Categories
Writers Solution

Chief Information Officer (CIO)

 Select a financial institution, high-tech manufacturer, or a hospital that has no fewer than 500 employees and provide guidance regarding the risks faced by the organization. Consider the organization that you select and name, as well as the industry in your response. Your guidance is directed to the Chief Information Officer (CIO) as a result of the concern during a period where the Chief Security Office (CSO) is not available. You need to fill in for the CIO.

Review key external influences on risk and then outline the most important influences from within the organization. Start by selecting any appropriate laws, standards, frameworks, and theories that should underscore your guidance. Use the foundation to establish a strong framework allowing you to provide a convincing and logical response, leading to the acceptance of your guidance. Your response should be persuasive and supported by both scholarly sources and especially any relevant legislation, standards, frameworks, and theories. Despite the formal foundation, including a strong focus on practical issues and values. Note that the focus is on risk and guidance, not mitigation.

References: Support this part with no fewer than 6 scholarly sources published within the last five years and 6 quality Internet sources within the last three years.

Length: 5 to 8 pages

Readings:

– Baskerville, R., Rowe, F., & Wolff, F.-C. (2018). Integration of information systems and cybersecurity countermeasures: An exposure to risk…

– Grohmann, A. (2018). Evolution of the cybersecurity framework. ISSA Journal, 16(7), 14-18.

– James, S. (2018). Enacting expertise: Ritual and risk in cybersecurity. Politics and Governance, 6(2), 31-40

– Stevens, T. (2018). Global cybersecurity: New directions in theory and methods. Politics and Governance, 6(2), 1-4

  1. Assignment statusSolved by our Writing Team at CapitalEssayWriting.com
  2. CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com
Categories
Writers Solution

You have been hired as the CSO (Chief Security Officer) for an organization

 You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

Categories
Writers Solution

You are a police officer who has been assigned to a local high school as a school resource officer.

 You are a police officer who has been assigned to a local high school as a school resource officer. You would like to recommend the use of restorative justice techniques to your resource officer program supervisor as you believe these will help youthful offenders assimilate back into the school system after being away. Prepare a report for your supervisor in which you outline the techniques you would like to use and how these ideas might help to improve relations between resource officers and young people in the schools. In your report, be sure to explain the theoretical perspectives behind your techniques and why you feel they are important.

Your report should consist of at least two pages, including an introduction, and should use at least two references, one of which can be your textbook. Make sure that your citations and references are formatted properly in APA Style.

Resources: The book for this course is:  Solar, P. J. (2019) Police and Community Relations: A conflict management approach. You may reference the book and you may also use your own sources. Please follow all the instructions. 

Categories
Writers Solution

You are required, in the role of the Finance Officer for Landscape Horizons, to compile and analyse financial data and prepare a number of reports, as well as fill in a BAS form and submit it to their BAS agent for approval.

Assessment Task 2: Financial activity reporting project
Task summary
You are required, in the role of the Finance Officer for Landscape Horizons, to compile and analyse financial data and prepare a number of reports, as well as fill in a BAS form and submit it to their BAS agent for approval. You will also provide recommendations on the business in a meeting with the business owner.
This assessment is to be completed in the simulated work environment in the RTO.
Required
• Access to textbooks and other learning materials
• Computer with Microsoft Office and internet access
• Assets and Liabilities Data
• Recommendations Report Template
• Transaction Spreadsheet
• Financial Policy and Procedures
Timing
Your assessor will advise you of the due date of these submissions.
Submit
• Required reports
• Recommendation Report
• Draft BAS Form
Assessment criteria
For your performance to be deemed satisfactory in this assessment task, you must satisfactorily address all of the assessment criteria. If part of this task is not satisfactorily completed, you will be asked to complete further assessment to demonstrate competence.
Re-submission opportunities
You will be provided feedback on their performance by the Assessor. The feedback will indicate if you have satisfactorily addressed the requirements of each part of this task.
If any parts of the task are not satisfactorily completed, the assessor will explain why, and provide you written feedback along with guidance on what you must undertake to demonstrate satisfactory performance. Re-assessment attempt(s) will be arranged at a later time and date.
You have the right to appeal the outcome of assessment decisions if you feel that you have been dealt with unfairly or have other appropriate grounds for an appeal.
You are encouraged to consult with the assessor prior to attempting this task if you do not understand any part of this task or if you have any learning issues or needs that may hinder you when attempting any part of the assessment.

Assessment Task 2 Instructions
Landscape Horizons is a gardening business established by Greg James as a sole trader three months ago. The business offers gardening services to residential customers. The business address is Greg’s home 7 Mountview Road, Tyagarah NSW 2483. ABN 24 615 058 112.
Greg charges an hourly rate of $50. Financial projections show that the annual income will be approximately $80,000.
Greg can already see that he is going to get busier and busier due to the amount of customer enquiries. He recently had a casual labourer help him out a few times in the last couple of weeks, for one day in total. He has also decided to employ (you) an Accounts Officer part-time to look after the invoicing, accounts and reporting, as this is an aspect of the business he does not want to do himself. He has a Financial Policy and Procedures that a friend wrote for him, and this should be used as guidance.
All the transactions for the first three months have been recorded in a spreadsheet but Greg has requested that these are now moved into an accounting software system as he believes this will be much more efficient.
Complete the following activities:
1. Compile and analyse financial data
Review the Transaction Spreadsheet and research the financial and taxation regulations that would apply to Landscape Horizons.
Set up the company in the accounting software system as directed by your assessor.
Once you have completed this, you are required to enter the income and expenses for the first three months of the financial year from the transaction spreadsheet. For each item you will need to classify the type of income or expense, establish a relevant code and then record the data against this code.
You will also be required to value the assets and liabilities of the business as set out in Assets and Liabilities Data and enter in this into the accounting system using the required accounting method. Check all of your entered values prior to finalising.
Greg has reviewed the data you have entered and has sent you the following email.
Dear Finance Officer
I am very happy that we have now moved all of the data into the new accounting system, it will be so much easier to track.
Please advise me of the method you used to value the assets, as I am interested in how this is calculated.
Also, I do apologise but I included a set of tyres that I bought for my wife’s car (for $528 on the 31st of September). They were not a business expense. Please remove them from the calculations.
Thanks Greg

2. Respond to queries
You are required to respond to the queries in Greg’s email.
Greg has sent you a further email regarding financial reports and seeking your recommendations.
Dear Finance Officer
Thanks for the information on asset valuation and rectifying the discrepancy with the invoice for the last month.
I really want to keep on top of the business and its performance so could you please provide copies of the following to me:
• Profit and loss report, including trends in profits as well as expenses over the last three months
• Statement of cash flow
• Balance sheet
I set myself a budget for expenses of $1,000 per month. Please advise of whether this has been achieved for each month or not.
Finally, please provide me with my projected income for the financial year assuming the business moves forward on pretty much the same note.
And I would also like you to give me some insight onto what would be possible if I take on Jimmy for two days a week on a regular basis, paying him $25 per hour and charging out his services to clients at $50 per hour.
I would like you to present the information to me at a face to face meeting. I am happy to look at the raw numbers with you, but if you would like to develop charts or diagrams to assist with the explanation, please feel free to develop these. It is important that you structure and format the reports in a way that makes them easy for me to understand.
Thanks Greg
3. Prepare reports
You are required to prepare, and download, the reports your client has asked you for using the accounting software provided by your RTO.
Using the Recommendations Report Template respond to Greg’s questions in his email.
Print out a copy of each of these reports to take to the meeting with Greg.

4. Present information to the client
When you have prepared the requested reports, meet with the client to discuss these.
Show each of the reports to the client, answering any questions they have.
You should present the financial issues and requirements clearly, succinctly, using language appropriate to the audience and the environment.
During the meeting, you are required to demonstrate effective communication skills including:
• Speaking clearly and concisely
• Using non-verbal communication to assist with understanding
• Asking questions to identify required information
• Responding to questions as required
• Using active listening techniques to confirm understanding
5. Fill out a draft BAS
Print out a copy of the BAS Form.
Make sure that it is the most up to date version by visiting the ATO website at:
https://www.ato.gov.au/Forms/BAS-F—quarterly-BAS/
Using the data you have entered into the accounting system, fill out a BAS Form for Greg with pen or pencil.
When you are finished, submit the form to Greg (your assessor) within the timeline that you have been given.


Assignment status
Solved by our Writing Team at EssayCabinet.com
CLICK HERE TO ORDER THIS PAPER AT EssayCabinet.com

Categories
Writers Solution

Falstaff’s Chief Compliance Officer

How much for this paper? I only want 6 pages including references.  

Please consider the fact pattern below on a fictional company, Falstaff Corporation. You are Falstaff’s Chief Compliance Officer. Based upon the facts and items to address at the end of the fact pattern, you are to prepare a memorandum to the Falstaff Corporation Board of Directors. Your memorandum should be a maximum of seven pages, single-spaced, in 12 point font, and with one inch margins. In preparing your memorandum, you can use all lecture and reading materials from class, as well as any additional outside research you would like to include with proper citations.

Your final memorandum will have a possible total of 100 points, with the following factors to be considered:

Content = 70 points

Style/Coherence = 10 points

Organization = 10 points

Research/Citations = 10 points

Categories
Writers Solution

You are a secondary officer assigned to a call. You will use the same scenario from Milestone One for practice

Instructions

Using the scenario from Milestones One, Two, and Three, submit a full draft of your incident report. Make sure to include all the elements in the final project document. Be sure the report is complete, concise, clear, and correct, and that it describes the incident and outcomes through the use of information that answers the six essential questions. The instructor will provide feedback in the next module.

In Module Seven, you will complete your final project. This final submission is based on a different scenario and video. Keep in mind that in Module Seven you will only be able to view this video once and that you will have to complete the Field Notes and Incident Report based upon this viewing. Use what you have learned from the milestones to prepare for this final assessment. 

Scenario One: You are the primary officer assigned to complete a report about this incident. Assemble a list of field notes based on your observations and on information that you consider to be necessary for the formulation of your report. Remember you will not be able to ask any questions, but keep in mind the information that you want to make note of. 

Scenario Two: You are a secondary officer assigned to a call. You will use the same scenario from Milestone One for practice. The primary officer is completing the original report and has asked you to take witness statements and complete the supplemental report section of the incident report, which details the information you have learned. 

Also, 100% free of plagiarism and completed on time!

Categories
Writers Solution

Chief information technology (IT) security officer for the Quality Medical Company (QMC)

PKI and Encryption at Work

Learning Objectives and Outcomes

  • Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

Assignment Requirements

In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.

QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.

QMC will be required to conform to the following compliance issues:

  • Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
  • Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
  • Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
  • Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
  • Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
  • Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics

Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.

You need to present your PKI solution in the form of a professional report to the senior management.

Required Resources

None

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 1–2 pages

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have identified specific data types related to the specific compliance regulatory requirements.
  • I have indicated a solution for sharing data beyond the borders of the organization.
  • I have appropriately selected and developed a PKI solution for content control.
  • I have followed the submission requirements.
Categories
Writers Solution

You are the primary officer assigned to complete a report about this incident.

Instructions

Begin by reviewing the video found in the Module Resources folder. This video will be used for all project milestones. The project milestones will allow you to practice sections of your final project (a Field Notes and Incident Report) before it is due in Module Seven. The video used for the milestones is different than the video used in Module Seven for your final project.

In this milestone, you will practice taking field notes. This is a practice task for the field notes section of the final project.

Scenario: You are the primary officer assigned to complete a report about this incident. Assemble a list of field notes based on your observations and on information that you consider to be necessary for the formulation of your report. Remember you will not be able to ask any questions, but keep in mind the information that you want to make note of.  

Here’s the link for the video: https://youtu.be/XWWKhau4p0M

Also, 100% free of plagiarism and completed on time!Files:CJ 202 Milestone One Guidelines and Rubric.pdf

Categories
Writers Solution

Chief Information Officer (CIO)

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. 

  • Vampire Legends (Week 1)
  • Cruisin’ Fusion (Weeks 2- 3)
  • Devil’s Canyon (Weeks 4 – 5)

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

  • Potential Risk to be Reviewed:Describe the risk.
  • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.
  • Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization.
  • Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.
  • Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
  • Example: Determine whether anti-virus software is in use.
  • Example: Determine whether virus signatures are periodically updated.
  • Example: Determine whether periodic virus scans are performed.
  • Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.
  • IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.
  • Review the various options available to address those processes and methods previously explained, and which ones might be feasible.
  • IT Security – Measures: Analyze the various security measures that could be taken within the organization.
  • Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.
  • Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
  • Example: 100% of servers and PCs have virus software installed.
  • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
  • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.