HUM 200 Project Part One: Exploration Document Guidelines and Rubric
Overview
We all share common experiences that can be generally classified within the major themes of art. Examples of these themes include love, mortality, identity,
truth, and beauty. The representation of these themes through various media reveals central beliefs shared by a common people. The comparison of objects
from the humanities with similar themes helps to uncover not only the uniqueness of each respective cultural artifact, but also a shared human consciousness
that transcends time and place.
Your project for this course has two parts. In Project Part One, you will complete an exploration document examining two cultural artifacts that you select,
identifying a theme common to both of them and developing a thesis statement related to the theme and artifacts. You will also identify an audience who would
be interested in your artifacts, theme, and thesis statement. In Project Part Two, you will develop a presentation for your audience. In your presentation, you
will discuss the impact of the cultural artifacts, theme, and thesis statement on both individuals and society, supporting your claims with evidence. You will also
explain how study of the humanities has impacted you both personally and professionally.
In Project Part One, you will demonstrate your mastery of the following course outcomes:
Illustrate the impact of the humanities on personal and professional experiences
Select appropriate and relevant resources in the humanities in investigating expressions of human creativity
Communicate effectively to specific audiences in examining fundamental aspects of human culture
Apply essential principles of the humanities in exploring major themes of human culture and creativity
Prompt
Choose two cultural artifacts to analyze. These artifacts may take the form of any artistic medium, such as literature, poetry, music, film, dance, painting, and
sculpture, and so on. Then, identify a common theme and compare your examples to one another as expressions of the same theme in different cultural
artifacts. Chapters 3 through 6 in the Soomo webtext will walk you through this process.
Specifically, the following critical elements must be addressed:
I. Describe the cultural artifacts that you chose. Consider questions such as these in your response: What is the name or title of the artifact? Who is the
author or artist? What is the date or time period when the artifact was created? What is the cultural location or physical setting of the artifact? In
addition, you could consider including a photograph or image of each cultural artifact, if they are visual artifacts.
II.
Identify at least one common theme that will serve as the framework of your exploration document. How is the theme expressed in your artifacts?
1
III. Explain how the theme you identified is related to your personal experience. ...
1. HUM 200 Project Part One: Exploration Document Guidelines
and Rubric
Overview
We all share common experiences that can be generally
classified within the major themes of art. Examples of these
2. themes include love, mortality, identity,
truth, and beauty. The representation of these themes through
various media reveals central beliefs shared by a common
people. The comparison of objects
from the humanities with similar themes helps to uncover not
only the uniqueness of each respective cultural artifact, but also
a shared human consciousness
that transcends time and place.
Your project for this course has two parts. In Project Part One,
you will complete an exploration document examining two
cultural artifacts that you select,
identifying a theme common to both of them and developing a
thesis statement related to the theme and artifacts. You will also
identify an audience who would
be interested in your artifacts, theme, and thesis statement. In
Project Part Two, you will develop a presentation for your
audience. In your presentation, you
will discuss the impact of the cultural artifacts, theme, and
thesis statement on both individuals and society, supporting
your claims with evidence. You will also
explain how study of the humanities has impacted you both
personally and professionally.
In Project Part One, you will demonstrate your mastery of the
following course outcomes:
professional experiences
in investigating expressions of human creativity
Communicate effectively to specific audiences in
examining fundamental aspects of human culture
major themes of human culture and creativity
3. Prompt
Choose two cultural artifacts to analyze. These artifacts may
take the form of any artistic medium, such as literature, poetry,
music, film, dance, painting, and
sculpture, and so on. Then, identify a common theme and
compare your examples to one another as expressions of the
same theme in different cultural
artifacts. Chapters 3 through 6 in the Soomo webtext will walk
you through this process.
Specifically, the following critical elements must be addressed:
I. Describe the cultural artifacts that you chose. Consider
questions such as these in your response: What is the name or
title of the artifact? Who is the
author or artist? What is the date or time period when the
artifact was created? What is the cultural location or physical
setting of the artifact? In
addition, you could consider including a photograph or image of
each cultural artifact, if they are visual artifacts.
II.
Identify at least one common theme that will serve as the
framework of your exploration document. How is the theme
expressed in your artifacts?
1
4. III. Explain how the theme you identified is related to your
personal experience. For instance, you could discuss how the
expression of the theme in your
cultural artifacts is connected to you personally.
IV. Discuss a profession that could be impacted by the theme
you identified. In other words, how is the theme you identified
related to professional
experiences? How could a working knowledge of the humanities
be useful in this field?
V. Describe at least three humanities resources that you could
use to investigate your theme and artifacts. Your sources must
be relevant to your theme
and of an appropriate academic nature. In your description,
consider questions such as the following: What are the
similarities and differences in the
content of your sources? What makes them appropriate and
relevant for investigating your issue? What was your thought
process when you were
searching for sources? How did you make choices? Did you
5. encounter any obstacles and, if so, how did you overcome them?
If you did not, why do you
think it was so easy to find what you needed?
VI. Use the humanities resources that you selected to research
your theme and cultural artifacts, making sure that you cite your
sources. Based on your
research, do the following:
A. Discuss the relationship between each cultural artifact and
its historical context. In other words, what were the
circumstances under which each
artifact was created?
B. Explain the similarities and differences that you observe in
the cultural artifacts you selected, in relation to the theme. For
instance, do the
artifacts contain any symbolism? If so, how are the symbols
both similar and different? What do the symbols tell you about
each artifact?
C. Discuss the medium—such as literature, music, or
sculpture—through which your cultural artifacts were created.
For instance, how did the
creator or creators of each artifact use the medium to convey
something about the meaning of the artifact?
VII. Based on your research, develop a thesis statement that
conveys the claim you plan to make about your theme and
artifacts. Your thesis statement
should be clear, specific, and arguable.
VIII. Based on your research, identify an audience that would
be interested in your theme and thesis statement. For example,
6. who would benefit most from
hearing your message?
IX. Describe how and why you can tailor your message to your
audience, providing specific examples based on your research.
For example, will your
audience understand the terminology and principles used by
humanities scholars, or will you need to explain these? How
will you communicate
effectively with your audience?
X. Provide a reference list that includes all of the humanities
resources you used to research your artifacts, theme, and thesis
statement. Ensure that your
list is formatted according to current APA guidelines (or
another format with instructor permission).
2
7. Project Part One Rubric
Guidelines for Submission: You will upload the polished
version of the Word document you downloaded from Soomo to
the submission link for instructor
grading and feedback. Please see the feedback provided by your
instructor in your SNHU course. Your exploration document
should adhere to the following
formatting requirements: 3 to 5 pages in length, double-spaced,
using 12-point Times New Roman font and one-inch margins.
You should use current APA style
guidelines (or another format approved by your instructor) for
your citations and reference list.
Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Cultural Artifacts Meets “Proficient” criteria and
description is exceptionally
clear and contextualized
(100%)
Describes selected cultural
artifacts (85%)
Describes selected cultural
artifacts but with gaps in detail
or clarity (55%)
Does not describe selected
cultural artifacts (0%)
8
Common Theme Meets “Proficient” criteria and
8. identified theme is especially
well-aligned with artifacts
(100%)
Identifies at least one common
theme to serve as framework
of exploration document and
explains how theme is
expressed in artifacts (85%)
Identifies at least one common
theme to serve as framework
of exploration document and
explains how theme is
expressed in artifacts but with
gaps in clarity or detail (55%)
Does not identify at least one
common theme to serve as
framework of exploration
document and does not explain
how theme is expressed in
artifacts (0%)
8
Personal Experience Meets “Proficient” criteria and
explanation demonstrates
keen insight into impact of
humanities on personal
experiences (100%)
Explains ho w identified theme
is related to personal
experience (85%)
9. Explains ho w identified theme
is related to personal
experience but with gaps in
clarity or detail (55%)
Does not explain how identified
theme is related to personal
experience (0%)
8
Profession Meets “Proficient” criteria and
explanation demonstrates
keen insight into impact of
humanities on professional
experiences (100%)
Discusses a profession that
could be impacted by identified
theme (85%)
Discusses a profession that
could be impacted by
identified theme but with gaps
in clarity or detail (55%)
Does not discuss a profession
that could be impacted by
identified theme (0%)
8
Humanities Resources Meets “Proficient” criteria and
description of resources
demonstrates strong
understanding of information
10. needed to investigate
expressions o f human
creativity (100%)
Describes at least three
relevant and appropriate
humanities resources that
could be used to investigate
theme and artifacts (85%)
Describes at least three
humanities resources that
could be used to investigate
theme and artifacts but with
gaps in appropriateness,
relevance, or detail (55%)
Does not describe humanities
resources that could be used to
investigate theme and artifacts
(0%)
8
3
11. Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Research: Historical
Context
Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
12. principles (100%)
Discusses relationship between
each cultural artifact and its
historical context, citing
sources (85%)
Discusses relationship between
each cultural artifact and its
historical context but with gaps
in detail, clarity, or citation
(55%)
Does not discuss relationship
between each cultural artifact
and its historical context (0%)
8
Research: Similarities
and Differences
Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
principles (100%)
Explains similarities and
differences observed in cultural
artifacts in relation to theme,
citing sources (85%)
Explains similarities and
differences observed in
cultural artifacts but not in
relation to theme or with gaps
13. in detail, clarity, or citation
(55%)
Does not explain similarities and
differences observed in cultural
artifacts (0%)
8
Research: Medium Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
principles (100%)
Discusses the medium through
which the cultural artifacts
were created, citing sources
(85%)
Discusses the medium through
which cultural artifacts were
created but with gaps in detail,
clarity, or citation (55%)
Does not discuss the medium
through which the cultural
artifacts were created (0%)
8
Thesis Statement Meets “Proficient” criteria and
claim demonstrates insight into
connection between theme
and artifacts (100%)
Develops c lear, specific, and
14. arguable thesis statement that
conveys claim about theme
and artifacts, based on
research (85%)
Develops thes is statement that
conveys claim about theme
and artifacts but thesis
statement is not based on
research, lacks clarity or
specificity, or is not arguable
(55%)
Does not develop thesis
statement that conveys claim
about theme and artifacts (0%)
8
Audience Meets “Proficient” criteria and
identification of audience
demonstrates insight into
theme and thesis statement
(100%)
Identifies an audience that
would be interested in theme
and thesis statement, based on
research (85%)
Identifies an audience but
audience is not appropriate for
theme and thesis statement or
is not based on research (55%)
Does not identify an audience
15. (0%)
8
Message Meets “Proficient” criteria and
response demonstrates
sophisticated understanding of
how to effectively
communicate with specific
audience (100%)
Describes how and why
message can be tailored to
audience, providing specific
examples based on research
(85%)
Describes how and why
message can be tailored to
audience but with gaps in
examples or research support
(55%)
Does not describe how and why
message can be tailored to
audience (0%)
8
4
16. Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Reference List Provides reference list that
includes all humanities
resources used to research
artifacts, theme, and thesis
statement, ensuring that list is
formatted according to current
APA guidelines (100%)
Provides reference list that
includes all humanities
resources used to research
artifacts, theme, and thesis
statement, but list has gaps i n
adherence to current APA
formatting guidelines (55%)
Does not provide reference list
that includes all humanities
resources used to research
artifacts, theme, and thesis
statement (0%)
8
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
17. organization and is presented
in a professional and easy-to-
read format (100%)
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
(85%)
Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(55%)
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas (0%)
4
Total 100%
5
HUM 200 Project Part One: Exploration Document Guidelines
and RubricOverviewPromptProject Part One Rubric
case4rev.docx
by Matthew Pankey
21. Submitted to Bridgepoint Education
Student Paper
Submitted to University of Malaya
Student Paper
Submitted to Park Lane College
Student Paper
sharpexperts.com
Internet Source
www.accaglobal.com
Internet Source
www.springerprofessional.de
Internet Source
1
6
Matthew Pankey
Cybersecurity in Data Management at Workplace: Draft
22. With the ubiquitous and pervasive application of information
technology in business organizations' environments, a
significant and sensitive amount of data is generated and stored
on cloud computing platforms, creating substantial
Cybersecurity threats and vulnerabilities Garraghan et al. 2018).
In the workforce environment, some fundamental duties and
responsibilities involve customers' data management, calling for
effective IT-based Cybersecurity customers. Cybersecurity in a
workplace occurred in a twofold dimension including the
growing data sophistication and data security and privacy
compromise due to Cyberattacks and Cybersecurity issues. In
the data management role and data manager, collecting and
securing data is prone to data breaches and cyber-attackers
aging access to sensitive data. Admittedly, Cybersecurity is a
fundamental IT-based challenge facing employees,
organizations, and stakeholders that require an effective
platform for data security and privacy concerns. Thus,
Cybersecurity in Data Management at Workplace resonates with
fundamental articulation on IT-based challenges in the
management information system. Therefore, addressing the
topic in detail will offer effective recognition of the IT-based
challenges and pragmatic solutions to ensure a secured data
management system. Suggesting fundamental Cybersecurity
measures to counteract customer data leakage experience is
fundamental.
Solution
s
Notably, the business case experiences require practical
approaches to ensure data privacy and security, limiting
possibilities of other customers' sensitive data leakage to
23. unauthorized individuals. Notably, a robust access control,
compliance by third-party vendors, employee data security and
awareness training, and developing an effective data breach
responses plan demonstrate real-time solutions to data breaches
in any organization. According to the authors, Data Leakage
Protection Based on Context provides an effective platform for
data breach and leakage management within an organization,
ensuring robust security and privacy concerns (Yu et al. 2018).
Similarly, in this analysis of the business, there is an
acknowledgment of Data Leakage Protection Based on Context
strategy to accommodate access control, compliance by third-
party vendors, employee data security and awareness training,
and developing an effective data breach responses plan. Thus, a
comprehensive explanation of each suggestion to counteract
data leakage experience within a workforce, exposing
customers' sensitive data to unauthorized personnel is necessary
for data security models' decision-making.
Access control
Access control accommodates several models that provide a
restrictive platform to ensure that only authorized individuals
within an organization have access to sensitive data. Notably,
mandatory access control, directory, rule-based, role-based,
risk-related, and attribute-based access control models are
effective for the security of data. For example, the rule-based
access control model offers significant security rules for
24. securing administrator systems. Specifically, access control
strategies such as user authentication, verification and
identification, password, data encryption and decryption
techniques, cryptographic analytics among other access control
measures provide an effective platform to restrict unauthorized
individuals for effective decision-making.
Similarly, the business case whereby there is a significant
Cybersecurity breach, causing customers' sensitive information
leakage to unauthorized individuals requires effective
articulation on access control strategies user authentication,
verification and identification, password, data encryption and
decryption techniques, cryptographic analytics for internal and
external customers data security in the workplace environment.
According to the researchers, effective access control and
Cybersecurity policies within domains such as healthcare,
finance, education, aviation, and commerce have been effective,
embracing robust information management system architecture,
accommodating information under control, and significant
Cybersecurity requirements within an organization (Mishra et
al. 2022). Similarly, the business case, via Data Leakage
Protection, Based on Context should accommodate
Cybersecurity policies and requirements such as data security,
privacy, confidentiality, integrity, and availability to create a
secured security infrastructure. Additionally, fundamental
access control practices such as user authentication,
25. verification, and identification, password, data encryption,
decryption techniques, cryptographic analytics among other
access control measures need fundamental applications to
ensure internal and external data privacy and security in an
organization.
Compliance by Third-Party Vendors
Importantly third-party compliance is a fundamental suggestion
for an organization that deals with sensitive data on a cloud
computing platform that supports information security. Notably,
a business organization that offers regulated data or access to IT
systems that contains sensitive data requires fundamental
articulation to third-party compliance obligations and
requirements. Third-party Compliance requirements
accommodate IM and presence services components, compliance
server, and support clients that are fundamental for information
security from Third-party organizations, accessing sensitive
data or IT Systems for business organizations. Specifically,
embracing vital steps such as the risk evaluation process, in
identifying, segmenting, mitigating, risk, and risk factors for
effective third-party preparedness is effective. Similarly, due
diligence proportion of risks involving data breaches is
effective in third-party compliance requirements. According to
the authors, accommodating Cyber Third-Party Risk
Management is effective for robust data security within an
organization, embracing Company-wide approach strategies for
26. the entire information security coverage (Keskin, et al. 2021).
Fundamentally, creating an effective platform for information
security through a comprehensive workflow system and a
Company-wide approach for risk management is an effective
obligation for third-party vendors' consideration. Similarly, the
business case should accommodate fundamental considerations
to ensure that third-party vendors with authority to access
significant and sensitive data meet all the third-party
compliance obligations.
Employee data security and awareness training
In the business case, Cybersecurity is a fundamental IT-based
challenge facing employees, organizations, and stakeholders
that require an effective platform for data security and privacy
concerns. Specifically, offering extensive and comprehensive
employee training on Cybersecurity and awareness is
fundamental in managing internal threats and vulnerabilities of
data security. According to the authors, training and creating
awareness on information security awareness, accommodating
current model and content provides an effective platform for
information security, managing internal threats and
vulnerabilities to information (Khando et al. 2021). Similarly,
the business case on customers' data breach and leakage due to
employees lacking awareness and knowledge on data security
and privacy require fundamental articulation on information
security wares, embracing modern and real-time methods
27. towards effective data management. Notably, training on
phishing attacks, password and authentication, physical
security, mobile device security, working remotely, public Wi -
Fi and Cloud security are underpinning. Importantly, the
business organization case requires fundamental employee
training and awareness on an information security system for a
robust solution on data leakage cases. Thus, employee training
and awareness on information security offers knowledge and
concepts in preventing data breaches and customers' data
leakage in an organization setting.
References
Garraghan, P, Yang, R, Wen, Z., Romanovsky, A., and Xu, J.
(2018) Emergent Failures: Rethinking Cloud Reliability at
Scale. IEEE Cloud Computing, 5 (5). pp. 12-21.
Khando, K., Gao, S., Islam, S., and Salman, A. (2021).
Enhancing employee’s information security awareness in private
and public organizations: A systematic literature review.
Computer & Security. DOI: 10.1016/j.cose.2021.102267
Keskin, O., Caramancion, K., Tatar, I., Raza, O., and Tatar, U.
(2021). Cyber Third-Party Risk Management: A Comparison of
Non-Intrusive Risk Scoring Reports, Electronics 2021, 10,
1168. https://doi.org/10.3390/electronics10101168
Mishra, A., Alzoubi, Y., Gill, A., and Anwar, M. (2022).
Cybersecurity Enterprises Policies: A Comparative Study.
28. Sensors, 22, 538.
https://doi.org/10.3390/s22020538
Yu, X., Tian, Z., Qiu, J., and Jiang, J. (2018). A Data Leakage
Prevention Method Based on the Reduction of Confidential and
Context Terms for Smart Mobile Devices. Hindawi Wireless
Communications and Mobile Computing.
https://doi.org/10.1155/2018/5823439
Running head: CYBERSECURITY AT WORKPLACE
1
CYBERSECURITY AT WORKPLACE
7
Cybersecurity methods: SWOT Analysis
29. Method 1: Access Control solution
Strengths of this method
Access control is a vital component of data security in cloud
computing. It dictates who is allowed to access and use the
company resources and information. Through authorization and
authentication, the access control standards and policies ensure
that users are correctly identified through login credentials such
as passwords, biometric scans, usernames, and passwords
(Colombo and Ferrari, 2019). Therefore, access control helps to
limit access to users’ data and this is a key strategy that can
help to enhance the privacy of data and information that is
stored by an organization through its cloud servers. In any
organization, access control helps to secure an organization’s
confidential information such as intellectual property, customer
data, and personally identifiable information from getting into
30. the wrong hands (Hasbini and Tom-Petersen, Jordan, 2017). It is
most effective with organizations that are uses hybrid and
multi-cloud computing systems that data, resources, and
applications in the companies’ hardware systems and their cloud
servers.
Weaknesses of this method
The access control method is limited by insider threats. Despite
the methods being effective in keeping off third-party users,
rogue employees can still leak the login credentials to the
wrong individuals and organizations (Colombo and Ferrari,
2019). In the US, insider threats are on the rise due to high
employee turnover in many organizations across the country.
Employees or leaders who retire or quit their jobs often end up
selling their former companies’ information or access
credentials that make it easy to access and steal or tamper with
the users' data. Therefore, Valenzano (2014) notes that insider
threats may render access control useless.
Another challenge with access control is hacking. Even though
organizations may try to control and monitor people who access
data and information from their systems, hackers have also
taken advantage of modern technology to develop powerful anti -
software tools that crack almost every system (Hasbini and
Tom-Petersen, Jordan, 2017). Examples of this software include
intruder, Nets parker, and Nmap.
Opportunity
31. With increasing technology, companies can test their access
control strategies. Ethical hacking allows companies to organize
hacking drills on their systems to test their effectiveness and
their employees’ level of preparedness (Valenzano, 2014). This
is crucial as it may help companies to identify the gaps in their
systems and enhance their access control strategies.
Furthermore, access control also allows companies to disable
the accounts of employees who leave their companies or change
the login credentials including passwords and encryption
protocols. Therefore, companies can still secure their systems
despite the threats from insiders and hackers.
Threats
Increasing cases of insider threats and hackers threaten the
integrity of access control methods. Nowadays, it is very
difficult to determine who to trust with the company’s
information. Access control methods cannot be effective if
employees lack self-control, transparency, and ethics. It has
become difficult to trust employees with critical business
information (Valenzano, 2014).
Method 2: Compliance by the third-party vendors
Strengths of this method
Increasing security concerns on cloud computing have forced
many organizations to use the third party-vendors to secure the
users' data (Shaverdian, 2019). The use of third-party vendors
helps to eliminate common cloud computing such as insider
32. threats. The third-party companies help to monitor a company’s
security system and therefore, it becomes difficult for rogue
employees or third parties to access the users’ data and a
company’s classified information such as its IP rights. One of
the strengths of using the third party method is its third-party
risk management program (TPRM). The TPRM involves the
third-party company and the host organization creating a risk
management program that addresses all the risks from both
sides (Li and Xu, 2021). Therefore, the TRPM helps the third
party company and the host organization to create monitoring
programs and remediation plans that help to manage all the
possible risks that may affect the integrity of the users’ data and
the privacy of the company’s vital information.
Furthermore, the TPRM is crucial is it assesses the internal
controls of the host company to test their effectiveness and
utilize the current software to fend off any risks and threats and
create a strong security program (Shaverdian, 2019). Using the
TPRM, this factor is made possible through the help of proper
technological tools such as automated monitoring, prompt
alerting of any threat, and tracking of high-risk behaviors
within the company. Therefore, these tools help to keep the
third-party program ahead of other methods.
Weaknesses of the method
The main weakness of third-party solutions is a lack of control.
By using this method, all the security procedures and protocols
33. are controlled by the third-party company. Although it may
seem to be effective at enhancing the security of the users’ data,
it also prevents large-scale organizations from expanding their
cloud-computing protocols (Li and Xu, 2021). Most
organizations often want to expand their cloud computing
servers to have both private and public cloud computing. Once
an organization selects the third-party method, other options are
not allowed.
Opportunities
The third-party method is the best option as it allows
organizations to draft security maps to identify the strengths
and weaknesses of both parties. Therefore, it gives
organizations a chance of testing their security systems and
protocols to determine their effectiveness and also address the
gaps that exist in the systems (Shaverdian, 2019). Using the
third-party solution, the challenge of hacking or insider threats
is almost zero since the entire security system is controlled and
managed by a third-party organization.
Threats
An organization may not have much control over the security
systems and security protocols since the entire work is
undertaken by a third-party company. However, if the security
system of the third-party company also fails, the host
organization is also likely to lose valuable data and information
34. (Li and Xu, 2021).
Method 3: employee data security and awareness training
The strengths
Employee training and awareness are crucial in equipping the
employees with the necessary skills to handle all the security
challenges on their cloud systems. It gives employees a chance
to effectively monitor the company systems and respond to any
security alerts that may arise from both internal and external
environments (Khando et al., 2021). With data security and
training awareness, it becomes easy for employees to enhance a
company’s private information and also secure the users’ data.
Weaknesses
No matter how good the data security and awareness security
training might be, this method is still challenged by the
increasing cases of insider threats and hackers. Since the
company’s employees may still be in charge of its systems, they
are likely to leak the company’s vital information to rivals or
unauthorized people (Khando et al., 2021).
Opportunities
Training programs help employees to learn how to be ethical
when handling the users’ data. They learn new methods and
tactics they can use to secure the company’s data and also
protect the users’ data. It is also among the ways that
organizations use to hone their employees’ skills in responding
to emergencies (Li et al., 2019).
35. Threats
This method is costly and it may take long before the employees
acquire all the skills that are necessary to protect the company’s
systems and cloud servers. Furthermore, hackers usually evolve
their skills almost all the time and therefore, this method may
not be effective at eliminating future or long-term security
threats from an organization (Khando et al., 2021).
Conclusion
In conclusion, using a third-party solution is the best method
that any organization can adopt to enhance the security of its
systems and cloud servers. This method gives helps an
organization to have a clear map regarding the strengths and
weaknesses of its systems and the security protocols that need
to be followed to secure the users’ data and information. In a
third-party solution, the risks of internal threats and hacking are
almost zero and hence, this method may be effective is effective
in protecting the users’ data.
References
Colombo, P., & Ferrari, E. (2019). Access control technologies
for Big Data
management systems: literature review and future
36. trends. Cybersecurity, 2(1), 1-13.
Hasbini, M. A., Tom-Petersen, M., & Jordan, D. (2017). The
Smart Cities Internet
of Access Control, opportunities and cybersecurity
challenges. Securing Smart Cities.
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021).
Enhancing employees
information security awareness in private and public
organizations: A systematic literature review. Computers &
Security, 106, 102267.
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019).
Investigating the
impact of cybersecurity policy awareness on employees’
cybersecurity behavior. International Journal of Information
Management, 45, 13-24.
Li, Y., & Xu, L. (2021). Cybersecurity investments in a two-
echelon supply chain
with third-party risk propagation. International Journal of
Production Research, 59(4), 1216-1238.
Shaverdian, P. (2019). Start with trust: utilizing blockchain to
37. resolve the third-party
data breach problem. UCLA L. Rev., 66, 1242.
Valenzano, A. (2014). Industrial cybersecurity: improving
security through access
control policy models. IEEE Industrial Electronics
Magazine, 8(2), 6-17.
Business Case Study structure
This Project Will Be Individual, not a Group project.
The Subject of the case study Will focus on Information
technology (IT) Hardware, software, or application solutions to
Improve a personal or Business challenge.
Ten Pages Minimum. Full APA-compliant Title and Reference
Pages will be in addition to the ten pages of the study.
Ten Scholarly or professional Sources Minimum, Properly
referenced and Cited in-Text. Wiki sites and advertisements will
not be counted.
American Psychological Association (APA) Formatting is
required. This includes headers, margins, indentation, spacing,
38. font, etc.
Business Case Outline
Section 1 (Introduction) / Describe one challenge that you or an
organization you have worked for have had which can be
resolved with an information technology (IT) hardware,
software, or application solution. (Appx one page).
Section 2 / research and describe three possible solutions to the
challenge presented in section 1. choose one type of solution
(hardware or software) for future comparison (appx three
pages).
Section 3 / compare the three possible solutions from section 2
using the swot (Strength, Weakness, opportunity, & Threat)
analysis model (appx four pages).
Section 4 (Conclusion) / Identify and Defend the solution
(choose one of the three) that provides the greatest benefit to
the organization. (appx two pages).
Additional Instructions
This is a Research paper, thus requiring numerous references
and citations. The minimum number of references is 10, but all
direct quotations and paraphrases must be properly cited in-text,
39. even content from your own previous papers. Your final paper
will be submitted automatically through Turnitin and plagiarism
will be dealt with according to the university’s policies. When
In doubt, cite the source of the information (according to APA
formatting) .
You may submit the final paper as many times as you wish. The
final feedback from the instructor will come with your draft
submission. I will provide corrections, but not so much detail
that I feel I am writing your paper for you. I also cannot see any
suspected plagiarism until the final submission (through
Turnitin), so be cognizant that your draft submission’s feedback
will not include that aspect.