With regard to MY assignments (IP’s, GP’s, DB’s), consider the source before you include information from Web sites.
- Who sponsors the Web site?
- Is the information on the site supported by theory and research?
- WIKIPEDIA, Yahoo Answers, dictionaries, encyclopedias, or similar websites, may NEVER be used or cited under any circumstances, on any assignment, discussion, or response for this class.
1) DISCUSSION BOARD (ONLY 200 WORDS)
Watch the following
LinkedIn Learning Videos
to help you with the assignments in this Unit.
Many financial providers treat privacy as a compliance issue, instead of, more appropriately thinking of privacy as a risk management issue.
Discusshow current regulations that help consumers protect their privacy have affected you.
What do you see as the primary causes of network threats to an individual's privacy?
Describe an experience where your personal privacy or that of a friend or family member was threatened.
Whatdo you think organizations (or governments) should do to avoid or prevent such threats?
Should personal privacy protection be an organization’s responsibility, yours, or both? Why?
Identify a single privacy threat, which is the most difficult to fix and propose what can organizations do to counter it?
2) INDIVIDUAL PROJECT (1050 WORDS)
Assignment Description
Watch the followingLinkedIn Learning Videosto help you with the assignments in this Unit.
Your electronics manufacturing company is working on a new product. The board of directors thinks that this product will revolutionize the travel industry and generate huge profits for the company. To protect this product during the research and development cycle, the company is planning to install a new network consisting of a dozen computers. Your company selected you to lead a team that will develop a subset of a security plan for the network.
In 5 pages, write a report on the following:
- Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase. Specifically provide the following to meet these requirements:
- Title page
- Introduction 1 PARAGRAPH
- Provide details of the password policy to be implemented using the template found in the School of Information Technology's Library Guide (LibGuide). Usethis linkfor the LibGuide and navigate to MSIT / ITAS.
- Identify the authentication and authorization solution to be used (2-3 pages)
- Conclusion
- APA Reference List
- Include an estimated cost of your plan.