For this project, you will take a stakeholder role in a business on the forefron

For this project, you will take a stakeholder role in a business on the forefront of a privacy issue. You will need to articulate a point of view that reflects your professional stance on privacy, the laws relevant to the issue, and the business implications of your recommendation.In this assignment, you will demonstrate your mastery of the following course competency: Articulate an informed position on contemporary issues of privacy and its relation to organizational mission Scenario Fit-vantage Technologies is a quickly growing competitor in the personal fitness-tracking industry. As the
company gets closer to launching its newest device, the Flame watch, the Fit-vantage executives have
been approached by Helios Health Insurance Inc. to form a partnership. This partnership proposes a
program allowing Helios subscribers to purchase a Fit-vantage Flame at a discount in exchange for
access to the anonymous data collected from participating customers.for this project. You will situate yourself as an executive-level security consultant with the primary responsibility of advising senior management in cybersecurity matters. As a member of the internal stakeholder board for the proposal presented in the scenario, you will be able to offer essential input. Based on the information and resources from the scenario and your work from the milestone, prepare a memorandum to the internal stakeholder board specifying your position on the acceptability of the proposal in the scenario. Prompt You must address the critical elements listed below. In a memo to the internal stakeholder board, defend your position on the proposed partnership. Your memo should address the balancing of privacy from the security practitioner’s perspective alongside the corporate mission and business goals.In your memo, be sure to address the following questions:I. Are the privacy laws sufficient to ensure that the sharing and use of data will meet the fair information practice principles of the organization?II. What are the minimum privacy safeguards you would recommend be in place for the individuals’ control over their data? III. In your opinion, is the proposal a good decision for the organization? Weigh the privacy considerations from a security practitioner’s perspective as well as the corporate mission and business goals in justifying your position. [
Requirements: 2-3 pages

Purpose:In this lab, you will learn how to recognize data hidden using ADS.Consi

Purpose:In this lab, you will learn how to recognize data hidden using ADS.Consider a PC on which individuals could hide and pass information covertly and no one would be able to readily detect their presence or an attack on a system allowing the attacker to use up all of your available disk space, without you knowing why you cannot save any additional data as the system still reports plenty of additional disk space available. Such is the threat that alternate data streams presents to both Unix and Windows systems in which data can be stored in a file’s main unnamed data stream. As Windows does not come with native tools enabling you to see which files have streams attached to them, we have to rely on 3rd party tools to routinely review our file system for the presence of these covert files. In this lab, you will create an ADS and view it using a Sysinternals tool available now from Microsoft’s website. Lab requirements:NTFS partition
A forensic tool to display the Stream – recommend either SFind (available from Foundstone at McAffee – under the Resources link) or Streams by SysInternals (available from http://live.sysinternals.com/Files/ (Links to an external site.)). Download the Streams.zip file from Microsoft and unzip to access the executable.
Lab Steps:Hiding text:Create a folder named ADSLAB
Expand the Streams.zip file into the ADSLAB folder
Create a folder under ADSLAB named Myfiles
In the Myfiles folder, create a couple of text files (by clicking on File – New – Text Document – name these files anything you want).
Create a new text file named test.txt
View the file details – note how large is the “text.txt” file and get a screen capture that shows the size.
From the command prompt type echo – lets hide our illegal files in this file>test.txt:stream. You have just created a stream named stream that is associated with the file named test.txt.
Display the file by typing DIR Note that when you view the file size it is still reported as 0. Save a screen capture of that.
Open the file in Notepad. Note that the file looks empty when you open it in any text editor. Save another screen capture.
To see your stream enter more < test.txt:stream (the type command doesn't accept stream syntax so you have to use more).
Did you see the data? Keep in mind that there is not a limit to the amount of data that can be associated with the file!!
Detecting ADS:At the cmd prompt, change directories to the ADSLAB directory where your streams.exe file resides. If you do not know how to change directories, Google search is your friend!
Type streams –s myfilesthis is executing the file streams.exe using the recursive switch against the myfiles directory to report any files containing ADS.
Did Streams report the correct file?
Delete the stream using the streams –d switch.
Lab Report: What controls do you think could be implemented to protect a system from users keeping covert data on the system using ADS? Submit at least 2 or 3 specific solutions.
Be sure to submit all the screen shots showing how you performed the steps above.
Download/print these instructions:streams-NTFS.doc (Word)
streams-NTFS.pdf (PDF)
3. To Submit: Click the Submit Button link above.Grading:This assignment is worth up to 50 points towards your final grade. Points will be deducted for any missing screen captures or steps. You will receive 40 points for including all required screen captures and following all the directions above. You will receive up to 10 points for providing specific solutions.Were you able to perform all of the steps above? What did you learn? Please include a couple of screen shots.What controls would you implement to protect you system from users keeping covert data on the system using ADS?
Requirements: provide screenshots and answer the questions

takke the following two cases regarding Napster and YouTube. http://money.cnn.co

takke the following two cases regarding Napster and YouTube. http://money.cnn.com/2005/06/27/technology/grokster/ (Links to an external site.) More information about Napster can be found in the course textbook on pages 309 -310 – Sevice Provider Liability for Copyright Infringement.http://money.cnn.com/2014/03/18/technology/google-viacom-lawsuit/ (Links to an external site.) – YouTube Do you feel that the court’s decision was right in both cases? Use the course textbook or any other credible resources to support your views.What are your personal feelings about sharing intellectual property over the Internet?Your paper should be at least two pages – 12 font, double spaced.Purpose:Understand the role copyright laws play in securityDirectionsYou will submit a paper by clicking the “Submit” button above. Your paper should be at least two pages- 12 font, double spaced.GradingThis assignment is graded on a scale of 0 – 100%
Requirements: 2 pages

This is a scenario based questions. this is the only instructions and the only t

This is a scenario based questions. this is the only instructions and the only thing i have. no file and documents.You are the systems administrator for company ABC. You have been notified by HR that their computer needs to have encryption using email. You know that your company uses Microsoft Office365. Explain step-by-step how to configure Office365 for encrypting email.DO NOT CUT AND PASTE FROM THE INTERNET.
Requirements: enough to answer the questions in detail

*NOTE: SCRUM BOARD SHOULD BE BASED OFF ATTACHED ASSIGNMENT*Projects that conform

*NOTE: SCRUM BOARD SHOULD BE BASED OFF ATTACHED ASSIGNMENT*Projects that conform to the Agile methodology often use something called a scrum board. You can think of a scrum board as a digital whiteboard containing yellow “stickies,” each listing a task, posted beneath categories such as “to do,” “in process,” in testing,” etc. Using a scrum board in this way allows all project members to see where important tasks are in the overall project process quickly and easilyFor this Learning Team assignment, you will collaborate with your team members to create an Agile scrum board based on the Global Treps project from the Wk 2 Team assignment (see below).Note that in an industry situation, you would most likely use a specialized software tool to manage your scrum board such as Jira, Rally, Asana, or Basecamp. However, in this course, you will be using a tool that you may already be familiar with—Microsoft Excel—to create your scrum board and other deliverables. It is the organization and assignment of tasks that is important about a scrum board, not the specific software tool you use to create and manage it.To complete this Learning Team assignment: Reread the Global Treps Scenario that you read in the Wk 2 Team – Apply assignment.Review the Learning Team Scrum Board Example spreadsheet. (Note: Click the Board tab that appears at the bottom of the spreadsheet to see the scrum board example.) Create a scrum board in Microsoft Excel format, similar to the linked example, to align with the project scoping document your team created in Wk 2. Ensure that your finished scrum board incorporates a project budget. Submit the team assignment.
Requirements: SCRUM Board

*NOTE: PLEASE USE THE TEMPLATE PROVIDED*Tony and his project team identified som

*NOTE: PLEASE USE THE TEMPLATE PROVIDED*Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.Complete the following tasks:Create a risk register for the project. Identify SIX potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
Develop a response strategy for each risk of at least 45 words each. Enter the information in the risk register. The more substantial and well-argued your response strategy, the better. Minimal effort = Minimal grade.
Separately from the Risk Register, write at least 175 words describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
Submit your risk register with the response strategy and explanation.Note: A Risk Register template is available. I recommend that you use it.ResourcesCenter for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Requirements: Excel Chart and 175 Word Description

Go online and search for information about companies that have been harmed or ba

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.
Requirements: words   |   .doc file

*NOTE: SCRUM BOARD SHOULD BE BASED OFF ATTACHED ASSIGNMENT*Projects that conform

*NOTE: SCRUM BOARD SHOULD BE BASED OFF ATTACHED ASSIGNMENT*Projects that conform to the Agile methodology often use something called a scrum board. You can think of a scrum board as a digital whiteboard containing yellow “stickies,” each listing a task, posted beneath categories such as “to do,” “in process,” in testing,” etc. Using a scrum board in this way allows all project members to see where important tasks are in the overall project process quickly and easilyFor this Learning Team assignment, you will collaborate with your team members to create an Agile scrum board based on the Global Treps project from the Wk 2 Team assignment (see below).Note that in an industry situation, you would most likely use a specialized software tool to manage your scrum board such as Jira, Rally, Asana, or Basecamp. However, in this course, you will be using a tool that you may already be familiar with—Microsoft Excel—to create your scrum board and other deliverables. It is the organization and assignment of tasks that is important about a scrum board, not the specific software tool you use to create and manage it.To complete this Learning Team assignment: Reread the Global Treps Scenario that you read in the Wk 2 Team – Apply assignment.Review the Learning Team Scrum Board Example spreadsheet. (Note: Click the Board tab that appears at the bottom of the spreadsheet to see the scrum board example.) Create a scrum board in Microsoft Excel format, similar to the linked example, to align with the project scoping document your team created in Wk 2. Ensure that your finished scrum board incorporates a project budget.
Requirements: SCRUM Board