Determine risks and develop a communication plan for stakeholders.

For this assessment, create an executive summary for your project proposal.

An executive summary should be understood easily by an audience not familiar with your full proposal. At a glance, someonereading this brief summary should be able to understand the most important points. The ideal executive summary is a half-page toone page in length, although it should be on the shorter end of that range. The executive summary should be written in a moreformal business tone and should include key pieces of information, such as facts, figures, and ideas that are critical to yourproposal.The executive summary should accomplish the following:

Describe the background of the project and the details of how it was initiated.

Describe the business objectives for the project.

Describe the project scope.

Analyze the project to identify all milestones and determine deliverable dates.

Determine risks and develop a communication plan for stakeholders.

Demonstrate knowledge of standards compliant web-based applications, including key web accessibility and web design principles.

Web technology

Further Information

Learning Outcomes tested in this assessment (from the Module Descriptor):

Demonstrate knowledge of standards compliant web-based applications,including key web accessibility and web design principles

Apply an awareness of security issues and associated techniques in relation to web design

Apply appropriate tools, methods and technologies to solve a given web development problem, considering user needs

Communicate and reference the results of research into a relevant topic in relation to web development

Describe how the leader cultivated relationships in their organization or in their industry.

IT Leadership Vision Board research paper

In this assignment, you will create an Information Technology leadership vision board in which you summarize three leaders who serve as examples of the leader you want to be.

Select three leaders in the IT world who have had a positive effect on their company. These leaders do not need to be from big companies but should be attached to IT projects.

Address the following for each leader in your vision board: 1 slide per leader add references on each slide

List their name, company, and role at the company.
Define their top three leadership traits or behaviors.
Explain how these traits or behaviors affected the company or project.
Define a prominent communication tactic used by this person.
Describe how the leader cultivated relationships in their organization or in their industry.
Explain how the leader utilized those relationships.
Describe how this person’s leadership led to innovation or change management.

Include one piece of advice you’d like to remember from this person’s experience.
Include images as appropriate.

What are the key elements of a cybersecurity program?Discuss some of the key steps to implementation.

Health Policy and HIPPA

Now,respond to the following questions:

According to the Health Sector Framework Implementation Guide,What are the key elements of a cybersecurity program?Discuss some of the key steps to implementation. (Refer to Appendix G on p. 93 of Healthcare sector cybersecurity framework implementation guide, 2016 if necessary.)

Review the documents on HIPAA and the appendix of the Health Sector Guide. What is HIPAA and what are some of the challenges related to implementation? (Refer to the GAO report if needed.) Offer recommendations to strengthen the implementation of policy.

Evaluate any ethical and privacy issues (throughout the chain: from installation of devices, to data manipulation, and decision taking),(roughly 500 words).

Internet Of Things

Final Assignment – 4’000 words
Write a business report describing an IoT solution that addresses a specific problem or business opportunity. It is recommended that you focus on a company / sector that you are familiar with.
The following topics should be addressed in the report:
Detailed presentation of the full solution chain (diagram + brief discussion of the innovation points).(roughly 400 words)
Evaluate the impact of the IoT solution on the business (consider possible new business models as well). A critical review of similar and related solutions should be included.(roughly 1’200 words)
Based on a wide literature review (both academic and practitioner sources), analyse the already existing components (hardware and software), in the context of the overall technological solution, and how the innovation part can be achieved (from device to knowledge and back if needed),(roughly 1’500 words)
Discuss the security issues to be considered during the implementation.(roughly 400 words)
Evaluate any ethical and privacy issues (throughout the chain: from installation of devices, to data manipulation, and decision taking),(roughly 500 words).

Enumerate for the resources will be required to complete the service development to include capital expense, labor inputs (number of hours and expected level of individual resources), and other expenses such as subscriptions and operating costs.

Security Services Directory – Cyber Security

Need a security services directory. Must build the directory based off what the case company needs will be. I am attaching a NIST document that spells out examples of various security services (GRC, IAM, DFIR, etc).Prepared using the template that has been provided in the following pages of this document following all embedded instructions.

Uses the proper language and construction to communicate to an executive-level audience that for which this report is prepared.

Just as you are expected to do for all business communications, you must prepare a cover memorandum that serves to convey this report and serves as a very high-level executive summary of your findings.

Report Structure:

Includes a complete plan of precisely how you would work within the case company to create a directory of security services. Your plan must include:

The information that will be provided for each service in your directory,

How will you identifying the services to be listed as rows on your planned directory,

How will you collect the needed information for the services you have identified, and

How will you validated the plan you have created here with your business-unit partners

The purpose of a directory is to identify what is performed, how much or how often it is performed, what the costs (and perhaps revenues) are for the activity, and a business-based justification for the activity.

Provide placeholder values for the columns of information for every one of the services you identify using the method of describing less critical information by placing it in angle brackets “<>” if the information cannot be readily determined with the time and resources available.

Prepare a complete deployment project plan for security service development in the case company with:appropriate project stages needed to build out the services identified in the table you have prepared,a timeline showing the relative sequencing of the stages showing expected durations and identifying precursors

For each stage:Identify which services will be included in the stage.Enumerate  for the resources will be required to complete the service development to include capital expense, labor inputs (number of hours and expected level of individual resources), and other expenses such as subscriptions and operating costs.

 

Identify existing access control list definitions for protected objects.

In this lab, you will use the Windows command-line utility, icacls.exe, to establish file level permissionsthat follow a set of access control requirements. You will test those permissions by remotely accessing theWindows server and attempting to modify files in the secured folders. You will use screen captures todocument that the access control changes you’ve made in this lab are properly applied.

Learning Objectives:Upon completing this lab, you will be able to:Control a registered user’s ability to access Microsoft Windows resources.Identify existing access control list definitions for protected objects.Implement access control lists per the defined strategy.Validate access control lists.Apply the defined strategy