Computer Science Homework Help

University of The Cumberlands Disaster Simulations Discussion

 

D-Assignment 1

A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure?

  • ·        Explain, define, or analyze the topic in detail of about 600 words.
  • Share an applicable personal experience
  • Provide an outside source (for example,      an article from the UC Library) that applies to the topic, along with      additional information about the topic or the source (please cite properly      in APA 7)
  • Make an argument concerning the topic

Assignment 2

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course (Bus Cont Plan & Disas Recov Plan) research has connected and put into practice within their own career.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

ETC – Assignment 3

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User      authentication and credentials with third-party applications
  • 3      common security risks with ratings: low, medium or high
  • Justification      of your threat model (why it was chosen over the other two: compare and      contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

  • Your      paper should meet the following requirements:
  • Be      approximately four to six pages in length, not including the      required cover page and reference page.
  • Share      an applicable personal experience
  • Provide      an outside source (for example, an article from the UC Library) that      applies to the topic, along with additional information about the topic or      the source (please cite properly in APA 7)
  • Make      an argument concerning the topic