A company is
considering hiring you to set up and maintain part of its IT operations. As
part of the interview, you must submit the project below for review.
Project outline
An organisation wants to use SharePoint to help
keep track of its GDPR data in the organisation. You should plan and set up a
site in SharePoint with enough information so they follow GDPR.
Project description/detail
An organisation needs control of which computer
systems they use, what kind of data they store, why, and who is the ‘owner’ of
the system. If this is an external system, they need to know they have
agreements with the vendor.
Additionally, they need to register and handle ‘GDPR
violations’ and apply the permissions to who has access to do changes on the
registers and what happens when a new violation is registered (like sending an
info email).
This project requires an in-depth study of the GDPR
law to understand the requirements of the GDPR for any organisation wishing to
implement the GDPR law. Based on the analysis of the GDPR law, the SharePoint
site will be developed to help companies start and continue to maintain their
internal work with the GDPR. The purpose of this site is to be flexible and
allow organisations to add their own rules and policies regarding the GDPR.
This is because some GDPR requirements would be different in relation to the
nature of the business.
The report will cover the GDPR law and creating a
SharePoint site with GDPR features. Furthermore, the site will provide the
appropriate security structure and automated features, such as notification of
any action on the site data.
A demo (proof of concept) is required to show the
work completed.
Possible resources required
Virtualisation software and host computer with an OS
(Windows, Linux) installed and configured.
Linux Server installation media.
Access to Packet Tracer, installed on the host machine.
Windows server installation media.
Linux and Windows desktop installation media.
Category: Cyber security
-
“Implementing GDPR Compliance through a SharePoint Site”
-
“Exploring the Top Cybersecurity Research Topics: A Comprehensive Analysis”
https://www.knowledgehut.com/blog/security/cyber-security-research-topics
https://writingcenter.kennesaw.edu/resources/handouts_print/IEEE%20Format.pdf -
Title: “Securing Sensitive Data and Cloud Resources with the MIST Algorithm: A Review and Analysis” Introduction: In today’s digital age, the use of cloud-based information technology (IT) resources has become increasingly prevalent. These
Discuss how the MIST Algorithm can be applied in securing sensitive data and cloud-based information technology (IT) resources.
Review and discuss the proposed algorithm as it relates to cloud disaster recovery and security algorithms. -
“Exploring Cybersecurity Concepts: Attack Chains, Module 6 and 7”
Limit your response to no more than a single page in MS Word (font 11, single spacing, normal margin – left, right, top, bottom= 1”). Use your own words to craft your answers; directly copying from the sources and citing them is forbidden. Then, convert this Word file to PDF for submission.
Submit only a 1-page PDF to Canvas for each problem. Do not include the instructions for this problem page in your 1-page submission file. Otherwise, you will lose 20% of the score.
You must upload three PDF files; each PDF is 1 page long. Other formats will not be accepted. Otherwise, you will lose 20% of the score
Question 1 has the file in it question 2 will go with the attackchain file and question 3 will be about module 6 and 7 files -
Lab Questions Answered Lab 1 Questions: 1. What is the purpose of this lab? 2. What materials are needed for this lab? 3. What steps did you take to complete this lab? 4. What challenges did you encounter during
I just need 1 word document with the questions from each lab answered after each step. Only 2-3 sentences each when needed. Thank you.
-
“The Impact of Globalization on Labor Rights and Workers’ Rights” Introduction: The concept of globalization has been widely discussed and debated in recent years, with many arguing that it has brought about significant changes in the global economy and society. One of the
Paper Requirements:
Required topic headings for your paper should include the background surrounding the issue, a historical
perspective, current issues that are applicable, legislation dealing with this topic, examples, global
dynamics/impact (such as issues, processes, trends, and systems), personal impact from a global perspective,
and a summary. These are the topics to be discussed in the term paper
Each paper should contain a reference list of at least five (5) different substantial and quality references. The
references and reference citations for the term paper must be to a current event less than 3 years old (a
reference with no date (n.d.) is not acceptable). This requires a reference citation in the text of the paper
and a reference at the end of the paper to which the reference citation applies. You must include some
information obtained from the reference in your answer. The references must be found on the internet
and you must include a URL in your reference so that the reference can be verified.
You cannot use information from the text book or any book/article by the author of the text book as a
current event. Make sure that your reference has a date of publication.
The body of the paper should be a minimum of six typed double spaced pages. Your cover page and
reference page cannot be counted in this number. You should use the APA format for your reference citations
and the reference page.
This course has been designated as a global course which includes the requirement that you must place this term
paper in your ManeSync Experiences. A screen shot must be attached to your term paper that you submit for
grading to prove that the paper was placed in your ManeSync Experiences. Directions for using ManeSync
Experiences are provided in the following document under the Term Paper tab: ManeSync Experiences
Instructions.docx
Feel free to use the Communications Skill Center (http://www.tamu-commerce.edu/litlang/CSC/located.htm),
Hall of Languages, Room 103, Phone No. 903.886.5280 to assist you with this writing assignment.
Check out www.citationmachine.net for tips on properly citing works. -
Resource and Communication Plan for Virtual and Self-Organized Teams Resource and Communication Plan for Virtual and Self-Organized Teams Introduction In today’s global business environment, virtual and self-organized teams have become increasingly common. These teams offer many
Now that you have divided the tasks for the project, you are ready to build a resource management and communication plan. Assume that your product engineering and software development teams are self-organized virtual teams while all other resources are onsite. You’ve also learned that one of the lead developers will be on paternal leave in the next 5 months and QA resources are limited to one full-time resource due to one person being out on medical leave for the next 6 months and another recently left the company. You don’t have a dedicated User Experience (UX) designer on the team, but there are a couple of developers on the team with some of that expertise. You will now prepare a resource and communication plan that includes the following:
Resource plan that identifies the resources and when they will be needed.
Resource Breakdown Structure (RBS) chart of the resources and resource types needed for the project.
Communication plan that outlines the different audience, message, communication methods, frequency, and timeframe.
Communication considerations for virtual and self-organized teams. Length: 2 to 3-page resource and communication plan, include at least one diagram using Lucidchart or a diagram software of your choice. Lucidchart information has been provided in this week’s resources.
References: Include a minimum of 3 scholarly resources. -
“Exploring the Impact of Social Media on Adolescent Mental Health: A Mixed-Methods Study”
I’ll provide the official research proposal, including the literary review that I would like the context of it to remain as part of this paper. Additionally, my research method is a mixed-method approach. Quantitative data was collected through surveys, and qualitative data was collected through interviews. I will attach all the collected data required. Additionally, i’d like for the sources i have to be utilized the best way possible, but feel free to add any additional sources if needed.
-
Title: The Dark Web: A Growing Concern for Online Drug Trafficking Introduction: Online drug trafficking, also known as cyber drug trafficking, is the illegal trade of drugs through the internet. It has become a growing concern in recent years due to
The paper should include enough information so the reader understands the topic, research, and understands why it is relevant to what we have learned during the course. Information should be correctly sourced, and all sources should be noted where appropriate.
Sections to include:
Intro to the subject/research problem
Your research on the topic
Analysis of the information/subject/research reported – why is it relevant?
Conclusion / possible future work
Include all sources
Each Paragraph should assosciate to 1 paragraph.
The research topic should be on Online Drug Trafficking
To ensure your paper meets the necessary standard, it must conform to the APA Formatting -
Title: “Improving Data Governance to Prevent Data Breaches: A Business Case for XYZ Company”
you are required to create business use cases for data
governance. This task builds on the work you did in weekly classes and the first
individual assignment. You have already researched and identified an incident
related to poor data governance. In this Data Governance Business Case
assignment, you will use the knowledge and skills you acquired in this course to
prepare a business case that proposes solutions to issues caused by poor data
governance. However, you need to select a different case from the one you used for
the first assignment. It is recommended that you do not use the cases of Optus or
Medibank for this assignment. create a rich picture and root definition of the incident as mentioned in the file below