Cyberattacks

Country selected China

Cyber attach type; Malware or DDoS (Pick one)

Using the country you selected for Assignment #1, select one of the three types of cyberattacks, apply it to your selected country, and research and address the following:

1. Explain the type of cyberattack you selected in the introduction section of your paper. Incorporate UN Charter 2(4) into your paper by explaining if the cyberattack violated UN Charter 2(4).

a. If yes, why and how?

b. If no, why not?

2. Explain how the cyberthreat actors would target your country.

3. Describe the impact of the cyberattack on your country.

a. Identify the critical infrastructure services and functions targeted by the cyberthreat actors.

b. Incorporate Floridi’s Information Philosophy as part of your paper.

4. Describe how your country responded and recovered from the cyberattack.

5. Explain how your country could have prevented this cyberattack. In this section, incorporate cyber deterrence as part of your paper.

Requirements

  1. 1000-1100 words excluding cover page and references
  2. Use at least three references
  3. APA Formatting to include format, references, and in-text citations

Answer preview

The more aggressive form of a cyberattack on Chinese interests takes the form of coordinated and targeted ransomware attacks on critical institutions. Banks, schools, ministerial departments, and other governmental agencies are lucrative targets for hackers. In one of the most prominent cyberattacks in recent years, Chinese government officials were targeted in a coordinated ransomware attack by an international cyberattack racket (Staff, 2017). In a situation dubbed as one of the most outrageous extortion schemes of 2017, hackers would spam government officials with emails purporting to deliver critical information to get them to download attachments (Mohurle & Patil, 2017). Once downloaded, the malware would encrypt vital details and require the officials to pay a ransom.

[1264 Words]

Cyberattacks

Information Technology

Make a proposal document cum requirement why Information technology advances and IT innovations are required for Hotel business. Make document in Minimum 800 to 1000 words in APA format. I will provide some concepts cum plans for which these innovations can be developed and executed.

There is a requirement for an IT person having Business knowledge for this concept to work. Make document which can justify the need of such a person.

 

Make a proposal document cum requirement why Information technology advances and IT innovations are required for Hotel business. Make document in Minimum 800 to 1000 words in APA format. I will provide some concepts cum plans for which these innovations can be developed and executed.

There is a requirement for an IT person having Business knowledge for this concept to work. Make document which can justify the need of such a person.

As mentioned in the requirement…make a document which shows requirement of an IT person in a hotel to innovate and facilitate Business operations smoothly for higher productivity. I have key concepts which hotel is planning to develop and implement with technology help.

dThese concepts are as below:

1) Contactless Check in – Helps in COVID-19 situation for Guest and Employee safety

2) Front desk and Housekeeping work collaboration – Synchronizes and updates Housekeeping work progress to front desk so that front desk can prepare and get ready to check in guest. Real time updates from Housekeeping about assignment completion which front desk can see and update to the computer. This application software can capture attendances as well.

3) Transferring Physical PBX to Cloud based Virtual PBX – Telephone system upgrade

4) Customer Feedback and Review management – Manage Guest review and satisfaction score. Create Webpage cum application which can request feedbacks and reviews.

You can start with Importance of Guest satisfaction in Hotel business. Why new technology is needed. How Business revenue can impact with Hotels having better IT system and management. Show importance of having in house IT person who can plan, design, develop and implement IT solutions and maintain the same.

_____________________________________________________________________________________________

Basically using these document, I have to justify a position for Information technology person needed for a Hotel business. Some requirements in the form of concepts are mentioned above which you can elaborate.

Answer preview

The need for information technology in hotels is extremely necessary. Technology can be leveraged across all hotel departments to streamline operations, enhance guests, improve communication, and manage post-Covid 19 protocols. Here are various reasons where new technology is demanded in the hotel business.  First, the new technology will improve convenience.  According to Bilgihan, Okumus, & Kwun, (2011), the guest is more interested in convenience.  They prefer a check-in process to be quick and painless. A hotel should allow guests to make online check-in, which more convenient and easier for them.  New technology allows hotels to provide a technology-driven, seamless, and contactless experience to guests. It enables customers to make check-in via an online platform or go to digital kiosks where they can fill information about themselves without the help of staff.  New technology will, therefore, counter the need to queue or leave their room to order a meal. Hotel guests want a smooth and easy experience which can be made possible by new technology. Secondly, the new technology improves communication.  Technology is key for facilitating communication with the hotel.

[1150 Words]

Information technology

Enterprise Resource Planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout. Write in 300 words.

1. Use only attached documents

2. Need replies for two of the classmate posts (150 words)

Answer preview

As an organization IT manager, I will utilize ERP to integrate various functions in the organization. For instance, I will use it to integrate various operations like supply chain management, sales and marketing, and production management. In sales and marketing, the ERP supports operations like sales plan preparation and monitoring, invoices, and sale offers.  I will use ERP to manage the prices and the discounts of the goods or services that the company offers and register the customers’ inquiries (Kunath, & Winkler,2019).  The introduction of ERP has presented various benefits to the organization. One of the advantages of ERP is it has improved collaboration among different departments in the organization.  ERP allows the different organization departments to work together, share information, and collaborate when there is a need. The most impressive feature of ERP is that it updates data in real-time so that any department can access accurate information anytime (Abd Elmonem, Nasr, & Geith, 2016).

[455 Words]

Enterprise Resource Planning

Data analytics

Essay Paper : Buffer Overflow Attacks

Your essay papers will include your research procedures, data, analytics on your cyber threat findings on Buffer Overflow Attacks. You will demonstrate what, how, why, where and who related to these cyber attacks. You will include details on how these attacks take place to attack specific targets with various motivations.

12 times new roman, 5 pages, double spaced.:

Answer preview

Defining research procedures is critical when evaluating buffer overflow attacks. To identify what, how, why, where, and who related to buffer overflow attacks, a literature review was carried on the previously written articles that addressed the issues of buffer overflow attacks. The articles were searched from the university databases. In this case, a given criterion was used to determine the eligibility of the hacking cases published. One of the criteria used to evaluate the articles is determining the type of cyber-attacks. All articles that discussed other types of cyberattacks, such as phishing, were excluded from the research. In this regard, only ten articles were searched from the university database. After critical evaluation, only four articles met minimum requirements.

[1685 Words]

 

Data Analytics

History of computer science

 

For this assignment you will write a short (700+ word) paper about an influential person in the

history of computer science or information technology. Please read the pdf.

Answer preview

The creation of Google inspired the progress of computer science in significant ways. Google has facilitated the learning of computer science at all levels by creating a powerful infrastructure that facilitates virtual reality technology. Computer science researchers and higher education students can also conduct their analysis in a faster way using Google solutions. Google has also shaped the progress of computer science by facilitating research on artificial intelligence so that computer scientists can be able to provide the world with new ways of solving global challenges (Pirie, 2019). Unlike the previously used search engines before Google was created, anyone can search for words or terms for free using Google. This illustrates the way Larry Pages’ innovation has made it easy for everyone to instantly access any kind of information. The creation of Google also contributed to the progress of computer science by revolutionizing data science. This is because the creation of Google improved big data analytics, making companies increasingly make use of the availability of enormous datasets (Gibbs and Hern, 2018). Computer science plays a significant role in expanding communication. The creation of Google also influenced communication by creating various avenues for people to communicate through the internet.

[992 Words]

History of computer science

Change Management Process for IT security

Explain in your own words what some of the challenges are with the Change Management Process for IT security.

Requirements: post must be between 250-300 words

Answer preview

Ideal visions without equivalent resources and preparation lead to frustrations in the change management process. An ideal change management process requires an elaborate plan that details all the resources required and the appropriate procedures to be followed (Fonseca & Domingues, 2017). In some organizations, the change management process is not correctly detailed or prepared enough. In others, some of the vital steps are omitted or wrong structured. Faults in program execution negatively affect the change management process. Besides, there are numerous uncertainties in the change management process. Anything from price spikes or workers turnover can have severe impacts on a change management process. Change managers in an IT department must vision all probable uncertainties and prepare a course in advance.

[323 Words]

Change Management Process for IT security

Administration Technology

Research and describe any additional hardware, communication, learning, administration, or service delivery technology that would be appropriate for your organization that we have not discussed so far. Be sure to explain the usefulness to your organization and what it would require to implement the new technology. (Examples are: a new database, cloud computing, scannable ID cards, etc.)

Your paper should be at least 2-3 pages long and include the use of APA formatting.

What is Microsoft Office 365? (Links to an external site.)

EXCEL 2016 FOR MAC QUICK START GUIDE.PDF

Answer preview

To adopt this new technology, our organization will have to look for a competent cloud provider. It is because a third party who manages virtual resources is the one who will provide the cloud services. The provider will also help the organization in transitioning to the cloud by providing the needed support to ensure the organization benefits from the new technology. The organization will also need to create a change management plan to make people understand how the new technology will change the way they go about their duties. For instance, a change management plan can explain why the change is happening, how, and with whom to share information. The organization will also need to perform a smooth cutover to ensure the technology shift does not disrupt the organization’s operations.

[638 Words]

Administration Technology

Health information technologies

Review the contents from Module 5-8. Submit a final paper to analyze how health information systems can improve patient-centered care. Relate the topics to your own experiences. Use at least 3 additional academic references. Your paper should be at least 1000 words, using APA style formatting. Include the following topics in your paper.

  1. How can the health information technologies (e.g., CPOE, telehealth, and telemedicine) be used for improving patient participation and promoting patient empowerment?
  2. How can these technologies be applied for reducing medical errors and adverse events.
  3. How can these technologies promote personalized medicine?
  4. What are the barriers and challenges of implementing these technologies?
  5. What are the strategies to overcome these barriers and meet the challenges?

Submit a final paper to analyze how Health Information Technology (HIT) can improve patient-centered care. SLOs, Elements of final paper.

  1. Identify information systems tools, techniques, and methodologies applicable to healthcare systems.
  2. Create a reporting and support process for healthcare decision-making based upon the research for question #1
  3. Design information policies to ensure consistency with the clinical, ethical, legal and financial requirements of healthcare institutions.
  4. Evaluate all aspects of the plan to utilize HIT to improve patient-catered care as designed in 1-3.

The Grading Rubric for this Final Project can be accessed here.

Week 5

Learning Objectives:

Evaluate how EHRs can improve patient participation.

Analyze how EHRs can be used for health outcomes research.

Determine the challenges of EHR observational studies and future potentials of EHRs

Week 6

This Week’s Activities

Learning Objectives:

Determine the advantages of CPOE systems.

Assess how CPOE systems can be used for the prevention of ADEs.

Analyze the cost-effectiveness of implementing CPOE systems.

Week 7

This Week’s Activities

Learning Objectives:

Determine how telehealth can benefit different types of care settings.

Analyze how telehealth can be applied for self-management support.

Assess the barrier to broad-scale application of theory-based telehealth delivery.

Week 8

This Week’s Activities

Learning Objectives:

Evaluate the benefits of telemedicine.

Determine how telemedicine can help in acute care.

Analyze how health information technology can promote patient-centered care and personalized medicine.

No plagiarism and make sure that you go in depth on the topics.

In your paper, cite references using the APA style guide format for in-text citation.

Make sure that you include the URLs on the reference page.

Make sure to be very detail with the information in the Assignment.

Answer preview

Advances in healthcare technologies have led to better management of patients. The usage of high-resolution data has revolutionized personalized medicine. A wide spectrum of data concerning an individual such as medical history, heritage, genetic information, and lifestyle are collected and used to make healthcare decisions. The personalized medicine approach does not follow the one-size-fits-all approach, and this gives patients better healthcare outcomes. Artificial intelligence and Big data are technologies that have made personalized medicine possible. Gameiro et al. (2018) also say that advances in genomics like rapid DNA sequencing have improved precision medicine, which positively impacts patients’ health.

[1295 Words]

Health information technologies

Impact of Whistleblowing

One topic that continues to draw a great deal of attention are whistleblowers.  Through unit 5 and the entire course we are learning the importance for the enterprise to have a strong reporting mechanism and whistleblower protection program.  Sherron Watkins, former Enron Vice President, was the primary whistleblower leading to the collapse of Enron. IT Academic Technologies published a presentation delivered by Sherron Watkins.  Please watch this presentation located at

https://youtu.be/RSMnvCMS0W8

 

Directions:

Write a response paper that summarizes the main points and analyzes/critiques the main points.  What were the strong points and the weak points of this film?  What was interesting, relevant, and connected to our readings in unit 5, what are the advantages and disadvantages to reviewing this presentation, and finally who should be an audience for this presentation?  Your paper is required to be written in APA format including a cover page and reference page.  Your paper main content must be at least two full typed written pages, not including the cover page and reference page.

 

Reference:

Moeller, R. R. (2011). COSO enterprise risk management: Establishing effective governance, risk, and compliance processes. Hoboken, NJ: Wiley.

Answer preview

Interestingly, it was worth noting that organizations like Enron, where leaders engaged in fraud schemes, treat employees well by offering good pay and treats. This can be termed as a bribing strategy to gag them from asking questions. Regardless, it is relevant to note that employees have the right to whistleblower protections. According to Moeller (2011), employees and leaders should know about whistleblower processes to reduce the vast risks that emerge once the fraud scheme becomes public. Overall, the presentation was of significant benefit since it raises the importance of reinforcing whistleblowing protection policies in a company. Such measures give stakeholders the confidence to report a strange practice in the organization without fear of intimidation. However, a downside regarding this speech is that Watkins talks of poor leadership in Enron and fails to consider that she could have ordered a risk investigation to save the firm (Moeller, 2011). Overall,

[714 Words]

Impact of Whistleblowing

Change Management Process for IT security

Explain in your own words what some of the challenges are with the Change Management Process for IT security.

Requirements: post must be between 250-300 words

Answer preview

Ideal visions without equivalent resources and preparation lead to frustrations in the change management process. An ideal change management process requires an elaborate plan that details all the resources required and the appropriate procedures to be followed (Fonseca & Domingues, 2017). In some organizations, the change management process is not correctly detailed or prepared enough. In others, some of the vital steps are omitted or wrong structured. Faults in program execution negatively affect the change management process. Besides, there are numerous uncertainties in the change management process. Anything from price spikes or workers turnover can have severe impacts on a change management process.

[323 Words]

Change Management Process for IT security