Compose a 1-page well documented paper that proposes your plan on the paper. Sub

Compose a 1-page well documented paper that proposes your plan on the paper. Sub

Compose a 1-page well documented paper that proposes your plan on the paper. Submit by Sunday of week 2 for my review and acceptance. Your proposal should be based on the following scenario.
Heavy Metal Engineering (HME), a manufacturing organization that creates metal shell casings for very high-end washer and dryer products has suppliers and customers world-wide, as well as world-wide offices. HME the US Corporate office in NY hires you as a professional Information Assurance consultant.
HME is looking to receive some significant third party funding for an international joint venture but was told they would be denied because they do not have any kind of Information Assurance plan to keep all data assets secure. You are required to create a comprehensive IA strategy that includes the following:
A detailed overview of what Information Assurance entails covering all the basics for an IA strategy (what will be protected and from what)
A plan or strategy for IA implementation including a framework
A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.
Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward
An incident response and disaster recovery plan in the event of intrusion and disaster
All sections should be clearly labeled and a separate section in each area specifically for justifications of your selection/proposal.
Your thoughts must be solidified with viable sources consistent with graduate level work. No more than 2 sources may be used with ND or no author. Scholarly and Peer reviewed sources are expected to be used throughout the bulk of this paper.

Completing this assignment involves knowing (1) what does IRAC mean and (2) what

Completing this assignment involves knowing (1) what does IRAC mean and (2) what

Completing this assignment involves knowing (1) what does IRAC mean and (2) what is a court’s ruling regarding the outcome of a case, on cybersecurity, ethics and law.
IRAC stands for Issue, Rule, Analysis and Conclusion; so
Issue: The problem of law that the court has to address
Rule (practically, Ruling): How does the court resolve the problem of law
Analysis: How did the court arrive at its ruling; what points did the court raise that supported its ruling
Conclusion: a review of the problem, the court’s resolution of that problem, and a few reasons why the court ruled as it did.

Write a 1 to 2 page essay paper that discusses the topic below. Your paper shoul

Write a 1 to 2 page essay paper that discusses the topic below. Your paper shoul

Write a 1 to 2 page essay paper that discusses the topic below. Your paper should be in APA format with viable sources to solidify your thoughts presented. Your references must not be more than 5 years old and no more than one entity source and no more than one N.D source. Wikipedia is not considered a valid source. All references listed on the reference page must have a valid in text citation in the body of the paper. This essay must be consistent with graduate level work. You are strongly encouraged view the tips in the writing center to ensure your papers are properly formatted.
Topic: Explain the importance of understanding the various branches of security covered in Chapter 1

When technology (emails and internet access) was readily available for most, man

When technology (emails and internet access) was readily available for most, man

When technology (emails and internet access) was readily available for most, many companies remained loyal to paper and pen. Beyond the financial cost of embracing this technology, businesses were understandably concerned with compromising the quality of their services and with possible security breaches. Eventually, businesses embraced technology and recognized its power to help individuals and organizations. Technology has brought us a wealth of conveniences, including access to information that was previously inaccessible or difficult to access. The positive aspects of technology are sometimes overshadowed by its misuse, including concerns about privacy, accountability, and trust. The power of technology also revealed the danger of using technology in an unscrupulous manner which could harm those individuals and organizations.
Review these articles:
1)What Companies are Disclosing About Cybersecurity Risk and Oversight
2) Ethical Obligations to Protect Client Data when Building Artificial Intelligence Tools
3) LSTD 517 Lawyers’ Duty Technological Competence.pdf
A company needs your help developing a plan so that its staff can use technology in an ethical fashion.
Does your intended profession (law, IT, cybersecurity, etc.) have any guidelines or rules that address what is ethical conduct? For example, in the legal profession, attorneys in each state must comply with their state’s Rules of Professional Conduct, the Association of Computer Machinery has the ACM Code of Ethics and Professional Conduct, and the Institute for Electrical and Electronics Engineer has the IEEE Code of Ethics has a Code of Ethics. Explain your understanding of these codes or rules that concern technology and ethics.
In light of the codes or rules that you reviewed, set forth at least three ethical rules with which you would want the company to comply so that its staff is ethical in using technology.
Discuss at least two ethical concerns discussed in the above-listed articles. What would you do to prevent any ethical violations and how would your plan be managed? What could happen if there was a violation of the ethical rules as a result of technological incompetence or deliberate misuse?
All Responsive Posts: Play devil’s advocate by providing logical arguments that oppose those presented in someone else’s initial post.
Please also respond to post A, B,
A) Within the intricacy of the law, ethics is supreme for lawyers where codes such as those in the New York Rules of Professional Conduct. This points out the important role that lawyers must play in keeping abreast with technical changes. In addition to this, the American Bar Association (ABA) further contributes guidance, as evidenced in Formal Opinion 466 (2014), emphasizing on responsible social media use with regard to the legal domain.
Specificity with respect to the translation of these principles into the corporate arena, and ethical conduct in technology involves setting out clearly defined guidelines. Most of all, strict measures should be applied in regard to confidential information ensuring clients’ privacy. Also, explicit rules should outline what employees should or should not say about the organization or its clients in social media. Finally, the plan should include periodic updates on emerging technologies and their implementation into practices.
Articles address inherent dangers that lurk within the social media realm and may include revealing certain information unintentionally and even creating lawyer-client relationship without intending to do so. Hence, it entails educating all employees on appropriate and inappropriate use of social media, doing due diligence before initiating business talks online and clearly stating what can and cannot be done when selling commodities and services online.
Breaking these already set standards, may face legal implications to the company, bring down its name, and even lose customers’ trust. Therefore, one must have a holistic approach that involves setting up efficient checks and balances system, continual education of the internal auditors as well as the implementation of enforcement mechanisms that will ensure compliance all round. The need for such a procedure cannot be overemphasized if the company would like to observe ethics, protect confidential information as well as enhance the internal legitimacy of it and its lawyers.
B) The integration of technology in business practices, notably the shift from traditional pen and paper to digital transformation, marks a critical transition in the evolution of modern enterprises. This transition, while beneficial in enhancing access to information and streamlining operations, has ushered in a plethora of ethical challenges, particularly in the realm of cybersecurity. These challenges demand a thorough approach to ensure that the use of technology is not only efficient but also ethically sound.
In addressing the ethical concerns surrounding technology use in business, it is imperative to consider guidelines and frameworks established in related fields. For instance, Linna Jr. and Muchman (2020) stress the importance of balancing the innovative potential of AI with the ethical responsibility to protect client data. Similarly, the report by Klemash, Smith, & Seets (2020) reveals that most Fortune 100 companies acknowledge cybersecurity as a significant risk factor, underscoring the need for ethical guidelines in managing such risks.
Drawing from these insights, three ethical rules are proposed for the company’s technology use plan. First, uphold data integrity and confidentiality, ensuring that client and company data are protected against unauthorized access and manipulation. This aligns with the concerns raised by Linna Jr. and Muchma (2020) where the protection of client information is paramount, especially in the development of AI tools. Second, ensure transparency in cybersecurity practices, as highlighted by Klemash, Smith, & Seets (Klemash, Smith, & Seets, 2020) where companies are encouraged to disclose their cybersecurity measures to build trust among stakeholders. Third, maintain a commitment to continuous learning and adaptation to technological advancements, resonating with the principles as outlined by Davis & Puisziz (2019) which emphasizes the need for ongoing education in the face of evolving technology.
To address ethical concerns, it is crucial to implement regular training and awareness programs for staff on the importance of data protection and cybersecurity. Additionally, conducting periodic assessments and reviews of technology use and implementation of cybersecurity measures will help in early detection and prevention of potential ethical breaches. This proactive approach is in line with the recommendations from Davis & Puiszis (2019), which advocates for consistent upskilling in technological competencies.
Violations of these ethical rules due to negligence or deliberate misuse can have dire consequences. These range from legal repercussions to loss of client trust and reputational damage. As Klemash, Smith, & Seets’ (2020) report suggests, failure to adequately manage cybersecurity risks can also lead to significant financial losses and regulatory penalties. Furthermore, such violations could potentially compromise the integrity of the company’s operations and undermine the trust of stakeholders in the organization’s ability to safeguard sensitive information.
The ethical rules proposed for the company’s technology use plan find strong support in the established codes of ethics from prominent organizations like the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). The ACM Code of Ethics emphasizes the importance of honesty, fairness, and respect for user privacy and confidentiality, principles that align seamlessly with the proposed rule of upholding data integrity and confidentiality (ACM, 2018). This tenet is critical in ensuring that client and company data are shielded from unauthorized access and misuse. Similarly, IEEE’s Code of Ethics underlines the necessity for transparency and avoidance of deception in professional conduct (IEEE, 2020). This principle resonates with the second ethical rule of ensuring transparency in cybersecurity practices. Lastly, both ACM and IEEE codes advocate for continuous professional development, echoing the third ethical rule of maintaining a commitment to ongoing learning in technological proficiency. These codes of ethics thus provide a robust foundational framework that not only reinforces but also guides the implementation of the ethical rules within the company, ensuring a harmonious balance between technological advancement and ethical responsibility.

Assignment #1: In order to complete assignment #1 you will need to answer the be

Assignment #1:
In order to complete assignment #1 you will need to answer the be

Assignment #1:
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #). Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail. Your answer cannot simply be a cited source answering the question. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
This assignment is a summative assessment for Course Objective 1.
1. What is the difference between active and passive security threats?
2. List and briefly define 3 categories of passive and active security attacks.
3. List and briefly define at least 3 categories of security services.
4. List and briefly define at least 3 categories of security mechanisms.
5. Create a matrix highlighting the relationship between the security services and the mechanisms listed in questions 3 and 4. Place services to the left (vertically), the mechanism to the right (horizontally), then place an X for the applicable mechanisms to the services.
6. What are the essential differences of a symmetric cipher?
7. How many keys are required for two people to communicate via a symmetric cipher?
8. What is triple encryption?
9. List ways in which secret keys can be distributed to two communicating parties.
10. What are the fundamental differences between AES, DES, and 3DES?

Each answer must be a minimum of one full page. 1. According to the “The Evolvin

Each answer must be a minimum of one full page.
1. According to the “The Evolvin

Each answer must be a minimum of one full page.
1. According to the “The Evolving Terrorist Threat:” article by Joshua Sinai, several examples of the types of warfare terrorists generally employ to achieve their objectives were listed. What were they and how does each empower the terrorist?
2. According to Gerstein, general agreement now exists that terrorists are “rational” actors. Their actions may not be understood by their victims or the governments and law enforcement agencies that attempt to deal with these threats, but they are far from random irrational acts. Chose a side of this argument and support it with a minimum of three different references.
3. Fully explain the threat posed by 4th Generation (Novichuk) Chemical Weapons. How have they been used by the Russian government and what makes them different from previous types of chemical weapons. Your answers should be based upon class readings and additional research you conduct from the Internet or other reliable academic sources.
4. There are many questions surrounding the origins of the COVID-19 pandemic. It is agreed upon by most that the origins are from Wuhan, China. Based upon your readings and other scholarly works (sorry no conspiracy theories), is it possible that the COVID-19 outbreak was a purposeful act? Would it be possible for a terrorist group to recreate the damage caused by this pandemic using a Biological Weapon?
APA Style as the sole citation and reference style used in written work submitted as part of coursework.

Hide Assignment Information Turnitin™ Turnitin™ enabledThis assignment will be

Hide Assignment Information
Turnitin™
Turnitin™ enabledThis assignment will be

Hide Assignment Information
Turnitin™
Turnitin™ enabledThis assignment will be submitted to Turnitin™.
Instructions
Background: The growing scale of intelligence activities expanded exponentially with the global diffusion of cyberspace. Cyber operations involve Identifying and analyzing threats is an important aspect of cyber intelligence in support of the homeland security mission. Cyber intelligence incorporates traditional espionage tradecraft, intelligence collection, and analysis. We have a better understanding of cyber intelligence, and the intelligence Community (IC) has been moving it to a point where it can be effectively used to support intelligence requirements.
Assignment: In this assignment, provide your assessment of the role of cyber intelligence and how the IC should prioritize and resource this emerging intelligence discipline in support of the homeland security mission.
Discuss the threat actors, threat warnings, and what makes cyber intelligence different from traditional intelligence disciplines.
Other options to consider are the legalities and oversight of cyber intelligence.
Requirements: The paper should be between 10-12 double-spaced pages using 12-point font, not including the cover page, introduction, and references.
Format:
Introduction: Make an introductory statement about the subject of your paper, the specific issues being addressed, and the main thesis is supported.
Text: Provide context, state your position, support with examples, and propose recommendations.
Conclusion: Provide a focused, concise conclusion, with main takeaways for the reader based on your analysis of the sources and logical findings.
The paper must cite at least one (1) academic or professional reference for each page written.
Resources must be properly cited within the body of the text and reflected in the references using APA 7th edition format and citation rules.
Stay focused on your task. Use course materials, carefully cite your information, and ensure that the paper is plausible.
Be concise. Longer papers do not fare better if they contain irrelevant material.
Inform the reader. As with most Intelligence writing, shorter and more focused is best.

Based on your Unit III Assignment, address the prompts below. Identify a specifi

Based on your Unit III Assignment, address the prompts below.
Identify a specifi

Based on your Unit III Assignment, address the prompts below.
Identify a specific academic, governmental, or commercial source of quantitative secondary data that could be used to solve the problem you stated in Part 2 of the Unit III assignment. Provide reference information for this source.
Describe how you will obtain access to the raw data.
Explain why the data are suitable for addressing your research problem.
List the limitations of using the data.
This journal should be at least two pages in length, not counting the required references page. Please thoroughly address all areas listed above, and include at least two credible sources. An abstract is not required. Please use APA compliant headings and sub-headings that align with the individual assignment requirements. Adhere to APA Style, including in-text citations and references for all sources that are used.

President Donald Trump signed the Cybersecurity and Infrastructure Security Agen

President Donald Trump signed the Cybersecurity and Infrastructure Security Agen

President Donald Trump signed the Cybersecurity and Infrastructure Security Agency Act in November 2018. To guarantee cybersecurity, CISA collaborates with the intelligence community, law enforcement, commercial sector partners, and others across the Federal Government. CISA’s strategic strategy includes managing new technologies and investment to achieve a balanced technological mix to achieve its objective.
-Conduct detailed research and critical analysis of CISA strategic planning
-How it includes posturing the organization to manage the infusion of emerging technologies.
-Examine CISA’s strategic planning requirements and priorities for infusing emerging technologies.
-Assess the purpose and value of the CISA Strategic Technology Roadmap in CISA’s strategic plan for future growth.
-Explain how community engagement and communal preparation can lead to establishing emerging technology in the CISA strategic plan to build a more secure and resilient infrastructure.
-Determine the gaps and best practices in CISA’s planning for the infusion of new technologies.
-Assess if CISA’s strategic planning process effectively manages and infuses new technologies to strengthen critical infrastructure and address long-term risks; make any recommendations to improve the process.
-The body of this paper requires 10 -12 pages (full pages) which does not include the cover page, photographs, bulleted lists, reference page, or other inserts.
-Please include an introduction of the paper about the main topics to be covered, and a brief overview of CISA’s mission, vision, values, and strategic priorities.
-Conclusion and a reference page at the end cited using APA 7th edition format.
Thank you