Provide (4) 150 words substantive response with a minimum of

 Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

ISSC 471

RESPONSES 1:

What advice does the FBI provide in protecting against computer fraud? Do you feel that the Government is doing a sufficient job in this area?

The FBI provides tips on how to avoid being a victim and what to do if you believe you have been a victim. The FBI’s Cybercrime division includes a wealth of material on its website, including Key Priorities, Ransomware, Identity Theft, Related Priorities, How to Protect Your Computer, and External Links, all of which are intended to assist in the fight against cybercrime and computer fraud. (Federal) A few crucial factors of safeguarding oneself against computer fraud are discussed on the website. The primary source of fraud and identity theft is Personally Identifiable Information (PII). A user must be aware of how to avoid revealing personally identifiable information (PII). If a person is a victim of fraud, there are procedures that may be done to mitigate the negative consequences, such as alerting any major credit cards and credit monitoring agencies. The government is doing all it can legally to protect, control, and punish criminals. They may, however, focus on getting the information out to the public. Because technology is becoming more complicated and pervasive in all parts of life, it is critical to disseminate cyber security knowledge to the general population.

Define COBIT and it’s control objective.  Do you feel the framework is detailed enough to serve your organization?  Why or why not?

The effectiveness of Control Objectives for Information and Related Technologies (COBIT) is entirely dependent on the organization’s objectives. It’s a framework based on “best practices” for maximizing corporate efficiency via IT governance and management. COBIT 5 focuses on five key aspects to ensure success. Audit and assurance, risk management, information security, regulatory compliance, and enterprise IT governance are the domains covered. (Federal) Given COBIT 5’s in-depth approach, I find it difficult to disagree with the framework for any company. The government, overall, is doing all it can to protect, govern, and punish violators. They may, however, focus on getting the information out to the public. Because technology is becoming more complicated and pervasive in all parts of life, it is critical to disseminate cyber security knowledge to the general population.

What are the components of a good policy framework? Provide an example of each of these components.

The COBIT 5 components that make up a good framework are given above. If a company employed all five of them, I think there would be very little space for mistake. The five sections seem to include both risk assessment and management, as well as ensuring that the business is compliant and well-governed.

What is the Deming cycle approach? How does this approach help improve quality?

The Deming cycle technique, often known as the Plan-Do-Check-Act (PDCA) wheel, is a good, simple way to solve problems. The PDCA loop is similar to the OODA loop used by the Air Force for decision-making. The distinction is in the words rather than the notion. Observe, orient, decide, act is like PDCA, but with subtle differences that make sense for the government and may be too detailed for private enterprises at times.

Why is it important for IT Auditors to know about the legal environment of information systems?

Information systems may be placed everywhere on the planet and operate in a variety of legal “environments.” When auditing IT systems, IT auditors must be aware of local, national, and occasionally worldwide rules and regulations. It’s a difficult process, but it’s vital to assure compliance.

-Jimmy

References:

COBIT | Control Objectives for Information Technologies. (2021). ISACA. https://www.isaca.org/resources/cobit

Contact Us. (2020, November 24). Federal Bureau of Investigation. https://www.fbi.gov/contact-us

RESPONSES 2:

The FBI offers some very scant information in regards in how to protect yourself and your businesses from internet fraud. Generally, their guidelines follow the typical measures that you would find in any environment. They recommend that you keep your firewall turned on, install or update antivirus software, install or update antispyware tools, keep your OS up to date, be careful in what you download, and turn off your computer when it is not needed. The FBI also offers a word of warning for P2P systems. I feel that while for specific enterprises this is likely an insufficient list of measures to be taken, as each business needs to determine what is acceptable risk and what is not it is a good general list to abide by. I believe that what they could do better is to tell users reading this information that it is not exhaustive, and their case may require different controls to maintain a secure cyber posture.

               COBIT is a framework used for IT governance and management. It is supposed to be a tool for management to be able to better control security issues within the organization. It provides a method for bridging technical issues, business risks and control requirements. Its main control objective is to give effective organizational governance for management teams. This framework would work well in most organizations but should probably be used in conjunction with other frameworks because COBIT in and of itself does not necessarily provide all the tools and methods for completing certain tasks.

               To craft a good policy framework there needs to be three components of the framework itself, Policies, Standards, and Guidelines. Policy frameworks start at the top with the policy which describes the general belief, goal, or objective. An example of the policy portion of the framework could be “Users are required to identify themselves when in corporate buildings.” The standards come next and they support the policies, and example of a standard could be “Users are required to wear company provided identification in clear view on your person”. Lastly are guidelines that further support the policy and the standard, which could be something like “Be sure to keep your ID on you at all times during working hours, report to HR if you forgot your ID or have lost it.”

               The Demning cycle is a way to conduct specific tasks within an organization. It is a cycle where you are required to plan, do, check, and act. This approach helps improve quality by providing a method in which we can implement changes to a system and monitor is ability to perform the required functions.

It is important for IT auditors to know the legal environment of information systems because there are many regulatory requirements for organizations to follow, which will need to be taken in account when conducting and IT Audit of that particular system.

-BRIAN

ISSC341

RESPONSES 3:

When designing a Local Area Network (LAN), some of the components that I would include in my physical diagram are:

-PC/workstation and servers,

-Network Interface Card (NIC), a NIC is a circuit board inserted into each network station (PC. Workstation, server) to allow communication with the stations,

-Cabling and connectors, examples are coaxial cables and BNC connector, Unshielded Twisted Pair (UTP) and RJ-45 connector, and

-Hub, concentrator, and more complicated network devices such as bridge, LAN switch and router.

           Organizations have their employee’s BYOD for many different reasons. One advantage to BYOD is that employees can use devices that they are already familiar with. This increases productivity. Flexibility is another advantage because employees are now able to work anytime/anywhere. Additionally, employers save money since they do not have to buy devices for their employees.

One of the disadvantages of BYOD is the liability. Not have a distinction between work and personal devices may question who is liable for the repair costs. It also compromises security because employees are now using personal devices to access privileged information. Lastly, a plan should be in place to prevent the potential misuse of information. After an employee or contract has been terminated, you may need to remove company’s private information from the employee’s device.

Thanks for reading and hope everyone is having a great start to their week.

Regards,

Ali

Rainoff, M. J. (2020). System Information – Networking, LAN, Local Area Network, NIC, Network Interface Card, Hub, Bridge, LAN Switch, Router, Network Management, SNMP, Simple Network Management Protoco, RMON, JAVA, JAVA-based Network Management System, RMON software probe, Mbp. © 1995–2021 Integrated Data Processing, Inc. https://www.idp.net/sysinfo/networking.asp#2

S. (2021, October 19). The Pros & Cons of a Bring Your Own Device Policy. Device Magic. https://www.devicemagic.com/blog/bring-your-own-device-policy-pros-cons/

-ALI

RESPONSES 4:

When you are designing a local area network what components on the network would you include in your physical diagram?

In a physical network diagram or network topology, there are several components to it. Of course you would find your routers, which is used to route internet traffic between devices and the internet. Switches are used to connect computers to the network. Other components would include racks, ports, cables, and firewalls.

Network Evolution and Trends – Why would organizations use BYOD to have their employees bring their devices to work?  What are some advantages and disadvantages of this trend?

Bring your own device (BOYD) can be used for several different reasons. I think the main reason organizations would use it, because it’s cost effective. Organizations would save a lot of money if their employees brought their own devices instead of purchasing it themselves.

Advantages of BOYD would be employees bringing in devices that have better technology features than what is normally provided. Another advantage would be user familiarity with the devices they bring in. This would require less resources used to train the employees. Lastly, it would be a morale booster for employees, because they get to use their own equipment.

Disadvantages would be the risk of network security. It would be a serious challenge while bringing in your own devices because it’s hard to track your own device. Another disadvantage is with home computers having the proper software in order to be effective at your job.   

-Marcus

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

1 page and a half Windows and Mac OS are

1 page and a half Windows and Mac OS are distinctly separate operating systems that use different boot processes, file systems, directories, and so on.  However, some of the general steps used to examine computers for digital evidence apply to both systems. Answer the following questions(s): Discuss the similarities between

URGENT NEED TO DONE 3 HOURS A Realtor in Massachusetts

URGENT NEED TO DONE 3 HOURS  A Realtor in Massachusetts is analyzing the relationship between the sale price of a home (in $), it’s the square footage (in ft2), the number of bedrooms, the number of bathrooms, and a colonial dummy variable (colonial equals 1 if a colonial-style home; 0

For this Critical Thinking assignment, you will apply concepts from

  For this Critical Thinking assignment, you will apply concepts from probability theory to real-world scenarios. Chicago is a group dice game that requires no skill. The objective of the game is to accumulate points by rolling certain combinations (GamezBuff, 2017). How do you play Chicago? There are eleven rounds

Resource: PowerPoint Basics Navigate to the PowerPoint BasicsTutorials using this

  Resource: PowerPoint Basics Navigate to the PowerPoint BasicsTutorials using this link https://edu.gcfglobal.org/en/powerpoint/ (Links to an external site.)(Links to an external site.). You will use the material covered in these tutorials to submit assignments later in this unit and you will be quizzed on the material at the end of the unit. Getting

What is an Inclusion Classroom? Looking in, and inclusion classroom

 What is an Inclusion Classroom?  Looking in, and inclusion classroom may look exactly like a regular education classroom. But there are some significant differences.  Typically the inclusion classroom has two teachers, a regular education teacher and a special education teacher who co-teach. Some inclusion classrooms will have a regular education

Best Assignment Writers integrates authorized educational instruments with modern writing

  Best Assignment Writers integrates authorized educational instruments with modern writing and resource managing technologies. Assignment Writers helps learners online, who have doubts about how to think critically, Design framework, and template what they publish with a comprehensive virtual archive of engaging rapid manuals and instructional videos, test results, and much more to

Watergate: Video critique

In preparation for this assignment, click the link below to view the video segment. PBS (Producer). (2013). Watergate (Segment 7 of 22) [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login? auth=CAS&url=http://fod.infobase.com/PortalPlaylists.aspx?wID=273866&xtid=58630&loid=277079  After watching the video segment, review the 14 principles provided in Title 5 of the Code of Federal Regulations (5 C.F.R.) §

Post a response to the following question and respond to

Post a response to the following question and respond to one of your classmate’s postings for this question. Your initial response and responses to others should be at least 150 words. Respond to your classmate’s requests for feedback. In addition, follow the guidelines; APA, formally written, at least two references

In the scenario from Module 1, we see a co-worker

  In the scenario from Module 1, we see a co-worker of Sara displaying symptoms of TB. View the video by Scientific Animations Without Borders. (2012). Tuberculosis Prevention in English. Retrieved from https://www.youtube.com/watch?v=EBdC9H00BHY before responding to the following questions: How could have the organization prevented the likelihood of Sara and her

 Each student will present a Clinical Practice Presentation . The focus of the presentation must reflect current treatment recommendations from accepted professional organizations. See syllabus inst Nursing Assignment Help

 Each student will present a Clinical Practice Presentation . The focus of the presentation must reflect current treatment recommendations from accepted professional organizations. See syllabus  instructions PLEASE NO MORE THAN 10% OF SIMILARITY PROFESSOR USES TURNITIN Students are expected to expand their use of resources for evidence-based practice beyond the

Explain the implications for leaders of the statement “We become

  Explain the implications for leaders of the statement “We become most powerful when we give our own power away.” How can leaders create a climate of trust and facilitate relationships among people in a work team? What can leaders do to show others that they are trustworthy?  What can

3. Research “free infographic maker for students” . a. Select

  3. Research “free infographic maker for students” . a.  Select one of the free tools listed in the articles, and create an infographic about  one of the following concepts from our readings: b.  Include pictures, graphs, and charts in the infographic, as well as written descriptions of the concept your chose

Leader Analysis

Select a public figure, preferably a business leader or politician, and determine through research and analysis if the individual is an ethical leader. Keep in mind that all people possess virtues and vices, and while they may strive to support ethical tenets, they may fail at times. Choose one virtue

You are to write a 3 to 5 page paper

  You are to write a 3 to 5 page paper addressing this public relations nightmare for your client.  Please use the following key points to direct your analysis: What kinds of public relations tactics should be used to help The Mexican Villa? Is there any kind of cause-related or

Submit a three paragraph summary of Failure is Not an

 Submit a three paragraph summary of Failure is Not an Option.  Use the criteria listed on the rubric , passage  and  instructor’s feedback as guides for revising  summary. Remember that the summary should contain own wording.  You should not use the exact words or structure of the original. You should