Your solutions should be properly presented, and it is important that you double-check your spelling and grammar and thoroughly proofread your assignment before submitting.

Your solutions should be properly presented, and it is important that you double-check your spelling and grammar and thoroughly proofread your assignment before submitting. Instructions for assignment submission are presented in the “Assignment 2” link and must be strictly adhered to. No marks will be awarded to assignments that are submitted after the due date and time. All analyses must be carried out using SPSS, and no marks will be awarded for assignment questions where SPSS output supporting your answer is not provided.  ”

Using a Web browser,search for any information security policies used at your academic institution . Compare them to the ones discussed in this chapter, are there sections missing? if so, which ones?

Using a Web browser,search for any information security policies used at your academic institution . Compare them to the ones discussed in this chapter, are there sections missing? if so, which ones?Graded Assignments may be found at the end of each chapter of the required textbook under the title “Real-World Exercises”. Each assignment is due between Monday to Sunday evening by 11:59 p.m. EST. of the respective week. Each student is to select one exercise (per module exercise) from the grouping as identified below. Provide documented evidence, in Moodle, of completion of the chosen exercise (i.e. provide answers to each of the stated questions). Detailed and significant scholarly answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided. All submissions need to directed to the appropriate area within Moodle

APPLICATION DEVELOPMENT SECURITY

Final Project  – There is a research paper for this course. We will work on the sections of this paper in our weekly assignments. APA format will be followed for all writing submissions. The topic is based on questions, concerns, or recommendations driven by one of the chapter topics that will be covered in the course. You create the question, then you do the research to support an answer that would add to our body of knowledge on the topic. For this assignment, the student is to select one topic, and then for the next eight weeks write and research about the topic selected. Each week, you will work on the assignment building out the paper. At the end of seven weeks, you will have a research paper which you will submit for the eighth week in a Word Document. Any reference to a text other than the O’Hanley & Tiller Information Security Management Handbook is incorrect. Please see the attachment for text. You must use the Attached Text for the research paper. Any reference to a text other than the attached text is incorrect.
TELECOMMUNICATIONS AND NETWORK SECURITY
Securing the Grid
Network Attacks and Countermeasures
INFORMATION SECURITY AND RISK MANAGEMENT
Security in the Cloud
Getting the Best Out of Information Security Projects
Mobility and Its Impact on Enterprise Security
An Introduction to Digital rights Management
Information Security on the Cheap
Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program
Metrics for Monitoring
Security Implementations of Bring Your Own device, IT Consumerization, and Managing User Choices
Information Assurance: Open Research Questions and Future Directions
Protecting Us from Us: Human Firewall Vulnerability Assessments
APPLICATION DEVELOPMENT SECURITY
Service-Oriented Architecture, Managing the Security Testing Process, Security Resilience in the Software Development Life Cycle
CRYPTOGRAPHY
Cloud Cryptography
SECURITY ARCHITECTURE AND DESIGN
Identity and Access Management Architecture, FedRAMP: Entry or Exit Ramp for Cloud security?
OPERATIONS SECURITY
Data Storage and Network Security
LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS
Information Law, National Patient Identifier and patient Privacy in the Digital Era
Addressing Social Media Security and Privacy Challenges, Compliance, PCI Compliance
LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS
Investigations, What Is Digital Forensics and What Should You Know about It? eDiscovery
Overview of the Steps of the Electronic Discovery Reference Model, Cell Phone Protocols and Operating Systems, Categories of Computer Crime.
NOTE: After you have selected a topic from the above chapter topics. You follow the weekly instructions below:
Week 1 – Select your topic. Explain why you selected the topic and include a theological statement. (250 – 350 words)
Week 2 – What are the key issues about the topic you selected? (250 – 350 Words)
Week 3 – Compare and contrast your topic as it relates to information security management. (250 – 350 Words)
Week 4 – What information security management technologies can be applied to your topic? (250 – 350 Words)
Week 5 – How can you try to resolve the issues of the topic you selected? (250 – 350 Words)
Week 6 – What is the future of this topic in regard to technology? (250 – 350 Words)
Week 7 – What are future issues to be concerned with about your topic? (250 – 350 Words)
1. Turn-in of final project: Week 8 – Finalize your paper, develop an introduction and conclusion for the paper. Submit your paper (2,000 – 2,500 words). Be sure to address each of the following:
Use APA guidelines.
Check your spelling and grammar
Include at least 14 peer-reviewed sources.
Add narrative transitions where appropriate.
Incorporate what you have learned from the weekly Blackboard discussion questions.

The case can be found in the Enterprise Systems for Management

Test your understanding of Module Two, and complete Case 2-2 Real-World Case (Systems Integration at UPS Corp.). The case can be found in the Enterprise Systems for Management textbook, pages 54–56.
What are some of the system integration challenges faced by UPS?
Discuss the systems integration solutions at UPS. How does it help UPS integrate new technologies?
Discuss the advantages of systems integration for UPS customers.

Include: Sentence variety, Formal (3rd person), No contractions, No slang.   Introduction Paragraph

Informative Essay Outline p1
Include: Sentence variety, Formal (3rd person), No contractions, No slang.
Introduction Paragraph
Hook – AQQS Anecdote (short, interesting true story), Quote, Question, Strong Statement
Background information (from sources)
Thesis sentence
Respond to the writing situation – Controlling idea of essay
Body (2-4) Paragraphs
Transition, Topic sentence – controlling idea (writing situation)
Lead in / quote – According to…/ evidence/ Cite (Source1)
2-3 supporting details from sources.
Transition/Explain- more you than the sources.
Conclusion Paragraph
Restate Thesis – use synonyms
Summarize your points
What is the significance to society? Why the information/ explanation is important.
Circle back to your Hook – address the anecdote, explain the quote, answer the question, support the strong statement – whichever applies.
Remember, this is an outline that should be used as a guide. Your personal writing style will make it unique!
Avoid words that are not strong: should, would, maybe, I think, I believe, …
Use transitions!
Therefore In addition As the evidence shows Thus Whereas Hence
It is evident However Yet Consequently For instance In other words
Overall  Nevertheless Similarly Likewise Ultimately Furthermore
, FOR End COMMA SPLICES!
, AND  Use FANBOYS to join independent clauses (sentences).
, NOR
, BUT
, OR
, YET

arketing Plan: Part III Throughout this course, you have been compiling a comprehensive marketing plan using one of the product/service scenarios listed in the Unit II assignment.

arketing Plan: Part III
Throughout this course, you have been compiling a comprehensive marketing plan using one of the product/service scenarios listed in the Unit II assignment. (Note: You should have been using the same scenario for Parts I–III.)
This unit’s submission should consist of the items listed below.
Product
This section of the marketing plan should include a description of the products and services offered to the consumer. Remember that this product section should also identify services, warranties, and installation features. Additionally, brand, logo, and other identifying characteristics should be discussed in this section as they encompass part of the product offering.
Examine whether your company has a competitive advantage relative to its product offering (i.e., only address the product here).
Place
This section of the marketing plan should explain the entire distribution channel (see Unit VII Lesson). As a reminder, this is the flow of the product from the manufacturer or creator of the product/service to the final consumer (the entire process—not just the retailer at the end of the process). Describe a physical facility associated with your company. This can be a unique manufacturing or distribution center, retailer, or even a merchandising technique. The idea here is to describe what it looks like to the consumer and the value that this atmosphere brings to the buying experience.
Examine whether your company has a competitive advantage relative to its place offering (i.e., only address place or distribution here).
Price
This section of the marketing plan should describe the pricing strategies used by your company. Include theoretical aspects of pricing (see Unit VII Lesson) in your discussion here.
Examine whether your company has a competitive advantage relative to its pricing strategies (i.e., only address pricing here).
Promotion
This section of the marketing plan should address the promotional methods used by your company. This should not only include social media/Internet marketing but also traditional marketing and advertising used (e.g., personal selling, advertising, sales promotion, publicity).
Examine whether your company has a competitive advantage relative to its promotional strategies (i.e., only address promotion here).

Select one of the industry sectors from the list. Describe two industry-specific cloud computing trends that will enable organizations operating in that sector to gain a competitive advantage if implemented.

Select one of the industry sectors from the list. Describe two industry-specific cloud computing trends that will enable organizations operating in that sector to gain a competitive advantage if implemented.

Healthcare
Manufacturing
Transportation
Retail
Education
Financial Services

Within the Discussion Board area, write 1,000 words that respond to the following questions with your thoughts, ideas, and comments.

Within the Discussion Board area, write 1,000 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Describe yourself in entrepreneurial terms using the ideas that are discussed in your reading. Choose at least 5 attributes from the following list:

Focused and committed
Positive outlook
Opinionated
Impatient
Likes simplicity
Autonomous
Aggressive
Copes well with uncertainty
Aloof
Opportunistic
Problem solver

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?