Pick one area of security that interests you and discuss the career opportunities that presently exist.
Category: security
The differences between proprietary and contractual security services
What are the differences between proprietary and contractual security services?
Digital Footprint: Privacy vs. Security
In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual property rights, security, and censorship. As a global citizen, you need to be aware of these issues and how they impact your life (CO6).
Your instructor will set-up two (2) conversation groups this week in which you will select one topic to discuss which interests you.
Conversation Group: Privacy
Privacy, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s right to privacy?
Conversation Group: Security
Security, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s personal security?
Using the Richard G. Trefry Library or another credible source, locate and read a quality article regarding digital privacy or security. Be sure to provide attribution for your source in the forum. As you are formulating your initial post consider the following questions:
What is the issue? Tell us about it as if we know nothing on the topic.
What are the pros and cons of the issue?
Why is the issue important?
How might the issue impact your life?
Cybersecurity Resilience
In 100-200 words, please explain Cybersecurity Resilience and why it is necessary for organizations.
In 100-200 words, please explain Risk Management and how Risk is assessed.
Information security is an essential part of a business’s operations.
The hard reality of information security today is this: “Bad things will happen!” You must be prepared to handle these “bad things,” such as hacks, security vulnerabilities, data breaches, insider threats, employee errors, privacy mistakes, etc. All of these bad things can cause irreparable damage to a business, and this is why information security is such a vital service for every organization.
Information security is based on three “pillars”:
Confidentiality of data
Integrity of data
Availability of data
In its most basic form, information security seeks to enable the business or organization to remain in business. To do so, it must cover threats to an organization’s information systems, including people, software assets, hardware assets, procedures, and data. With the inclusion of people and procedures, information security is no longer relegated to overseeing technology risks but must also consider physical security controls and administrative controls (human resources practices, policies, education, training, etc.).
The threats are many, including natural disasters, sabotage, industrial espionage, and cyber-crime, which might target your intellectual property or your organization’s finances. The means by which these incidents might occur range from happenstance to repeated, deliberate, and focused attacks on your technology (such as hacks or malware) and/or people (social engineering) by determined threat agents.
For this Discussion, you will analyze current trends in the field of information security. You will examine the three pillars of information security and the threats to these pillars, and you will investigate gaps between existing defenses and emerging security threats that businesses must understand and prepare for.
To Prepare:
Read this week’s resources, keeping in mind the three pillars of information security.
3–4 paragraphs that analyze current trends in the field of information security, examine the three pillars of information security and the threats to these pillars, and investigate gaps between existing defenses and emerging security threats.
Social Security Policy In The United States
Choose a social justice problem that addresses the needs of a specific population or subgroup that interests you. To find scholarly research about your topics, use the Capella University Library; government, educational, and organizational websites; and the United States Congress website, Congress.gov. Refer to the SWK5002 library research guide, Social Policy Research Tutorial, for assistance in doing policy research and locating resources.
Analyze the forms and mechanisms of oppression and discrimination of your chosen population or subgroup that exist within this social justice topic (for example, race, religion, disabilities, gender orientation, socioeconomic status, or access to services).
In your analysis, describe how the oppression and discrimination impacted this population.
Analyze ethical problems associated with your selected social justice problem.
Use the NASW Code of Ethics Web page to guide your analysis:
What ethical considerations in your selected social justice problem must be addressed?
What are implications for social work practice and positive client outcomes?
Describe the current, enacted policies for this social justice problem.
Research current, enacted policies that seek to address this social justice problem. These policies must be passed legislation currently in practice. Legislation can be at the federal or state level, but ultimately your course project will require you to select a federal policy.
Analyze how effective these policies are in addressing the needs of your chosen population or subgroup.
Do the policies effectively address the social justice problem? Provide a rationale that includes scholarly, peer-reviewed research.
Assess the impact these policies have had on your selected population or subgroup.
What policy constraints exist for this population?
Compare advocacy methods for the selected social justice problem.
What are the strengths and challenges of the advocacy methods? What additional steps could be taken to address the challenges?
Proposal For Minimizing A Data And Security Breach
Examine regulatory and ethical issues related to the use and management of health information technology.
Student Success Criteria
View the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane.
Scenario
The HIT Innovation Steering Committee within an organization is proactively looking at data breaches of other organizations to assist them with minimizing the risk to their data security and privacy. As an intern at this organization, you are to investigate and select a recently publicized data breach. Use information from the module readings, lectures and your own research. Create a Proposal for this Committee describing the identified data breach and strategies the organization can use to minimize security and privacy risks.
Instructions
Create a written Proposal that includes:
Description of the data breach, including outcomes for the affected organization (e.g., regulatory and financial)
Discussion of the security, privacy, confidentiality, and ethical issues resulting from this breach
A final proposal discussion that describes methods that can be implemented in an organization to minimize risk for a data and security breach
Reference page of resources utilized
Hardware security
In a well-written report, discuss the technologies employed by Apple and in the macOS to safeguard devices and data. While the list below should not be considered definitive, you might wish to address:
Hardware security
Encryption
System security
Chip Set Security
Discuss the topic below. Respond to posts from other students.
Supply Chain Security
Describe security vulnerabilities for manufacture and distribution of chipset supplies
Network Security Layers
Data backups are extremely important. Data ups should be kept off site and secure. Research a backup solution, datacenter or cloud based, and explain the available options, cost if possible, advantages and disadvantages, and if this is for personal or corporate use.