4/3 Discussion

There will be a final project due in Workshop Six. Note the information below related to the completion of the final project. You will complete the final paper in the form of a compliance and governance plan for an organization. You may use your own organization (although you must change the name for confidentiality purposes) … Read more

4/1 Devotional

The Bible has much to say about sin, the failure of humankind to observe the divine law of God. How serious is sin (as we apply the idea to cybercrime) in God’s eyes? Psalm 11:5 states, “The Lord tests the righteous, but his soul hates the wicked and the one who loves violence” (English Standard Version). … Read more

Assignment 8

Instructions In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research … Read more

Hacker Techniques & How Cyber Criminals Communicate

1. What is the need for encryption?  Is it  a good idea for an organization to buy encryption software that uses “secret” algorithms?   2. How might our understanding of cybersecurity and cybercrime be enhanced? 3. Research corporate espionage. Has corporate espionage been affected by cybertechnology?  Be specific. 4. Cybercriminal communicate with one another all over … Read more

Blog post on website – Adding Shopping cart feature

Cruisin’ Fusion Blog Post Complete and reference the Chapter 6 Cruisin’ Fusion Simulation. Use the Chapter 6 Cruisin’ Fusion Simulation access link located in the Competency 2 Learning Resource – Ethics and Intellectual Property folder to complete the simulation before moving on to the next part of this assessment. –Done the first part and attached … Read more

110s2

Using Appendix M in your textbook on page 275. Develop an interconnection agreement based on utilizing your home computer system as your home business system. The movement, protection, and reliability of your interconnection is important to your business so provide sufficient depth and scope of your interconnection agreement to ensure your business is protected and … Read more

110p2

Project Deliverable 2: Risk Assessment Outline and Certification Test Matrix Plan For this deliverable you will generate the Risk Assessment Outline and the Certification Test Matrix Plan based on the results of the Potential Vulnerabilities Report created in Module 1. Risk Assessment Using the format in the Howard text on page 279, develop the Risk Assessment … Read more

3/3 Disucssion

Review the articles from 3.2 Discussion: IT Governance  Governance Over IT Service Management Processes Using COBIT 5.0 Lean IT Governance In the discussion linked below, respond to the following prompts: Provide a summary of IT governance and the use of COBIT. How would using a framework like COBIT help enhance the concerns for managing an … Read more

3/2 Discussion

Read the following articles from the websites listed: IT Governance (https://www.mitre.org/publications/systems-engineering-guide/enterprise-engineering/enterprise-planning-and-management/it-governance) Governance Over IT Service Management Processes Using COBIT 5.0 (https://blog.itil.org/2013/10/governance-over-it-service-management-processes-using-cobit-5-0/) Lean IT Governance (https://www.pmi.org/disciplined-agile/process/governance) Instructions and Questions: In the discussion link below, respond to the following questions (250 Words total): What was the most useful takeaway for you from this workshop’s reading? What concept … Read more

3/1 Assignment

Getting Started:  The Bible provides a wealth of insight into our lives. God’s Word provides principles that can shape our worldview toward beneficial behavior. However, the Bible also characterizes mankind as born with a sinful nature. We are told in Romans 8:7 “The sinful mind is hostile to God. It does not submit to God’s law, … Read more