You are the Information Security Director for a medium sized company. You recent

You are the Information Security Director for a medium sized company. You recently experienced a ransom-ware attack that cost the company $500,000.00. After the attack, your CEO held a meeting and informed you and the other IT professionals that it “WILL” not happen again. Write a Directive to the employees of the company summarizing the requirement for all personnel to adopt the new 2-factor authentication for IT equipment access. Include a 30-day timeline to adopt, and the consequences of not adhering to the new policy.
Instructions:
Write a 400-500 word directive.
Your essay should include an introductory paragraph and a conclusion
Support your essay with 3 credible references. Please note Wikipedia, Investopedia and similar websites are NOT credible academic references.

Assignment Content Imagine this scenario: Your Learning Team is a cybersecurity

Assignment Content
Imagine this scenario: Your Learning Team is a cybersecurity engineering team for a financial services company that sells investments to and manages investment portfolios for high-net-worth individuals.
Your organization just completed the migration of the account managers to a cloud-based, customer relationship management (CRM) software application. Your organization has integrated the cloud-based CRM with on-site investing and account-management systems to improve investment-product sales to existing and potential customers and for managing customer accounts and investment portfolios. Account managers are excited to use the new system, especially since it supports mobile device access.
Management hopes the new cloud-based CRM, integrated with the on-site software applications that manage customer accounts and investment portfolios, will help the organization generate more leads, increase sales, improve customer service, reduce the cost of sales for the organization, and increase revenue.
Your organization’s chief information security officer (CISO) is concerned about the new system’s security and its integration into existing systems.
As a team, write a 4- to 6-page security analysis for the CISO in which you:
Create a plan that addresses the secure use of mobile devices by internal employees and external employees as they use mobile devices to access these applications.

Hiring the right person for the right job is not as easy as it might sound. For

Hiring the right person for the right job is not as easy as it might sound. For this discussion, research online to find a suitable source (with easy online access for classmates to explore) about common hiring mistakes.
For the initial post:
In a first paragraph, explain at least two hiring mistakes examined in the source you found, writing in your own words. Cite your source properly using APA in-text citation.
In a second paragraph, describe how these mistakes could be costly for an IT team or a tech company. Write this paragraph from experience or using your critical thinking skills, not source material.
Provide a full APA reference entry at the end of the post for the source you used in the first paragraph.

my book is security policies and implementation issues by rob johnson. please do

my book is security policies and implementation issues by rob johnson. please do NOT take this assignment if you dont have access to this book. Please reach out if there are any questions
For this assignment, you are tasked with finding at least 2 different data classification guides on the internet. You can use databases and other scholarly libraries to help you with your search. After you find the different guides, I want you to write a review of each one. In your review, I want you touch upon the key concepts that are discussed in Chapter 11; namely the different types of classification schemes used by different organization types. Referencing the FIPS 199 manual is helpful as well.
The second part of the assessment is to discuss why it is important to have a data classification guide and what can happen if one is not in place. In this document, I want you to discuss risk and how important risk management is for an organization. You can use the information found in the textbook on pages 311-322 to help frame your answer.
The third part of the assessment is to take concepts from Chapter 12, Incident Response Team Policies, and write up a mock press release. The scenario you are to use is one of a data classification breach:
You are a top-notch cybersecurity expert working at the Centers for Disease Control (CDC). You are hard at work ensuring the networks are hardened and your defense in depth techniques are state-of-the-art! It is brought to your attention that the CDC is receiving data from the World Health Organization, data that is highly controversial and cannot be released to the public. Included with the information were names, emails, and other personal information of senior leaders in the world along with their health information. This information is highly sensitive and by releasing it to the general public, it would cause pandemonium. You are feeling good until your co-worker comes to you and informs you that there are some anomalies on the network and it looks like there is data being exfiltrated out using Port 53. You immediately jump into action using your updated IRT checklist. You and your team were able to stop the attack…yet you are not quite sure what data was stolen. Your boss comes to you and wants you to put together a press release for the nation…get to work!
There is no page limit on your press release…I highly recommend your read some press releases on the internet to get an idea of what is out there and then you can refer to page 349 (Titled: Handling the Media and Deciding What to Disclose) in the textbook for additional help. Cite your work if you use anything other than the textbook.

You are an information technology (IT) specialist who supports a department of 2

You are an information technology (IT) specialist who supports a department of 20 workstations. Some employees store important information on their local hard drives. Because hard drives can fail, your department manager has asked you to research redundancy options for potential implementation. Management has also decided to include all workstations since any IT employee in the department can be assigned projects that use important information. The department manager wants a redundancy plan that includes data storage and power concerns.
The department manager has left the decisions and implementation for a redundancy plan up to you. When it is complete, she does want a report explaining the redundancy plan that you developed and implemented. You are to include the following information in your redundancy plan:
use of a RAID solution or another redundant method,
upgrading of any memory necessary for optimization of each system, and
troubleshooting techniques used to optimize memory requirements for the redundancy plan.
Use the internet and your textbook to develop a redundancy plan for the department. Explain how the plan will protect against data lost due to hard drive and power failures. The company is anxious to protect critical company data, so they are not concerned with the cost-only results.
Ensure your final report to the department manager fully explains the redundancy plan and how it will accomplish management’s goals. You can use tables and illustrations in your two-page report.
If outside sources are used, please adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary.

At a conference, you presented the pros and cons of electrical hardware installa

At a conference, you presented the pros and cons of electrical hardware installation, and a student at the conference asked how you would protect yourself and the electrical hardware from harm. What would you tell the student regarding what precautions are needed when working with any electrical components and people? Explain your answer.
Your journal entry must be at least 200 words in length. No references or citations are necessary

The textbook indicates that it is important for you, as a systems analyst, to un

The textbook indicates that it is important for you, as a systems analyst, to understand the organizational information model of the company you serve and to know who your stakeholders are so you can be aware of what information is required for a project.
Provide insight about your previous or current company’s organizational chart/job descriptions. If you do not belong to a company, you can use any organization in which you are involved. What type of information is required by positions in your organization? Why do you think people in your organization need different types of information to perform duties?
Your journal entry must be at least 200 words in length. No references or citations are necessary.
.