Entries by Daphne Hanson

The systems development life cycle

The systems development life cycle (SDLC). The SDLC is the overall process for developing information systems, from planning and analysis through implementation and maintenance. The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase. These activities typically include determining budgets, gathering system requirements, and writing detailed […]

The proliferation of fake news and social bots

Should digital media, such as social media platforms continue to use highly sophisticated but opaque algorithms to adapt users’ experiences on their platforms? The lecture highlighted some examples such as autocompletion or product recommendation where such algorithms can be harmless or even beneficial, but the proliferation of fake news and social bots showcase how these […]

The heuristic evaluation method

OBJECTIVES In this assignment you are asked to apply the heuristic evaluation method to investigate usability issues of an educational website. The objectives of this exercise are: • Demonstrate an understanding of various usability heuristics and web design principles; • Understand the procedure of applying heuristic evaluation; • Recognize the strengths and weakness of the […]

Data breaches

In an organization, you are working, it has been brought to your notice that there are data breaches due to emails hacking. As the person involved in framing the company’s security policies provide details of the various policy changes you will bring regarding email usage to avoid these data breaches.

Skills in applying information security tools

This assessment is designed to assess your technical skills in applying information security tools. In this assignment, you have to study and apply steganography techniques to embedded data within a file. In addition, you have to understand Linux file systems and apply access control technologies. The assessment is also assessing your skills to analyses information […]

Business continuity and business impact analysis

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business.  Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs). Explore why it is […]

The Firewall function of a Router

The Firewall function of a Router is made up of rules. By using Firewall Rules, form the below rules: 1. Block a website IP address from accessing your Wifi. 2. Block your browser from sending or receiving network traffic from your device. 3. For both rules: o Present the steps and explain your choices. o […]

The Virtual OS

Consider the Virtual OS you created previously in this course (you can re-open the VM program to answer these questions). Imagine you were using the VM as part of a cloud server. Create a PowerPoint-style presentation that includes the following features: One slide that shows the host OS, guest OS, and hypervisor/VMM for your VM […]

Cyber Incident response requirements

Research and compare the Cyber Incident response requirements for at least two of the major security and privacy compliance standards, such as HIPAA, PCI DSS, FERPA, COPPA, FACTA, ECPA.  Does the policy require an Incident Response capability?  What are the requirements?