberattacks in Sony Pictures Entertainment.

(Approx. 200 words) 

Start writing here: 

Step 6: Containment 

Describe how your SPE would prevent a cyberattack from spreading further.

(Approx. 200 words) 

Start writing here:

 

Step 7: Communication 

As per Section 4 of the Unit 2 notes, compile a cyber crisis communication plan detailing the internal and external stakeholders SPE would need to communicate to in the event of a breach. Describe what communication channels would be used to communicate with these stakeholders. 

(Approx. 250 words) 

Start writing here: 

Step 8: Eradication 

Provide insight into the approaches and decisions the team will take to remove the threat from Sony’s internal system.

(Approx. 150 words)  

Start writing here: 

Step 9: Recovery

Describe what steps SPE will take to return to its normal operations. 

(Approx. 150 words) 

Start writing here: 

Step 10: Post-event analysis 

List the processes that would need to be followed to ensure that lessons learned are implemented. 

(Approx. 150 words) 

Start writing here: 

Note: 

The word counts for each question serve as a guide; your submission should not exceed 2,000 words in its entirety.  

Note: 

The incident response plan is a central part of an Sony’s cyber risk mitigation strategy. Please consult the grading breakdown in the Orientation Module course handbook for more information.  

Your ongoing project submission will be graded according to the following rubric:

Very poorPoorSatisfactoryVery goodExceptional

Adherence to brief 

All sections in the template are completed. 

Answer falls within the prescribed word count (2,000 words). 

No submission.

OR

Student fails to address any element of the brief. (0)

Some key elements are not addressed. Most information provided is irrelevant.  

OR 

Answer does not fall within the prescribed word count (100 words over the word count). (5.5)Student adheres to most of the brief. Sufficient information is provided and is mostly relevant. (7)Student adheres to almost all elements of the brief. Almost all information is provided and is relevant. (8.5)Student fully adheres to the brief. All information provided is comprehensive and relevant. (10)

Organizational context and preventative measures 

Student clearly outlines the context of their chosen organization, and the business-critical assets this organization relies on.

Student accurately describes the measures the chosen organization will take to prevent a cyberattack from both a technical and non-technical perspective. 

Student thinks critically and incorporates learnings from the content.No submission.

OR 

Student fails to clearly outline the context of their chosen organization and the measures it will take to prevent a cyberattack from occurring. 

There is no evidence that the student has used the content covered in the course to inform their response. (0)Student shows an incomplete understanding of their chosen organization’s context and the measures taken to prevent a cyberattack from occurring. 

There is some evidence that the student has engaged with the content covered in the course, but this is not always accurately applied. (5.5)Student demonstrates satisfactory understanding of their chosen organization’s context and the measures taken to prevent a cyberattack from occurring.  

The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)Student demonstrates a strong understanding of their chosen organization’s context and the measures it will take to prevent a cyberattack from occurring. 

The answer shows a strong grasp of the content. (8.5)  Student demonstrates a thorough and an incisive understanding of their chosen organization’s context and the measures it will take to prevent a cyberattack from occurring. 

The student critically applies their learning from the course. (10)

Planning and preparation

Student lists the individuals that will be involved in their chosen organization’s response team, and their roles.

Student details one training exercise the incident response team will undergo to prepare them for a cyberattack, and provides reasoning for their choice.

Student thinks critically and incorporates learnings from the content.No submission.

OR 

Student fails to clearly identify the individuals who will be included in the incident response team, or the training that will be required to prepare this team for an attack.

There is no evidence that the student has used the content covered in the course to inform their response. (0)Student shows an incomplete understanding of the individuals who will be included in the incident response team, and the training that will be required to prepare this team for an attack.

There is some evidence that the student has engaged with the content covered in the course, but this is not always accurately applied. (5.5)Student demonstrates satisfactory understanding of the individuals who will be included in the incident response team, and the training that will be required to prepare this team for an attack.

The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)Student demonstrates a strong understanding of the individuals who will be included in the incident response team, and the training that will be required to prepare this team for an attack.

The answer shows a strong grasp of the content. (8.5)  Student demonstrates a thorough and an incisive understanding of the individuals who will be included in the incident response team, and the training that will be required to prepare this team for an attack.

The student critically applies their learning from the course. (10)

Detect, analyze, and contain

Student lists the tools their chosen organization would use to detect a breach.

 

Student explains how their chosen organization would analyze whether an incident is a cyberattack, and how they would categorize and prioritize cyberattacks. 

Student describes how their chosen organization would prevent a cyberattack from spreading further.

Student thinks critically and incorporates learnings from the content.No submission.

OR 

Student fails to clearly identify the tools their organization would use to detect a breach, how their organization would go about analyzing, categorizing, and prioritizing an attack, and how their organization would prevent a cyberattack from spreading further.

There is no evidence that the student has used the content covered in the course to inform their response. (0)Student shows an incomplete understanding of the tools their organization would use to detect a breach, how their organization would go about analyzing, categorizing, and prioritizing an attack, and how their organization would prevent a cyberattack from spreading further.

There is some evidence that the student has engaged with the content covered in the course, but this is not always accurately applied. (5.5)Student demonstrates satisfactory understanding of the tools their organization would use to detect a breach, how their organization would go about analyzing, categorizing, and prioritizing an attack, and how their organization would prevent a cyberattack from spreading further.

The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)Student demonstrates a strong understanding of the tools their organization would use to detect a breach, how their organization would go about analyzing, categorizing, and prioritizing an attack, and how their organization would prevent a cyberattack from spreading further.

The answer shows a strong grasp of the content. (8.5)  Student demonstrates a thorough and incisive understanding of the tools their organization would use to detect a breach, how their organization would go about analyzing, categorizing, and prioritizing an attack, and how their organization would prevent a cyberattack from spreading further.

The student critically applies their learning from the course. (10)

Communicate and eradicate

Student compiles a cyber crisis communication plan detailing the internal and external stakeholders their chosen organization would need to communicate to in the event of a breach, and describes what channels would be used to communicate with these stakeholders.

Student identifies the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system.

Student thinks critically and incorporates learnings from the content.No submission.

OR 

Student fails to clearly compile a cyber crisis communication plan, or to describe what channels would be used to communicate with stakeholders during a cyberattack.

Student fails to identify the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system.

There is no evidence that the student has used the content covered in the course to inform their response. (0)Student shows an incomplete understanding of a cyber crisis communication plan and the channels that would be used to communicate with stakeholders during a cyberattack.

Student shows an incomplete understanding of the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system.

There is some evidence that the student has engaged with the content covered in the course, but this is not always accurately applied. (5.5)Student demonstrates satisfactory understanding of a cyber crisis communication plan, and the channels that would be used to communicate with stakeholders during a cyberattack.

Student demonstrates a satisfactory understanding of the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system. 

The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)Student demonstrates a strong understanding of a cyber crisis communication plan, and the channels that would be used to communicate with stakeholders during a cyberattack.

Student demonstrates a strong understanding of the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system.

The answer shows a strong grasp of the content. (8.5)  Student demonstrates a thorough and an incisive understanding of a cyber crisis communication plan, and the channels that would be used to communicate with stakeholders during a cyberattack.

Student demonstrates a thorough and incisive understanding of the approaches and decisions the team will take to remove the threat from their chosen organization’s internal system.

The student critically applies their learning from the course. (10)

Recovery and post-event analysis

Student describes what steps their chosen organization will take to return to its normal operations after a cyberattack. 

Student lists the processes that would need to be followed to ensure that lessons learned are implemented. 

Student thinks critically and incorporates learnings from the content.No submission.

OR 

Student fails to clearly describe the steps their organization will take to recover from a cyberattack, or the processes that will be followed to ensure that lessons learned are implemented. 

There is no evidence that the student has used the content covered in the course to inform their response. (0)Student shows an incomplete understanding of the steps their organization will take to recover from a cyberattack, and the processes that will be followed to ensure that lessons learned are implemented. 

There is some evidence that the student has engaged with the content covered in the course, but this is not always accurately applied. (5.5)Student demonstrates satisfactory understanding of the steps their organization will take to recover from a cyberattack, and the processes that will be followed to ensure that lessons learned are implemented. 

The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)Student demonstrates a strong understanding of the steps their organization will take to recover from a cyberattack, and the processes that will be followed to ensure that lessons learned are implemented. 

The answer shows a strong grasp of the content. (8.5)  Student demonstrates a thorough and an incisive understanding of the steps their organization will take to recover from a cyberattack, or the processes that will be followed to ensure that lessons learned are implemented. 

The student critically applies their learning from the course. (10)

Application of course content to organizational context

Student accurately applies the learnings from the course content to their own organization or Sony’s unique context. No submission.

OR

The student has not made use of their organization's unique organizational context and constraints to inform their response. (0) Student demonstrates a limited understanding of their organization's unique context and constraints and context. (5.5) Student demonstrates a satisfactory understanding of their organization's context and constraints; however, a there is room for deeper engagement with its nuances. (7) There is clear evidence that the student has thought about their organization's unique context and constraints, and catered for this in their strategy accordingly. (8.5)There is strong evidence that the student understands and thinks carefully about their organization's unique context and constraints, and has provided recommendations in their strategy accordingly. (10) 

Organization of writing

Answers are structured clearly and logically.

No submission or complete lack of logical structure. (0)

Answer has some logical structure, but not enough to justify a passing grade. (5.5) Answer is structured fairly well in terms of logic and clarity. (7)Answer is structured very well in terms of logic and clarity. (8.5) Answer is structured exceptionally well in terms of logic and clarity. (10)

Total: 80 marks

Is this the question you were looking for? Place your Order Here

Discussion Conflict with Teams

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Specific Instructions:

Read and respond to at least 3 of your classmates’ posts. See discussion/posting requirements.

Be sure to support your work with specific citations from this week's Learning Resources and any additional sources.

Read a selection of your colleagues' postings.

Respond to at least 3 of your colleagues' posts in one or more of the following ways:

• Ask a probing question, substantiated with additional background information, evidence or research.

• Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.

• Offer and support an alternative perspective using readings from the classroom or from your own research in the Campbellsville University Library

• Validate an idea with your own experience and additional research.

• Make suggestions based on additional evidence drawn from readings or after synthesizing multiple postings.

• Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence.

Return to this Discussion several times to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

Reply to class mates:

Class mate1:Part:1

All managers and executives a short time later have required to overseeing conflict. The system that everybody handles war of words is additionally a particular a locale of improvement. At first, she or he should pass on to choose up partner degree low evaluated cognizance of what's causing the foundation development.

Workers frequently have measure up to objective anyway unmistakable philosophies for leading it. Neither one in every one of the faculty' procedure may likewise perhaps not be right, nor may moreover one strategy be less gainful than the decision may furthermore. Sam and Ray (2009, 2010) to join depicting as Hastings takes see of, the obligation for strategy, or thought, is that the trouble that has each specialist joy. At the point as in the blink of an eye as ways affect, a fundamental increment closer to devotion is for boss to encourage staff to build up all the bigger decidedly their procedures. Next, heads should ask for that agents advocate their styles and overview them as a social event. According to Hastings, delegates can take note of that dependably a blend of the procedures is that the best affiliation.

Understanding and in regards to the stunning perspectives identifying with war unit of measurement enter parts in its attestation. These units of size key aptitudes for all accessories to frame. The direct issue is to remain up a stable modify of profitable refinement of investigation, and maintain a strategic distance from unfortunate clash this is regularly ruinous and intense. Getting to, and rationing, that other needs all around made gathering aptitudes, considerably the possibility to select clash once it'll happens, and mutually the possibility to remain it strong and sidestep battle at interims the standard heading of get-by and large working. We have a tendency to should take a goose at exchange off in any case, by exploitation then at checking it (Jack2012, p.41).

As respected by get a few records identifying with by way of Stanford coach Carol Dweck and her associates clear people expect that people's execution reflects either their regular thought process of limit identifying with that change or the live of efforts they require got directed to gather a wound.

Part:2

Getting straight to the point, genuinely, any execution reflects a blend of limit and fondness. you will be prepared to refresh in scholarly degree horribly across the board sense any pioneer with a tremendous live of arranging, anyway at lengths the event earnestly essentially can on its essence be the chief perfectly energizing on the world at one trouble it's as one charming to have some motivation behind constraint identifying with it.

Ramon (2012) says Investigating an authentic focus to position at spans the lively depictions to remain a bowed, you must envision that the advancement awfully might be a limit you will have the capacity to analyze. When you agree to as valid with the development might be a kingdom of suppression at that point you're doing not venture to hook at it, since you trademark any has to your execution to your human development of generally serious.

You might want to unendingly stretch out your understanding base to ask the certainties. Also, advancement relies on information.

Effectively seize new experiences to enlarge your skill portfolio, that is ready to create extra contemplations into your natural.

Perceiving new example, which may be idea of as partner sheepskin trouble's zero, is viable anyway bear in considerations in this manner on not decisively discover you some bit of it.

Rising imaginative contemplations or considerations and along horrendously depictions on the execution zero and development with a specific hand over goal to bring a test into reality p (41).

As Jinnee's (1987) Regardless of what you comprehend or what undertaking you are in, you will be prepared to indicate out be apparently a great deal of astute in what you are doing. Creative ability unit normally used to make matters, system and organizations higher and it territory unit regularly connected to make them at any rate. It's most well-known that developing your inventiveness can help you, your affiliation and your buyers develop to be more joyful through update at interims the amount of yield and together the standard.

Class mate 2:

Group clashes and their goals 

Section 1 

Clashes are one of the basic things which happen in a group. Clashes for the most part happen when colleagues center more around their own perspectives as opposed to on the fundamental objectives of the group. One of the contentions which I have encountered in my group is the contention over the initiative position in the group. This happened when the colleagues were casting a ballot on the pioneers they wish to have. A portion of the fundamental sources which prompted this contention were, a portion of the individuals were against the chosen pioneer and furthermore the way that the picking of the pioneer was not free and reasonable (Wong et.al, 2018). A portion of the mediations which might be utilized to enhance the nature of contention I a group are by enabling every part to give their perspectives with respect to the current contention and furthermore by watching decency in the group where by one isn't inclination with regards to settling on choices in regards to the prosperity of the group. 

Section 2 

Inventiveness is for the most part around one concocting certain choices which are respected impactful in a group. A portion of the key files of innovativeness are, intentional and intellectual, unconstrained and subjective, the purposeful and passionate imaginative reasoning. The primary file that suits my imagination in basic leadership is the conscious and subjective state of mind. This is for the most part in light of the fact that the vast majority of my choices are affected by the motivation behind the current plan. Likewise I will in general make an intensive research on an issue before settling on the effective method for handling the specific issue (Jiang et.al, 2016). A portion of the methodologies which I may use to upgrade my innovativeness are by organizing my very own conceptualizing in order to get shifted thoughts concerning an issue. Likewise I may will in general energize some face to face collaborations and correspondences and additionally giving time for the retention of the contribution before giving a yield on the specific issue

Class mate 3:

I once worked for a telecommunication company as information security administrator, I was tasked with implementing security policies as well as conducting security awareness training to employees. One day senior management decided to introduce a new application in the IT department, the management didn’t consult the IT department on the new application. Introduction of the new application led to conflict among employees since there was no clear guidelines on roles each employees was supposed to play. There was also conflict between departments as a result of changes brought by the new application which employees were not used to.

The main causes of this conflict was lack of proper communication and lack of proper training. The management failed to communicate with employees about their intention to introduce the new application, this led to conflict since the new application came as a surprise. Lack of proper training also led to conflict as employees didn’t know what to do with the application. To avoid the conflict, the management could have conducted a proper training on the new application before installation, communication between the senior management and the employees could have also improved the quality of conflict between employees (Baraldi & Iervese, 2010).

My creativity level is fluency, I have the ability to generate many solution that fit some requirements. To enhance creativity, it is important to concentrate on something you love, doing soothing that like can improves one creativity. Collaboration with others can also improve your creativity, exchanging ideas with others automatically lead to creativity (Suckley & Nicholson, 2018). Being curious is another way to enhance creativity, the moment one become curious to things that he or she doesn’t even know he or she become creative. Reading books or learning new skills that interest you improves creativity since the more materials you store in your head the more creative you become.

Is this the question you were looking for? Place your Order Here

 Discussion-1

Electronic Health Record: Definition
The paper chat which contains patient data, basically which is in the digital version. This will make the patient data available to the authorized users in the very secure way. It is mainly maintained and generated only by the authorized individual. These are created in the way that it should be shared to other organizations, labs, schools, work clinics, so that they will maintain information related to that individual. EHR mainly contains Treatment plans, medications, allergies, test results of individual, radiology images.
Redaction: In general, it means editing or correcting the original form of data before giving to the other departments. In some of the department it is very important, as EHR contains the sensitive information it should be redacted.
My personal suggestion here is, as the data should be seen by other departments if we pass to labs or schools to know the health condition of the individual, we should encrypt the data before handling to any other organization. They should have some authorized software’s to decrypt that data. Let me example with example, some of the companies stores EHR or PII of the individual, which they will need for only certain period of time, as they won’t use after that if they still store in the database, there is rise of hacking that data, if they redact that the chances of hacking will be less.
Different ways of redaction:
a) Page Location: If suppose we will be getting personal data or EHR of all individuals in the same location of consistent type in file, it is easy to hack that data. The solution here is jumble the consistent data using some tools or software’s. It is not only up to file level, it applied to the data base too.
b) Pattern Matching: This is also one of the ways to redact, the difference between these and above one is the way the data is getting, if we suppose take account number it has some alphabets and some numbers, just use the tool to script that.
The ideal conditions to redact the document is after completing the work, before the disposal. It is not good idea to redact if the work is in progress.
According to the HIPAA they passed a rule that no EHR should be redacted, it should be in the way as it is previously. Although protecting data in EHR is important it doesn’t mean the data should be redacted. Any one who tried to access the data who has no privileges will be fined. The ultracareful and attentive steps should be taking to protect that HER.
In general redaction and deidentification can be done manually
Advantages of EHR:
1)It has exact and full information about the patient till the date.
2)It helps in sharing the patient information securely with other departments.
3)It enable provider for improving the efficiency and meet their goals.
4)Reliable way to transfer the data.
5)Communication and interaction with the patient is more effective if the record has history.
6)Financially thinking as no paper involved in this cost will be reduced.
Reference Links
https://www.healthit.gov/faq/what-electronic-health-record-ehr
https://www.healthit.gov/faq/what-are-advantages-electronic-health-records
https://opin.com/intro-to-redaction/

Discussion 2:

 

It is the responsibility of healthcare leader to keep the security of patient records. Preserving the privacy, accuracy, and control of patient data is one of the most important roles in the care setting. The extended enforcement of HIPAA, leaders supervision, the disclosure of information, need to be more cautious now than they have been in the past. Their procedures for managing the release of protected information required to meet the requirements of the law and what's in the best interest of their patients (Tucker, et al., 2016). A major grow in HIPAA enforcement is underway now that the regulation has matured, and enforcement of violates is happening at a more quick pace driving healthcare's leaders to increase IT spend to execute systems that better protect health information of their patient. Planned to protect the privacy and security of healthcare information, HIPAA enforcement has been missing up to this point mostly because federal funds to maintain it has been limited (Nelson, 2015).

In the year 2011, the HHS awarded a $9.2 million contract to KPMG to launch the audit program as a directive by the HITECH Act. The HITECH act extended some privacy and security requirements of HIPAA and set the stage for greater enforcement such as increasing the scope of the law, enacting more significant penalties for noncompliance, adding breach notification requirements to entities and Opening the way for implementation by state attorneys general. The HITECH act and increased HIPAA regulations enhanced the responsibility of health systems to protect and manage the information of the patient (Emam, et al., 2009).  As such, tools providing redaction abilities that automate the elimination of PHI, and integrate with presented technology like electronic health records to search and eliminate any protected information are becoming a necessity.

The privacy rules of HIPAA provided standards to protect personal information and medical information of patients. It applies to healthcare clearinghouses, health plans, and providers that contain some healthcare transactions electronically. The rules put a restriction on release of information without the authorization of the patient. The privacy rule allows two methods of redaction such as the absence of information that could be used to individual identity and a formal determination by a qualified expert (Divanisa, Loukides, & Sun, 2014). Removing risks associated with the release of PHI is possible with automated redaction solutions. They remove data fields such as names of patients, medical lists and other general information in the health record. The systems save money and time and ensure HIPAA compliance throughout ROI for health systems.

The HIPAA Safe Harbor standards, 18 identifiers related with the patient, their household members, relatives, and employers must be removed including name, mobile numbers, fax numbers, email addresses, and medical record numbers. The healthcare organizations find new ways to secure the health records of the patient (Narayanan, Huey, & Felten, 2016).  To mitigate HIPAA infractions, healthcare providers should consider shifts in IT spending for protective technologies. As the execution of systems such as EHRs can direct to leaner, well-organized procedures in the care setting, the same can be said for automated redaction. These solutions make sure security during the ROI procedure and give extra security to violating.

Reference

Divanisa, A. G., Loukides, G., & Sun, J. (2014). Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics, 50, 4-19.

Emam, K. E., Dankar, F. K., Issa, R., Jonker, E., Amyot, D., Cogo, E., . . . Bottomley, J. (2009). A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. Journal of the American Medical Informatics Association, 16(5), 670–682.

Narayanan, A., Huey, J., & Felten, E. W. (2016). A Precautionary Approach to Big Data Privacy. Data Protection on the Move, 357-385.

Nelson, G. S. (2015). Practical Implications of Sharing Data: A Primer on Data Privacy, Anonymization, and De-Identification . SAS Global Forum Proceedings, 1-23.

Tucker, K., Branson, J., Dilleen, M., Hollis, S., Loughlin, P., Nixon, M. J., & Williams, Z. (2016). Protecting patient privacy when sharing patient-level data from clinical trials. BMC medical research methodology, 16(1), 7

Is this the question you were looking for? Place your Order Here

  

The importance of cybersecurity governance as a fundamental aspect of protecting an organization’s information systems

Question 1

Unit 1 focused on various leadership roles and their respective responsibilities in implementing an effective cybersecurity governance plan. Consider the leadership roles (CEO, CSO/CIO, and Program Managers) in Sony organization and their responsibilities in implementing the organization’s cybersecurity strategy: 

· Explain the Sony’s organization’s governing structure, and its approach to cybersecurity. you may extrapolate the formal roles from the data available and contrast this with what was observed. 

· Based on your substantiation above, recommend changes that should be implemented and, if applicable, propose a new cybersecurity leadership plan that addresses it Sony’s shortcomings. 

·  (Approx. 300–400 words)

Question 2

Unit 2 of this module described the management processes organizations should consider when developing a cybersecurity governance plan. 

● Evaluate why the management processes utilized by Sony were insufficient to ensure good cybersecurity governance; and 

● Based on your substantiation above, recommend management processes that would have addressed Sony’s shortcomings in implementing a cybersecurity governance plan and should be adhered to going forward. 

(Approx. 300–400 words)

Question 3

Unit 3 focuses on the importance of keeping an organization’s cybersecurity awareness updated. To do so, think of types of Cybersecurity awareness training that are available and the topics that should ideally be included in training programs. In your answer, address the following:

· If relevant, identify any cybersecurity awareness programs or practices utilized by Sony. 

· Based on your substantiation above, provide an outline of a cybersecurity awareness program you would suggest for Sony. 

Your outline of the training program should cover the following three aspects:

1. The type of security awareness training (classroom or online);

2. The topics included in the training program; 

3. The target audience; and

4. The roles and responsibilities of those responsible for executing the training program.

Each aspect should be accompanied by reasons for your choices based on the organization’s context and needs. 

(Approx. 300–400 words)

Note: 

The word counts for each question serve as a guide; your submission should not exceed 1,200 words in its entirety. 

submission will be graded according to the following rubric:

   

Very   poor

Poor

Satisfactory

Very   good

Exceptional

 

Adherence   to brief 

Student   answers all the three questions, which include: a cybersecurity leadership   plan;  cybersecurity management   processes; and an outline of a cybersecurity awareness program.

Answer   falls within the prescribed word count (1,200 words). 

No submission.

OR

Student fails to address any element   of the brief. (0)

Some key elements are not addressed.   Most information provided is irrelevant.

OR 

Answer does not fall within the prescribed word   count (100 words over word count). (5.5)

Student adheres to most of the brief. Sufficient   information is provided and is mostly relevant. (7)

Student adheres to almost all elements of the   brief. Almost all information is provided and is relevant. (8.5)

Student fully adheres to the brief. All   information provided is comprehensive and relevant. (10)

 

Question 1: 

Insight   into an organization’s leadership roles and their associated responsibilities   in implementing cybersecurity governance 

Student   demonstrates their understanding by identifying the roles organizational   leaders play in implementing cybersecurity governance strategies, evaluating   the effectiveness of an organization’s leadership structure in relation to   cybersecurity governance, and recommending changes to improve how an   organization’s leadership executes cybersecurity strategies.

No submission.

OR 

Student fails to demonstrate even   basic understanding of the responsibilities of organizational leaders, and   does not evaluate the leadership structure’s effectiveness or proposed   recommended changes. (0)

Student shows an incomplete understanding of the   responsibilities of organizational leaders and does not evaluate the   leadership structure’s effectiveness or proposed recommended changes. (5.5)

Student demonstrates a satisfactory understanding   of the responsibilities of organizational leaders and evaluates the   leadership structure’s effectiveness and proposed recommended changes. (7)

Student demonstrates a strong understanding of   the responsibilities of organizational leaders, and their evaluation of the   leadership structure’s effectiveness. Recommended changes illustrate a degree   of insight. (8.5)

Student demonstrates a thorough and an incisive   understanding of the responsibilities of organizational leaders, and their   evaluation of the leadership structure’s effectiveness. Recommended changes   illustrate great depth of insight. (10)

 

Question   2:

Insight   into an organization’s cybersecurity management processes

Student   demonstrates their understanding by accurately describing management   processes that are essential to an organization’s cybersecurity, evaluating whether   an organization’s management processes are sufficient to ensure good   cybersecurity governance, and providing recommendations for management   processes that would improve an organization’s cybersecurity governance. 

No submission. 

OR 

Student fails to demonstrate even basic   understanding of the management processes that are essential to an   organization’s cybersecurity and does not evaluate the organization’s   management processes or recommended changes. (0)

Student shows an incomplete understanding of the   management processes that are essential to an organization’s cybersecurity, and   did not provide a satisfactory evaluation of the organization’s management   processes, and does not provide satisfactory recommended changes. (5.5)

Student demonstrates a satisfactory understanding   of the management processes that are essential to an organization’s   cybersecurity and evaluates the organization’s management processes and   recommended changes. (7)

Student demonstrates a strong understanding of the   management processes that are essential to an organization’s cybersecurity, and   their evaluation of the management processes. Recommended changes illustrate   a degree of insight. (8.5)

Student demonstrates a thorough and an incisive   understanding of the management processes that are essential to an   organization’s cybersecurity, and their evaluation of the management   processes. Recommended changes illustrate a great deal of insight. (10)

 

Question   3: 

Insight   into cybersecurity awareness and training 

Student   demonstrates their understanding by providing a substantial description of   the types of cybersecurity awareness training, the topics that should be   covered in cybersecurity awareness training, and the roles and   responsibilities of those who need to execute the training program.

No submission.

OR 

Student fails to demonstrate even   basic understanding of cybersecurity awareness training and does not evaluate   the organization’s training program or recommended changes. (0)

Student shows an incomplete understanding of   cybersecurity awareness training and does not provide a satisfactory   evaluation the organization’s training program, and does not provide   satisfactory recommended changes. (5.5)

Student demonstrates a satisfactory understanding   of cybersecurity awareness training and evaluates the organization’s training   program and recommended changes. (7)

Student demonstrates a strong understanding of   cybersecurity awareness training and evaluates the organization’s training   program. Recommended changes convey a   degree of insight. (8.5)

Student demonstrates a thorough and an incisive   understanding of cybersecurity awareness training and evaluates the   organization’s training program. Recommended changes illustrate a great deal   of insight. (10)

 

Organization   of writing

Answers   are structured clearly and logically.

No submission.

OR 

Complete lack of logical structure.   (0)

Answers have some logical structure, but not   enough to justify a passing grade. (5.5) 

Answers are structured fairly well in terms of   logic and clarity. (7)

Answers are structured very well in terms of   logic and clarity. (8.5) 

Answers are structured exceptionally well in   terms of logic and clarity. (10)

Total: 50 marks

Is this the question you were looking for? Place your Order Here

 

Week 13 Discussion

You work in the information technology group of a chain of sporting goods stores. The company operates 40 locations in seven states. The 40 locations are organized into four regions (north, south, east, and west) with 10 stores each. Regional managers are responsible for inventory management, procurement of inventory, sales, and marketing for their particular region. The company has been processing all transactions electronically (with customers and suppliers), and it has captured all the data in a large data warehouse. Unfortunately, the regional managers are complaining that there is so much information in the data warehouse that extracting meaningful data has become difficult. You’ve just been placed on the team that will be designing a new data strategy for the company.

a. Setting up data marts would probably help with the accessibility of information. What type of data marts would you suggest setting up? Make sure you explain who will benefit from the data marts you suggest.

b. For the data marts you identified, list the data that should be stored in each data mart and explain how the regional managers could make use of that information to manage their group of stores. 

Reply(Shanti)

 

Data management in a data warehouse requires a strategic system of data organization, management, and processing. For the case of the company data issues provided, I will use my data management skills to enhance the organization for easy accessibility and extraction. The strategy for solving the issues will involve the creation of a data mart. A data mart is a subject-oriented database that is often a partitioned segment of the enterprise data warehouse. The function of the data mart in the company is to provide a focused version and more condensed system of managing data in the warehouse to reflect the process specifications and regulation of the business organization (Golfarelli, & Rizzi, 2009). Each mart will define the specific business function for each of the 40 regions. There are three commendable data marts that will help in enhancing the accessibility of the data are dependent, independent and hybrid. Dependent data mart can easily be built using two different patterns: user access or data junkyard access option. On the other hand, the implementation of an independent data mart is antithetical to the motivation of building a data warehouse the hybrid data mart combines input from sources apart from Data warehouse. This is essential during the integration of ad-hoc.

The kind of data for dependent data mart will include merchandising, advertising, distribution, and sales. For independent, on the other hand, will require the following data; marketing, production services and accounts receivable data. The hybrid data mart will be composed of external and operational data sources. As a regional manager, I will make use of the data mart for data storage management, fast data access, data protection, multiuser support and for security enhancement. The data mart will help the manager optimize and fine-tune employee performance through data management. Regulation of data will be enhanced through the management of fresh data and extraction of old data.

References

Golfarelli, M., & Rizzi, S. (2009). Data warehouse design: Modern principles and methodologies (Vol. 5, pp. 12-19). New York: McGraw-Hill.

Moody, D. L., & Kortink, M. A. (2000, June). From enterprise models to dimensional models: a methodology for data warehouse and data mart design. In DMDW (p. 5).

Reply (Shiva Krishna)

 

Data marts would be very suitable in simplifying the data extraction process. There are three types of data marts that an organization can choose from. In this case, an independent data mart would be very suitable. Independent data marts can help to improve performance since it does not rely on the bulky data warehouse. It is very realistic for smaller groups within the organization to use these types of data marts (Talend, 2018). Independent data marts are ideal because the regions are autonomous in their operations.

Each independent data mart will have multiple data marts under it in every region. These can be the North, South, East and West data marts. All the data pertaining to a specific region will be stored in the corresponding data mart. These data marts will benefit the region and location managers who are in charge of inventory management, procurement of inventory, sales, and marketing services. They can easily retrieve, analyze and compare data belonging to their locations with that of other locations as well as the whole region. 

For every data mart, there should be a number of details. Firstly, each data mart should contain the sales performance of each location and the sum total of all the ten locations. Secondly, marketing data such as strategies applied in each location, research data and the marketing mix used should be stored in each data mart. Thirdly, inventory activities should be stored. This includes inventory purchases, breakages, and sales. In addition, lists of customer and suppliers in every location should be stored in their respective data mart.

Regional managers can compare the performance of each location with that of other locations within a region. They can review and make improvements where performance was poor. For instance, a marketing strategy could be expanded to other regions if it was useful in one region. Areas, where sales were low, could be given more attention.

Reference

Talend. (2018, September 28). What is a Data Mart? (vs a Data Warehouse) – Talend. Retrieved October 26, 2018, from https://www.talend.com/resources/what-is-data-mart/

Is this the question you were looking for? Place your Order Here

 

Term Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points

This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:

  • They have a main office and 268 stores in the U.S.
  • They utilize a cloud computing environment for storage and applications.
  • Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
  • They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
  • They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
  • They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
  • They enable wireless access at the main office and the stores.
  • They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.

Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:

1.    Develop an Internal IT Audit Policy, which includes at a minimum:

a.    Overview
b.    Scope
c.    Goals and objectives
d.    Compliance with applicable laws and regulations
e.    Management oversight and responsibility
f.    Areas covered in the IT audits
g.    Frequency of the audits
h.    Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Management Plan
Write a four to six (4-6) page paper in which you:

2.    Explain the management plan for conducting IT audits, including:

a.    Risk management
b.    System Software and Applications
c.    Wireless Networking
d.    Cloud Computing
e.    Virtualization
f.    Cybersecurity and Privacy
g.    BCP and DRP
h.    Network Security
i.    Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 3: Project Plan
Use Microsoft Project or an Open Source alternative, such as Open Project to:

3.    Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.

a.    Risk management
b.    System software and applications
c.    Wireless networking
d.    Cloud computing
e.    Virtualization
f.    Cybersecurity and privacy
g.    Network security

Section 4: Disaster Recovery Plan
Write a five to seven (5-7) page paper in which you:

4.    Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.

a.    The organization must have no data loss.
b.    The organization must have immediate access to organizational data in the event of a disaster.
c.    The organization must have critical systems operational within 48 hours.
d.    Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above.
e.    Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Is this the question you were looking for? Place your Order Here

 

Trend Works Management, or TWM, provides management consultant services nationally throughout the United States. It currently has three (3) sites, New York, NY, Denver, CO, and San Diego, CA. with the latter as its home office. The NY and CO site have a total of sixty (60) employees. The NY site has fifteen (15) administrative staff members, and four (4) IT support technicians, whereas the CA site houses a thirty (30) member sales / marketing team, five (5) member HR team, and the executive management team.

Currently, TWN runs one (1) SQL server 2008 instances on Windows Sever 2008 that houses a database of every consultant, their skill qualifications, locale, and their rates. Each site has one (1) server that merges the data to the main database server in San Diego. Each office is responsible for maintaining the information concerning consultants.

The sales team enters consulting inquiries and enters consulting jobs into the database. The administrative staff queries the database to determine the availability of all consultants with the particular skill, and determines local. The TWM Website links to the database so customers can inquire about consulting.

The company is experiencing a four percent (4%) annual growth and plans to expand into two (2) new markets at the rate of one (1) new market every two (2) years. The database is growing at a rate of 5% and will exceed hard-disk space in the future. The server capacity is overloaded, resulting in poor performance and long delays. A large portion of the database is historical information, dating back fifteen (15) years.

TWM plans on opening one (1) additional site in Seattle WA, and hiring ten (10) administrative staff. To improve performance TWM wants to upgrade to Microsoft SQL 2012 and add two (2) additional servers. Additionally, all of the servers need to be secured properly. Currently, only SQL server logins are used, but TWM, wants to integrate Active Directory login services to ensure that a strong password policy can be implemented.

TWM is requesting that a high-availability system be set up between all of the sites to protect the systems from potential disruptions.

The company has asked you to develop an archive plan for its outdated historical information. The company wants to maintain only the data within a five (5) year range and archive the remainder with the ability of accessing if required. TWM also wants to remove the physical load on the servers by adding a database server to its branch office, and would like these databases to be accurately updated daily. TWM has asked that you include a plan for replication.

Write a five to eight (5-8) page paper in which you:

  1. Identify whether the growth of the database or the business growth is going to influence your design. Justify your response.
  2. Outline any potential concerns of upgrading the SQL Server to a 2012 platform.
  3. Recommend a solution for the login accounts, and explain how consultants can adhere to the current password policy at the database and object level.
  4. Recommend two (2) ways to address the issue of high availability. Outline your recommendations. 
  5. Design a replication topology to copy data between the branch offices to the headquarters’ database, outlining any latency, autonomy, and consistency issues.
  6. Using Visio or an open source alternative such as Dia, outline the proposed changes that will accommodate the plan for replication. Note: The graphically depicted solution is not included in the required page length.
  7. Use at least three (3) quality resources in this assignment not including the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate the ability to plan and design security into the database and server environment.
  • Demonstrate the ability to design MSSQL, database-level and object-level security.
  • Explain and design an MSSQL solution for high availability

Click here to view the grading rubric.

Is this the question you were looking for? Place your Order Here

 

 Computer security professionals are among the highest-paid employees in information technology organizations. Using employment sites such as Monster.com, computerjobs.com, and dice.com, research computer security jobs available in the state where your school is located (try searching “computer security”). Select three entry-level computer security jobs from different employers and prepare a document comparing the following: What are the educational requirements? What job skills are required? How much prior work experience are firms looking for? Are programming skills required? 

Reply(Shanti)

  

Computer security jobs are widely valued with different employers globally. The job opportunities are some of the most lucrative opportunities admired my many applicants because of its compensation packages provided by different companies. The Computer Jobs.Com advertised the position of a Cyber Security Lead on 12 December 2018. The employer company in Rochester Hill, fond in Canada. According to the employer, the applicant must have the following academic requirements for the job “Bachelor's degree or equivalent experience in Computer Science, Information Systems Management, Information Technology or another related discipline.” The job skills for the position include experience in Linux/UNIX Windows Servers, MS SQL, Oracle MySQL, MongoDB. The applicant must portray skills in understanding protocols, such as SSL/TLS, CIFS, HTTP/S, DHCP, SMTP, LDAP/S, NFS, SNMP, and DNS. They should also exhibit knowledge and skills in networking concepts and services, such as VPNs, IPsec, PKI, and TCP/IP. The eligible candidate must demonstrate +10 years of experience in a security engineering position in a reputable organization. Programming skills are required as outlined in the job description.

The Monster Jobs website contains an advertisement in the position of a senior Cyber Threat Intelligent Analyst. The applicant should have a degree in information System management or computer science from a recognized university. The desirable skills for the job include Security Operations Center (SOC) or Network Operations Center (NOC), Intelligence Community, information security program(s) and skills in NIST 800-53, ISO 27001, or NISPOM. The applicant should have a 5-year prior experience and must have security programming skills. At dice.com, the job of information security officer requires a Bachelor’s degree in telecommunication, computer engineering or computer science. The applicant should have skills in ISSO, AIS inspections, and security clearance. They are required to have at least 4 years experience from the previous work and does require not require programming skills.

References

https://www.dice.com/jobs/detail/Information-Systems-Security-Officer-%28ISSO%29-II-ManTech-International-Colorado-Springs-CO-80840/10120503/102401BR

https://www.monster.com/jobs/search/?q=computer-security&intcid=skr_navigation_nhpso_searchMain&jobid=f009d5fa-b957-4687-9416-aa4beadd7d97#detail

https://www.computerjobs.com/us/en/JobSearch.aspx?shid=15775A893F503DA67B

Reply(Shiva Krishna)

 

Organizations value their computer networks very much because if the security of such systems is compromised, the operations can be jeopardized or critical data gets stolen. As a result, computer security jobs are very much advertised on different platforms. Requirements and responsibilities vary depending on the specific organization. Entry level jobs include being a Cyber Security Analyst, Information System Security Professional, and Network Security Engineer.

This is a crucial role in the maintenance of security of information. Comparing the educational requirements for these jobs in various firms, it can be established that one needs to have at least a Bachelor’s degree in Cyber Security Operations, Computer Science, Computer Engineering or Information Technology. Having a certification is an added advantage. Certifications that are relevant include Certified Information Security Auditor (CISA), Global Information Assurance Certification (GIAC) and Certified Ethical Hacker.

When it comes to skills, all the fields require good written and verbal communication skills. One must be able to pass on messages effectively within the organization. Some of the company’s statement that an individual must portray the highest level of integrity. In addition, the ideal candidate must be creative and goal-oriented. In most of the postings, security analysts are required to have analytical skills and ability to make a sound judgment. The ability to work in teams is also required.

The level of experience is very important. For these entry-level jobs, the level of experience required varies from two to four years. Jobs that require no prior experience have a low salary. The more experienced is, the higher the chances of landing a job and the higher the starting salary. The job postings lay some emphasis on programming ability. Candidates are required to have knowledge in one or two computer programming languages. Each company states the language applicable in its systems.it can be seen that the more language one knows, the better.

References

Indeed. (2018). Information System Security Professional – Entry to Experienced Level – Fort Meade, MD – Indeed.com. Retrieved October 26, 2018, from https://www.indeed.com/viewjob?jk=86e8580c07db96ad&tk=1cqo3ssrbf1l6803&from=serp&vjs=3

LinkedIn. (2018). Computer Security Jobs. Retrieved October 26, 2018, from https://www.linkedin.com/jobs/search?keywords=Computer%20Security&location=United%20States&locationId=us:0&trk=jobs_jserp_search_button_execute&searchOrigin=JSERP&applyLogin=

Monster. (2018). entry-level computer security jobs Jobs | Monster.com. Retrieved October 26, 2018, from https://www.monster.com/jobs/search/?q=entry__2Dlevel-computer-security-jobs&jobid=198437912

Is this the question you were looking for? Place your Order Here

 

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans.  In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.

Part 1: Written Paper1.
1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:

i. Disaster declaration

ii. Assessment of security

iii. Potential disaster scenarios and methods of dealing with the disaster

iv. Disaster recovery procedures

d. Develop an Incident Response Team (IRT) charter, which includes the following sections:

i. Executive summary

ii. Mission statement

iii. Incident declaration

iv. Organizational structure

v. Roles and responsibilities

vi. Information flow and methods of communication

vii. Methods and services provided by the IRT

viii. Authority and reporting procedures

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Part 2: PowerPoint PresentationUse Microsoft PowerPoint to:2. Create a twelve to fourteen (12-14) slide presentation that will be presented to the agency’s management, in which you:

a. Summarize the elements of the DRP Policy and IRT Charter, covering the main elements from Steps 3 and 4 above. b. Include an introduction and conclusion slide.

The specific course learning outcomes associated with this assignment are:

  • Describe the different ISS policies associated with risk management.
  • Compare and contrast the different ISS policies associated with incident response teams (IRT).
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Is this the question you were looking for? Place your Order Here