Category: Information Systems homework help

  •   For this discussion, you will prepare a short handout (3-5 paragraphs — appr

     
    For this discussion, you will prepare a short handout (3-5 paragraphs — appr

     
    For this discussion, you will prepare a short handout (3-5 paragraphs — approximately 1 page if printed) to be included in a new employee orientation session. In your handout, discuss the primary methods for establishing a person’s identity and then discuss how the individual’s unique characteristics will be used to control access to the organization’s enterprise IT resources and systems. Use information from the AC (Access Control) and IA (Identification and Authentication) families of security controls as authoritative sources for the requirement that employees provide identity documents and allow their physical characteristics to be measured for use as biometric factors in the identification and authorization processes used to grant access to email, timekeeping, and other web- or cloud-based IT services.
    Remember to use and cite authoritative sources in your work. Place your list of references at the end of your paper.
    Remember to submit your discussion response to the Turn It In for Discussions assignment folder. See the forum instructions for more information.

  •   Assume you are working for a healthcare facility that does not have a health

     
    Assume you are working for a healthcare facility that does not have a health

     
    Assume you are working for a healthcare facility that does not have a health informatics governance policy yet. Discuss the justification for the formulation of a health informatics governance policy within your organization, include the following: 
    Identify the business structure, location, and type of the healthcare provider you use for this discussion (real or fictitious one).
    Why is health informatics governance important for your healthcare organization?
    What issues your healthcare organizations can face without a health informatics governance policy in place?
    What areas of health informatics governance would you consider for inclusion in this policy?
    Respond to a minimum two of your peers with a substantive comment assessing the proposed justification for the health informatics governance policy development. Follow APA formatting, referencing credible evidence. Only one outside source is allowed. Use the content of this class as the main source of evidence. 

  • research    Research 1. Chose a company from the table provided at the end of t

    research
      
    Research
    1. Chose a company from the table provided at the end of t

    research
      
    Research
    1. Chose a company from the table provided at the end of this assignment file. Locate its public website and review how the company presents itself to customers and the general public.
    2. Review the company’s Investor Relations website. Compare how it represents itself to investors and shareholders as compared to how it presents itself on its customer-facing website. The link to the Investor Relations website is provided in the table at the end of this file.
    3. Review Section 1 of the company’s Form 10-K Annual Report to Investors to learn about how the company presents itself to investors and shareholders. The link to the Form 10-K is provided in the table at the end of this assignment file.

  •   On April 27, 2009, HITECH Act (The Health Information Technology for Economic

     
    On April 27, 2009, HITECH Act (The Health Information Technology for Economic

     
    On April 27, 2009, HITECH Act (The Health Information Technology for Economic and Clinical Health (HITECH) Act (congress.gov) ) was enacted to promote the implementation of HIT.  In your discussion post explain what incentives were proposed under this Act to catalyze and popularize HIT implementation by providers? What punitive recommendations it made for the non-implementors? What additional recommendation(s) would you make to promote HIT adoption by those who have not done yet? Why? 
    Respond to a minimum two of your peers with a substantive comment assessing the proposed additional recommendations for HIT promotion. Follow APA formatting, referencing credible evidence. Only one outside source is allowed. Use the content of this class as the main source of evidence. 

  • Imagine for a moment that you are a hacker, an ethical one. You are called upon

    Imagine for a moment that you are a hacker, an ethical one. You are called upon

    Imagine for a moment that you are a hacker, an ethical one. You are called upon by law enforcement to hack into the network of a business known to be engaged in criminal activity for financial gain as its primary activity. Assume you are not to be concerned with any political aspects of the job and that your actions are legal and ethically justified.
    This nefarious business takes its own security seriously and, therefore, has implemented several forms of network security, including firewalls, web proxies for its web gateways, and VPNs for remote users. You also know that this business, much like any normal corporation, rents several floors of office space to accommodate between 100 and 200 employees. Also, imagine that the business’s entire network topology is located on-site. Your goal is to infiltrate their security to find evidence of illegal activities in the local MSQL database. You must remain anonymous and operate within the parameters of the law.
    Explain your method of attack and operation within the reasonable parameters of the law, citing specific, credible sources that support the method of attack and operation.
    Describe a specific malware, social engineering, or other type of attack you would deploy to achieve your desired goals, citing specific, credible sources that support deployment of the attack.
    Identify effective techniques for concealing executables and specific tools used for each stage of the attack.
    Develop a plan to overcome expected hurdles your attack must overcome to be successful, citing specific, credible sources that support the plan.
    Develop an anonymizing strategy, supported by specific, credible sources, that creates a false trail and minimizes the risk of detection.
    Cite each source listed on your source page at least one time within your assignment.

  •  Write a program to perform the following functionality.  Part 1 Call a functio

     Write a program to perform the following functionality.
     Part 1 Call a functio

     Write a program to perform the following functionality.
     Part 1 Call a function to display the heading. 
    Part 2 Write the following loop: Prompt the user for a limit. 
    Call a function to play the game which will: Calculate a random number using the limit entered by the user. 
    Display a message showing the range to be guessed. 
    Write a loop that will: Prompt the user for a number. 
    Compare the user guess to the generated random number. 
    If the guess is too high, display message and retry.
    If the guess is too low, display message and retry. 
    If the guess is correct, display message and exit loop. 

  •   The CIA and FBI have been working as a joint task force to unearth the meanin

     
    The CIA and FBI have been working as a joint task force to unearth the meanin

     
    The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives believed to be spies. They have recruited your company to assist with the decryption of these messages.
    Instructions
    Before you start on this mission, both national organizations want to verify your ability to identify the motivation and capabilities behind cyberterrorism and information warfare. In a 4-5 page report to both organizations, answer the following questions, providing specific details for each topic:
    Explain the developmental perspective on the problem of and changes to cybervictimization.
    Evaluate two current issues, trends, or problems in cybercrime and cyberterrorism.
    Analyze the tactics used in cyberspace to share information and promote terrorist ideologies between and within terrorist groups.
    Explain why interconnectivity is important in today’s connected environment.
    Evaluate the two biggest threats against the national interests of the United States, including critical infrastructure.
    Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
    This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
    The specific course learning outcome associated with this assignment is:
    Distinguish between different types of bad actors in cyberspace, including their resources, capabilities/techniques, motivations, and aversion to risk.
    View Rubric
     

  • For this deliverable, you are a newly appointed security officer (SO). The chie

    For this deliverable, you are a newly appointed security officer (SO). The chie

    For this deliverable, you are a newly appointed security officer (SO). The chief information security officer (CISO) has asked you to review the company security policy and provide your recommendations for improvement. Note: You may create or make all necessary assumptions needed for the completion of this assignment.
    Research a security policy of an organization; you can use your employer, an organization you are associated with, or a company on the internet, as long as you have access to their security policy. A suggested resource is provided below. Make an initial assessment of the current security policy of the organization, including its strengths and weaknesses. Review the security policy’s objective that should be clearly defined to maintain the confidentiality and integrity of information. Determine whether the security policy covers software and hardware devices, physical parameters, human resource, information, or data and access control within its scope. Check that the security policy includes what must be done rather than how it should be done. Assess the password management, change management, and incident management aspects of the policy. Additionally, assess the effectiveness of the policy and provide recommendations for it.
    Describe the business needs of the organization that you have researched.
    Review the security policy of the organization and its objective.
    Compare the security policy with the business needs.
    Assess the aspects of the security policy noting essential inclusions and omissions.
    Assess the effectiveness of the policy and provide at least 2-3 recommendations for improvement.
    Use at least two quality ressource

  •   In this assignment, you assess the vulnerabilities of a web application that

     
    In this assignment, you assess the vulnerabilities of a web application that

     
    In this assignment, you assess the vulnerabilities of a web application that has been chosen by a company seeking to establish an online presence.
    Scenario
    Montana Out Door Inc. (MOD) is a provider of outdoor equipment and hunting adventures in Montana. The CEO has decided to pursue a digital transformation designed to support a more robust Internet presence including integrated social media outreach and an online store that integrates with its newly adopted software solutions including HubSpot Suite for CRM, SAP SCM for supply chain management, and Salesforce Service Cloud to support the expansion.
    Security is an obvious consideration for this endeavor and you have been asked to assess the security risks of the integration of one of these systems with the Internet and other internal systems. In assignments 2 and 3 you will address integration policies and testing respectively.
    Preparation
    Choose one of the applications identified in the scenario and research its vulnerabilities and ways to safeguard them.
    Instructions
    Consider the scenario and the research you performed on your chosen application and do the following:
    Describe 3 significant security vulnerabilities inherent in the software that includes historical security performance data. Cite your sources.
    Describe 2 security tools designed to mitigate one of the vulnerabilities. One should be internal to the software and the other a 3rd party solution. Explain how each works.
    Evaluate the application’s effectiveness in addressing 5 of the following security elements. Rank each as Excellent, Good, or Weak. Support the rationale for your ranking.

    Data encryption
    Access control and management
    Data retention
    Management and processing
    System login requirements
    Process monitoring and traceability
    Analysis and reconstruction of transactions and events due to adversarial actions (forensic reconstruction)
    Integration with the existing Oracle DB

    This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
    The specific course learning outcome associated with this assignment is:
    Evaluate application technologies and the security issues associated with them.
    View Rubric
     

  • Assignment Instructions:  Health Informatics (HI) is an emerging interdisciplin

    Assignment Instructions: 
    Health Informatics (HI) is an emerging interdisciplin

    Assignment Instructions: 
    Health Informatics (HI) is an emerging interdisciplinary field in the healthcare industry that involves using health information systems in collecting, storing, retrieving, analyzing, and utilizing healthcare data for the improvement of healthcare in a variety of ways.
    Write a research paper that assesses the following topics on Health Informatics: 
    How health informatics is, or can be used for, improving healthcare service delivery (in performing managerial functions)
    Efficiency and effectiveness of quality improvement measures (clinical and administrative)
    Health outcomes and any other aspect of healthcare you may have experienced or may anticipate (minimum 1)
    Research Paper Length and APA Requirements: No more than 5 pages (excluding title page and reference page). Formatted in APA 7th Edition. Provide credible evidence, through the use of in-text citations from your references, to support your conclusions/information.