SlideShare a Scribd company logo
1 of 29
Fundamentals of Information Systems Security
Lesson 2
The Internet of Things
Is Changing How We Live
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
Learning Objective(s)
Explain information systems security and its effect on people
and businesses.
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Key Concepts
The evolution of the Internet of Things (IoT) from the late
1990s to present
The impact that the Internet and IoT have on human and
business life
How bricks-and-mortar businesses transform into e-business
models with e-commerce and an IoT strategy
How IP mobility is driving IoT to include both personal and
business environments
New challenges created by IoT
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
The Internet of Things Is Changing How We Live
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Social Media
Facebook®
Mediums
VoIP
Twitter®
LinkedIn®
Pinterest®
Google+®
Instagram®
IM chat
Audio conference
Video conference
Collaboration
Digital Media
Drivers for Internet of Things (IoT)
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
9/3/2019
(c) ITT Educational Services, Inc.
5
IP-based networking
Connectivity
Smaller and faster computing
Cloud computing
Data analytics
Evolution of IoT
Internet service providers (ISPs)
Radio frequency identification (RFID)
Application service providers (ASPs)
Software as a Service (SaaS)
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
How the Internet and TCP/IP Transform Our Lives
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
The transition to a Transmission Control Protocol/Internet
Protocol (TCP/IP) world changed our way of life.
People, families, businesses, educators, and government all
communicate differently than they did before.
Nearly everyone has easy access to the Internet.
9/3/2019
(c) ITT Educational Services, Inc.
7
IoT’s Impact on Human and Business Life
The Internet has changed our day-to-day lives
Personally
Socially
Professionally
Use the Internet to:
Check weather, news, and social media sites at home
Check business emails at work
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Store-and-Forward vs. Real-Time Communications
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
9/3/2019
(c) ITT Educational Services, Inc.
9
Real-time
Occurs instantaneously
Store-and-forward
Acceptable delay in transmitting communication
IoT’s Impact on Humans
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Health monitoring and updating
Home security and smart home control systems
Online family member calendars
Near real-time tracking and monitoring via GPS
Online banking, bill paying, and financial transactions
Online e-commerce purchases
IoT’s Impact on Business
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Retail stores
Remote sensors
Traffic-monitoring applications
B2C service delivery model
“Anything as a Service” IoT applications
Virtual workplace
Evolution from Bricks and Mortar to E-Commerce
E-commerce
Sale of goods and services on the Internet
Business-to-consumer (B2C)
Customers purchase goods and services directly from their
website
Business-to-business (B2B)
Businesses conduct sales with other businesses
Payment Card Industry Data Security Standard (PCI DSS)
Protects private customer data
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Evolution from Bricks and Mortar to E-Commerce (cont.)
Internet business challenges:
Growing the business through the Internet
Changing an existing conventional business into an e-business
Building secure and highly available websites and e-commerce
portals
Building a web-enabled customer-service strategy
Finding new customers with Internet marketing
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
E-business Strategy Elements
E-commerce solution
Internet marketing strategy
E-customer service-delivery strategy
Payment and credit card transaction processing
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Why Businesses Must Have an Internet and IoT Marketing
Strategy
Must remain competitive
Bricks-and-mortar business model out of date in global market
Customers require continuous access to information, products,
and services
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
But, Internet presence exposes organizations to online risks,
threats, and vulnerabilities.
9/3/2019
(c) ITT Educational Services, Inc.
15
IP Mobility
Personal communication devices and mobile phones are
powerful
Cell phones are used to extend mobility
Mobile phones, smartphones, and PDAs match the power and
flexibility of small computers
Tablets, smartphones, and netbooks fill need for lightweight
portable devices
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Mobile Users and Bring Your Own Device (BYOD)
Employees and contractors use their own personal devices to
connect to network at office
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Issues with Mobile Computing
Network
Usability
Security
Mobile Applications
Limited web browsers can’t run some traditional applications
Bad interface design causes application failure on mobile
devices
Many users from multiple domains found uses for mobile
applications
Medical applications were a good fit for mobile applications
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Mobile Applications (cont.)
4G networks provide true IP communications
Mobile IP enables users to:
Move between LAN segments and stay connected without
interruption
Maintain a connection to the network as long as the mobile
device stays within network coverage
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
IP Mobile Communications
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Mobile IP provides connection transparency for several entities
working together to ensure that mobile devices can move from
one network to another without dropping connections:
Mobile node (MN): The mobile device that moves from one
network to another. The MN has a fixed IP address regardless of
the current network.
Home agent (HA): A router with additional capabilities over
standard routers, the HA keeps track of the MNs it manages.
When an MN leaves the local network, the HA
forwards packets to the MN’s current network.
Foreign agent (FA): A router with additional capabilities
connected to another network (not the HA network), the FA
assigns the MN a local address. When the MN connects to
another network that supports Mobile IP, it announces itself to
the FA.
Care of address (COA): The local address for the MN when it
connects to another network, the FA assigns the COA to the MN
and sends it to the HA when the MN connects. In many cases,
the COA is actually the FA address. The HA forwards any
packets for the MN to the COA. The FA receives the packets
and forwards them to the MN.
Correspondent node (CN): This is the node that wants to
communicate with the MN.
9/3/2019
20
Mobile Node (MN)
Home Agent (HA)
Foreign Agent (FA)
Care of Address (COA)
Correspondent Node (CN)
IP Mobile Communications (cont.)
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
IP Mobile Communications (cont.)
Mobile node (MN) connects to foreign agent (FA).
FA assigns care of address (COA) to MN.
FA sends COA to home agent (HA).
Correspondent node (CN) sends message to MN.
CN’s message for MN goes first to HA.
HA forwards message to COA.
FA forwards message to MN.
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
New Challenges Created by the IoT
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security: How do you keep the bad guys out if you enable the
IoT for your personal and professional life?
Privacy: How do you protect your family’s identity and privacy
data from theft or unauthorized access that can lead to identity
theft?
Interoperability and standards: How well do IoT manufacturers
and ASP developers ensure that devices communicate securely?
Legal and regulatory compliance: What role do the
international, federal, and state levels contribute toward legal,
tax, and regulatory requirements regarding IoT-related business
transactions that involve payment for goods and services?
E-commerce and economic development issues: What are the
economic rules of engagement for conducting business on the
World Wide Web? How is IoT connectivity
and information sharing to be deployed globally?
9/3/2019
(c) ITT Educational Services, Inc.
23
Security
Privacy
Interoperability
Legal and regulatory compliance
E-commerce and economic dev issues
Security Challenges of IT Devices
Deployed in large quantities (such as sensors or consumer
items)
Ubiquitous and can have wide reach into the user or household
population
Not maintained or updated devices allow vulnerabilities
Upgrades can be difficult to distribute and deploy
No owner visibility of how the device connects to the Internet
Not physically secure
Capture readings and measurements in the open
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Privacy Challenges
Privacy policy statement
Definition of data, metadata, or analytical data use and rights
Ability for a user to provide consent to a manufacturer’s or
application service provider’s privacy policy statement
Determine the domain of privacy
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Interoperability and Standards
Internet Engineering Task Force (IETF) ensures interoperability
and standards can be pursued for IoT solutions
Interoperability has significant financial impacts if not properly
addressed
Goal is to bring the cost of IoT devices and supporting
applications down so they are affordable
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Interoperability and Standards Challenges
Some manufacturers want to design and deploy proprietary IoT
devices and solutions
Cost factors to implement functional, operational, technical, and
security capabilities into IoT devices and applications
Time-to-market risk
Technology outdated risk
A void in interoperability and standards for IoT devices can
create an environment of bad IoT devices
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Legal and Regulatory Issues
Proper handling and protection of sensitive data
Privacy data subject to privacy laws of state you live in as well
as state that the IoT hosting company resides in
IoT vendor or solutions provider required to adhere to security
control requirements and data protection laws
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Legal and Regulatory IoT Questions
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Who is collecting data?
Who is collecting behavior patterns?
Are they selling this data?
Do they have the right to sell it?
Is there liability associated with the data?
E-Commerce and Economic Development
Issues
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
IoT technology has a significant impact on developing
economies.
Infrastructure resources: Foundational to the deployment of the
IoT, a communication infrastructure and broadband Internet
network are needed within that country. This is the foundation
for IoT device connectivity and communications in a global
marketplace.
Foundational investments: Countries seeking to invest in critical
infrastructures may be able to leapfrog past other countries that
are struggling with regulatory and legal issues in regard to
accelerating deployments.
Technical and industry development: New skills are needed to
bring new technologies and economic solutions to bear using
the Internet and the IoT as a key economic driver. As IoT
technology and industry interoperability and standards mature,
so will IoT device deployment and user and business adoption.
Policy and regulatory definitions: Countries and emerging
economies are positioned to create and implement policies and
regulations to help ensure that security and privacy become part
of the deployment.
9/3/2019
(c) ITT Educational Services, Inc.
30
Infrastructure resources
Foundational investments
Technical and industry development
Policy and regulatory definitions
Summary
The evolution of the Internet of Things (IoT) from the late
1990s to present
The impact that the Internet and IoT have on human and
business life
How bricks-and-mortar businesses transform into e-business
models with e-commerce and an IoT strategy
How IP mobility is driving IoT to include both personal and
business environments
New challenges created by IoT
Page ‹#›
Fundamentals of Information Systems Security
© 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
9
Week 3 Assignment 1
Student Full Name
Strayer University
BUS499 Business Administration Capstone
Dr. Grizzell
Dr. Gardner
Date
Everything in Blue should be deleted
Due Week 3 and worth 115 points
Choose one (1) public corporation in an industry with which
you are familiar. For a list of companies you can choose from,
go to https://www.forbes.com/top-public-
companies/list/5/#tab:overall . Research the company on its own
website, the public filings on the Securities and Exchange
Commission EDGAR database
(http://www.sec.gov/edgar.shtml), in the University's online
databases, and any other credible sources you can find. The
annual report will often provide insights that can help address
some of these questions.
Visit Writing Workshop Video for this Assignment:
https://cdnapisec.kaltura.com/index.php/extwidget/preview/part
ner_id/956951/uiconf_id/38285871/entry_id/0_i2y6molp/embed
/dynamic
Read chapters 1–3 in the course textbook and complete the
LEARN E-Activities for Weeks 1–3 as they set the foundation
to this assignment. Be sure to cite your sources!
Begin your paper on Page 2 below and write a minimum of four
(4) pages. The minimum page count does not include the Title
or Source pages.
Week 3 Assignment 1
Write your introduction here. Include one (1) paragraph
(not more than 6 lines of text) that explains what your paper
will discuss. Much of your introduction may be taken from the
assignment instructions (in your own words). Read all
assignment resources to understand what should be included in
your paper. Be sure to review the assignment instructions in
Blackboard, the grading rubric, and the recorded writing
workshop to understand the requirements. Do not exceed 6 lines
of text in this introduction. There should be no direct quotes in
this introduction.
Globalization
Thoroughly assess how globalization has impacted the
corporation you researched. Provide a thoughtful and well
researched response. Consider for example, how your chosen
company has been involved in expanding globally, how it has
been impacted by global competition, and the global economy.
Do not simply define the term globalization. You will need to
conduct an assessment (i.e. an evaluation) of the impact
globalization has had on your selected corporation.
Your assessment/evaluation should demonstrate that you have
read, understand, and can apply the globalization concepts
covered in the textbook and course resources. Do not write
about globalization in general terms. Your assessment should be
directly related to your selected corporation. If your company
has locations in other countries, do not simply list the various
countries in which the company does business. Your writing
here should thoroughly assess how globalization has impacted
your chosen corporation. Do not Google “globalization” or
simply provide a definition. You must display an understanding
based on what is studied in this course and an ability to apply
the concepts in a real-world evaluation of a corporation.
Your textbook must be a source along with other credible
sources that support the globalization concepts covered in this
course. Read Chapters 1-3 in the course text book as each
chapter provides a solid background and clues on Globalization
that apply to this section. Review the Week 1 & 2 Learn video
Lectures for supporting content. Cite your sources and avoid or
limit the use of direct quotes.
Technology
Thoroughly assess how technological changes have impacted
the corporation you researched. Provide a thoughtful and well
researched response. Consider for example, how the company
has been impacted by cloud computing, social media,
crowdfunding, program apps, email, texting, websites, mobile,
automation, robotics, IOT (Internet of Things), AI (Artificial
Intelligence), e-commerce, data and analytics, etc. Research
how the company may have been impacted by diffusion and
disruptive technologies as explained in the textbook. Do not
simply define the term technology. You will need to conduct an
assessment (i.e. an evaluation) of the impact changes in
technology have had on your selected corporation.
Your assessment/evaluation should demonstrate that you have
read, understand, and can apply the concept of technology
covered in the textbook and course resources. Do not write
about technology in general terms. Your assessment should be
directly related to your selected corporation. If your company is
technologically advanced, do not simply list the various
technologies they possess but rather evaluate how changes in
technology have impacted the corporation. You must display an
understanding based on what is studied in this course and an
ability to apply the concepts in a real-world evaluation of a
corporation. Do not Google “technology” or simply provide a
definition. Your writing here should thoroughly assess how
changes in technology have impacted your chosen corporation.
Your textbook must be a source along with other credible
sources that support the technology concepts covered in this
course. You must display an understanding based on what is
studied in this course. Read Chapters 1-3 in the course text
book as each chapter provides a solid background and clues on
Technology that apply to this section. Review the Week 1 & 2
Learn video Lectures for supporting content. Cite your sources
and avoid or limit the use of direct quotes.
Industrial Organization Model
Thoroughly apply the industrial organization model to
determine how your corporation could earn above-average
returns (i.e. revenue). This model is based upon the
corporation’s external environment which is anything outside of
the corporation that can influence or impact its business
(macro)/operations (micro). Your application should walk
through what the model suggests is needed to earn above
average returns (hint: see figure 1.2 in the textbook). Do not
Google “Industrial Organization Model” or simply provide a
definition or write in general terms. Your writing here should
apply the model to your specific corporation, demonstrate your
understanding of the concepts, as described in this course, and
your ability to apply those concepts to a real-world corporation.
Read Chapter 1 in the course text book as it provides a solid
background and clues on this model that apply to this section.
Review the Week 1 Learn video Lecture for supporting content.
Cite your sources and avoid the use of direct quotes.
Resource-Based Model
Thoroughly apply the resource-based model to determine how
your corporation could earn above-average returns (i.e.
revenue). Consider the corporation’s unique resources
(corporate culture, land, location, equipment, brand, reputation,
trademarks, patents, etc.) and capabilities (skills, experience,
capabilities, etc. that set it apart from its competition). Your
application should walk through what the model suggests is
needed to earn superior returns (hint: see figure 1.3 in the
textbook). Do not Google “Resource-Based Model” or simply
provide a definition or write in general terms. Your writing here
should apply the model to your specific corporation,
demonstrate your understanding of the concepts, as described in
this course, and your ability to apply those concepts to a real-
world corporation. Read Chapter 1 in the course text book as it
provides a solid background and clues on this model that apply
to this section. Review the Week 1 Learn video Lecture for
supporting content. Cite your sources and avoid the use of
direct quotes.
Vision
Thoroughly assess how the vision statement of the
corporation influences its overall success. Include the actual
vision statement for your chosen company (be sure to quote and
cite per SWS or APA). Consider the key concepts discussed in
chapter 1 regarding vision in your assessment of your selected
corporation’s vision statement. Do not simply provide a
definition of vision or general statements. In addition to the
actual vision statement for your corporation, your writing must
demonstrate that you understand the concept of vision, as
discussed in this course, and can assess the impact your
corporation’s vision statement has on its overall success. Read
Chapter 1 in the course text book as it provides a solid
background and clues on vision that apply to this section.
Review the Week 1 Learn video Lecture for supporting content.
Cite your sources.
Mission
Thoroughly assess how the mission statement of the
corporation influences its overall success. Include the actual
mission statement for your chosen company (be sure to quote
and cite per SWS or APA). Consider the key concepts discussed
in chapter 1 regarding mission in your assessment of your
selected corporation’s mission statement. Do not simply provide
a definition of mission or general statements. In addition to the
mission statement of your selected corporation, your writing
must demonstrate that you understand the concept of mission, as
discussed in this course, and can assess the impact your
corporation’s mission statement has on its overall success. Read
Chapter 1 in the course text book as it provides a solid
background and clues on mission that apply to this section.
Review the Week 1 Learn video Lecture for supporting content.
Cite your sources.
Stakeholders
Thoroughly evaluate how each category of stakeholder impacts
the overall success of your selected corporation. Do not Google
“stakeholders” and simply provide a definition or list. You must
provide an evaluation that demonstrates your understanding of
each classification of stakeholders, as described in this course.
Do not write in general terms about stakeholders. Your
evaluation must describe how each classification of
stakeholders impacts your selected corporation’s success. Study
Chapter 1 for additional background on Stakeholders as it
provides a solid background on stakeholders that apply to this
section. Review the Week 1 Learn video Lecture for supporting
content. Cite your sources and avoid the use of direct quotes.
Sources
Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2013). Strategic
management: Concepts and cases: Competiveness and
globalization (10th ed.). Mason, OH: South-Western Cengage
Learning.
List your sources on this page and remember to delete the
instructions, which are in blue font.
Use at least three (3) quality sources, one of which must be the
course text book to support your ideas/work. Note: Wikipedia
and college essay sites do not qualify as academic resources.
Cite your sources throughout your work when you borrow
someone else’s words or ideas.
The source page must include all sources used. All sources
listed here must be cited in your paper.
Look for a permalink tool for a webpage when possible
(especially when an electronic
source requires logging in.
When using SWS remember to organize sources in a numbered
list and in order of use throughout the paper; use the original
number when citing a source multiple times; and follow this
format for all sources:
Author. Publication Date. Title. Page # (written as p. #). How to
Find (e.g. web address)
The APA format may also be used for a Reference page.
Questions to ask yourself before submitting your paper.
· Did I read the required course material and complete the
required activities?
· Have I deleted the blue font instructions in this template?
· Did I leave the provided section headings in place, as provided
in this template?
· After deleting the blue fonts in this template, have I changed
all font to black?
Additional things to keep in mind.
· You will be graded on the quality of your answers, the
logic/organization of the report, your language skills, and your
writing skills using the grading rubric.
· Strayer uses SafeAssign – an automated plagiarism checker. It
is advised that you do your own writing and use external
resources to support what you have written in your own words.

More Related Content

Similar to Fundamentals of Information Systems Security Lesson 2The I.docx

The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things FoundationITpreneurs
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
Emerging technology trends in 2020 gtm plus blog
Emerging technology trends in 2020   gtm plus blogEmerging technology trends in 2020   gtm plus blog
Emerging technology trends in 2020 gtm plus blogJitesh Choudhary
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentationneelyworthwhile
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
Top 10 Technology and Business Trends in 2022.docx
Top 10 Technology and Business Trends in 2022.docxTop 10 Technology and Business Trends in 2022.docx
Top 10 Technology and Business Trends in 2022.docxAdvance Tech
 
State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015Jerome Stembridge
 
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgrp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgErica Finelli
 
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgrp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgMartin Marshall
 

Similar to Fundamentals of Information Systems Security Lesson 2The I.docx (20)

The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
Emerging technology trends in 2020 gtm plus blog
Emerging technology trends in 2020   gtm plus blogEmerging technology trends in 2020   gtm plus blog
Emerging technology trends in 2020 gtm plus blog
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
Top 10 Technology and Business Trends in 2022.docx
Top 10 Technology and Business Trends in 2022.docxTop 10 Technology and Business Trends in 2022.docx
Top 10 Technology and Business Trends in 2022.docx
 
State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015State-of-market-the-market-the-internet-of-things-2015
State-of-market-the-market-the-internet-of-things-2015
 
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgrp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
 
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xgrp_state-of-market-the-market-the-internet-of-things-2015_en_xg
rp_state-of-market-the-market-the-internet-of-things-2015_en_xg
 

More from shericehewat

You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxshericehewat
 
You have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxYou have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxshericehewat
 
You have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxYou have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxshericehewat
 
You have been hired asa cons.docx
You have been hired asa cons.docxYou have been hired asa cons.docx
You have been hired asa cons.docxshericehewat
 
You have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxYou have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxshericehewat
 
You choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxYou choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxshericehewat
 
You are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxYou are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxshericehewat
 
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxYou DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxshericehewat
 
You are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxYou are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxshericehewat
 
You are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxYou are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxshericehewat
 
You can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxYou can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxshericehewat
 
You are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxYou are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxshericehewat
 
You are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxYou are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxshericehewat
 
You are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxYou are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxshericehewat
 
You are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxYou are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxshericehewat
 
You are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxYou are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxshericehewat
 
You are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxYou are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxshericehewat
 
You are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxYou are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxshericehewat
 
You are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxYou are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxshericehewat
 
You are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxYou are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxshericehewat
 

More from shericehewat (20)

You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
 
You have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docxYou have been asked to help secure the information system and users .docx
You have been asked to help secure the information system and users .docx
 
You have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docxYou have been asked to participate in a local radio program to add.docx
You have been asked to participate in a local radio program to add.docx
 
You have been hired asa cons.docx
You have been hired asa cons.docxYou have been hired asa cons.docx
You have been hired asa cons.docx
 
You have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docxYou have been appointed as a system analyst in the IT department of .docx
You have been appointed as a system analyst in the IT department of .docx
 
You choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docxYou choose one and I will upload the materials for u.Choose 1 of.docx
You choose one and I will upload the materials for u.Choose 1 of.docx
 
You are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docxYou are Incident Commander and principal planner for the DRNC even.docx
You are Incident Commander and principal planner for the DRNC even.docx
 
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docxYou DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
You DecideCryptographic Tunneling and the OSI ModelWrite a p.docx
 
You are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docxYou are working as a behavioral health specialist in a neurological .docx
You are working as a behavioral health specialist in a neurological .docx
 
You are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docxYou are to write up a reflection (longer than 2 pages) that discusse.docx
You are to write up a reflection (longer than 2 pages) that discusse.docx
 
You can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docxYou can only take this assignment if you have the book Discovering t.docx
You can only take this assignment if you have the book Discovering t.docx
 
You are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docxYou are to interview a woman 50 and older and write up the interview.docx
You are to interview a woman 50 and older and write up the interview.docx
 
You are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docxYou are to complete TWO essays and answer the following questions.  .docx
You are to complete TWO essays and answer the following questions.  .docx
 
You are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docxYou are the vice president of a human resources department and Susan.docx
You are the vice president of a human resources department and Susan.docx
 
You are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docxYou are the purchasing manager of a company that has relationships w.docx
You are the purchasing manager of a company that has relationships w.docx
 
You are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docxYou are to briefly describe how the Bible is related to the topics c.docx
You are to briefly describe how the Bible is related to the topics c.docx
 
You are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docxYou are the manager of an accounting department and would like to hi.docx
You are the manager of an accounting department and would like to hi.docx
 
You are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docxYou are the new chief financial officer (CFO) hired by a company. .docx
You are the new chief financial officer (CFO) hired by a company. .docx
 
You are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docxYou are the manager of a team of six proposal-writing professionals..docx
You are the manager of a team of six proposal-writing professionals..docx
 
You are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docxYou are the environmental compliance officer at a company that is .docx
You are the environmental compliance officer at a company that is .docx
 

Recently uploaded

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Fundamentals of Information Systems Security Lesson 2The I.docx

  • 1. Fundamentals of Information Systems Security Lesson 2 The Internet of Things Is Changing How We Live © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 1 Learning Objective(s) Explain information systems security and its effect on people and businesses. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning
  • 2. Company www.jblearning.com All rights reserved. Key Concepts The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. The Internet of Things Is Changing How We Live Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Social Media
  • 4. Digital Media Drivers for Internet of Things (IoT) Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 9/3/2019 (c) ITT Educational Services, Inc. 5
  • 5. IP-based networking Connectivity Smaller and faster computing Cloud computing Data analytics Evolution of IoT Internet service providers (ISPs) Radio frequency identification (RFID) Application service providers (ASPs) Software as a Service (SaaS) Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 6. How the Internet and TCP/IP Transform Our Lives Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. The transition to a Transmission Control Protocol/Internet Protocol (TCP/IP) world changed our way of life. People, families, businesses, educators, and government all communicate differently than they did before. Nearly everyone has easy access to the Internet. 9/3/2019 (c) ITT Educational Services, Inc. 7 IoT’s Impact on Human and Business Life The Internet has changed our day-to-day lives Personally Socially Professionally Use the Internet to: Check weather, news, and social media sites at home Check business emails at work Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 7. All rights reserved. Store-and-Forward vs. Real-Time Communications Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 9/3/2019 (c) ITT Educational Services, Inc. 9 Real-time Occurs instantaneously Store-and-forward Acceptable delay in transmitting communication IoT’s Impact on Humans
  • 8. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Health monitoring and updating Home security and smart home control systems Online family member calendars Near real-time tracking and monitoring via GPS Online banking, bill paying, and financial transactions Online e-commerce purchases IoT’s Impact on Business
  • 9. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Retail stores Remote sensors Traffic-monitoring applications B2C service delivery model “Anything as a Service” IoT applications Virtual workplace Evolution from Bricks and Mortar to E-Commerce E-commerce
  • 10. Sale of goods and services on the Internet Business-to-consumer (B2C) Customers purchase goods and services directly from their website Business-to-business (B2B) Businesses conduct sales with other businesses Payment Card Industry Data Security Standard (PCI DSS) Protects private customer data Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Evolution from Bricks and Mortar to E-Commerce (cont.) Internet business challenges: Growing the business through the Internet Changing an existing conventional business into an e-business Building secure and highly available websites and e-commerce portals Building a web-enabled customer-service strategy Finding new customers with Internet marketing Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. E-business Strategy Elements E-commerce solution Internet marketing strategy E-customer service-delivery strategy
  • 11. Payment and credit card transaction processing Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Why Businesses Must Have an Internet and IoT Marketing Strategy Must remain competitive Bricks-and-mortar business model out of date in global market Customers require continuous access to information, products, and services Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. But, Internet presence exposes organizations to online risks, threats, and vulnerabilities. 9/3/2019 (c) ITT Educational Services, Inc. 15 IP Mobility Personal communication devices and mobile phones are powerful Cell phones are used to extend mobility
  • 12. Mobile phones, smartphones, and PDAs match the power and flexibility of small computers Tablets, smartphones, and netbooks fill need for lightweight portable devices Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Mobile Users and Bring Your Own Device (BYOD) Employees and contractors use their own personal devices to connect to network at office Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Issues with Mobile Computing Network Usability Security
  • 13. Mobile Applications Limited web browsers can’t run some traditional applications Bad interface design causes application failure on mobile devices Many users from multiple domains found uses for mobile applications Medical applications were a good fit for mobile applications Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Mobile Applications (cont.) 4G networks provide true IP communications Mobile IP enables users to: Move between LAN segments and stay connected without interruption Maintain a connection to the network as long as the mobile device stays within network coverage Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 14. IP Mobile Communications Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Mobile IP provides connection transparency for several entities working together to ensure that mobile devices can move from one network to another without dropping connections: Mobile node (MN): The mobile device that moves from one network to another. The MN has a fixed IP address regardless of the current network. Home agent (HA): A router with additional capabilities over standard routers, the HA keeps track of the MNs it manages. When an MN leaves the local network, the HA forwards packets to the MN’s current network. Foreign agent (FA): A router with additional capabilities connected to another network (not the HA network), the FA assigns the MN a local address. When the MN connects to another network that supports Mobile IP, it announces itself to the FA. Care of address (COA): The local address for the MN when it connects to another network, the FA assigns the COA to the MN and sends it to the HA when the MN connects. In many cases, the COA is actually the FA address. The HA forwards any packets for the MN to the COA. The FA receives the packets and forwards them to the MN. Correspondent node (CN): This is the node that wants to communicate with the MN. 9/3/2019 20
  • 15. Mobile Node (MN) Home Agent (HA) Foreign Agent (FA) Care of Address (COA) Correspondent Node (CN) IP Mobile Communications (cont.) Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. IP Mobile Communications (cont.) Mobile node (MN) connects to foreign agent (FA). FA assigns care of address (COA) to MN.
  • 16. FA sends COA to home agent (HA). Correspondent node (CN) sends message to MN. CN’s message for MN goes first to HA. HA forwards message to COA. FA forwards message to MN. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. New Challenges Created by the IoT Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security: How do you keep the bad guys out if you enable the IoT for your personal and professional life? Privacy: How do you protect your family’s identity and privacy data from theft or unauthorized access that can lead to identity theft? Interoperability and standards: How well do IoT manufacturers and ASP developers ensure that devices communicate securely? Legal and regulatory compliance: What role do the international, federal, and state levels contribute toward legal, tax, and regulatory requirements regarding IoT-related business transactions that involve payment for goods and services? E-commerce and economic development issues: What are the economic rules of engagement for conducting business on the World Wide Web? How is IoT connectivity
  • 17. and information sharing to be deployed globally? 9/3/2019 (c) ITT Educational Services, Inc. 23 Security Privacy Interoperability Legal and regulatory compliance E-commerce and economic dev issues Security Challenges of IT Devices Deployed in large quantities (such as sensors or consumer items) Ubiquitous and can have wide reach into the user or household population Not maintained or updated devices allow vulnerabilities Upgrades can be difficult to distribute and deploy No owner visibility of how the device connects to the Internet Not physically secure
  • 18. Capture readings and measurements in the open Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Privacy Challenges Privacy policy statement Definition of data, metadata, or analytical data use and rights Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement Determine the domain of privacy Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Interoperability and Standards Internet Engineering Task Force (IETF) ensures interoperability and standards can be pursued for IoT solutions Interoperability has significant financial impacts if not properly addressed Goal is to bring the cost of IoT devices and supporting applications down so they are affordable Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 19. All rights reserved. Interoperability and Standards Challenges Some manufacturers want to design and deploy proprietary IoT devices and solutions Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications Time-to-market risk Technology outdated risk A void in interoperability and standards for IoT devices can create an environment of bad IoT devices Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Legal and Regulatory Issues Proper handling and protection of sensitive data Privacy data subject to privacy laws of state you live in as well as state that the IoT hosting company resides in IoT vendor or solutions provider required to adhere to security control requirements and data protection laws Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Legal and Regulatory IoT Questions Page ‹#›
  • 20. Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Who is collecting data? Who is collecting behavior patterns? Are they selling this data? Do they have the right to sell it? Is there liability associated with the data? E-Commerce and Economic Development Issues
  • 21. Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. IoT technology has a significant impact on developing economies. Infrastructure resources: Foundational to the deployment of the IoT, a communication infrastructure and broadband Internet network are needed within that country. This is the foundation for IoT device connectivity and communications in a global marketplace. Foundational investments: Countries seeking to invest in critical infrastructures may be able to leapfrog past other countries that are struggling with regulatory and legal issues in regard to accelerating deployments. Technical and industry development: New skills are needed to bring new technologies and economic solutions to bear using the Internet and the IoT as a key economic driver. As IoT technology and industry interoperability and standards mature, so will IoT device deployment and user and business adoption. Policy and regulatory definitions: Countries and emerging economies are positioned to create and implement policies and regulations to help ensure that security and privacy become part of the deployment. 9/3/2019 (c) ITT Educational Services, Inc. 30 Infrastructure resources Foundational investments
  • 22. Technical and industry development Policy and regulatory definitions Summary The evolution of the Internet of Things (IoT) from the late 1990s to present The impact that the Internet and IoT have on human and business life How bricks-and-mortar businesses transform into e-business models with e-commerce and an IoT strategy How IP mobility is driving IoT to include both personal and business environments New challenges created by IoT Page ‹#› Fundamentals of Information Systems Security © 2018 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 1
  • 23. 9 Week 3 Assignment 1 Student Full Name Strayer University BUS499 Business Administration Capstone Dr. Grizzell Dr. Gardner Date Everything in Blue should be deleted Due Week 3 and worth 115 points Choose one (1) public corporation in an industry with which you are familiar. For a list of companies you can choose from, go to https://www.forbes.com/top-public- companies/list/5/#tab:overall . Research the company on its own website, the public filings on the Securities and Exchange Commission EDGAR database (http://www.sec.gov/edgar.shtml), in the University's online databases, and any other credible sources you can find. The annual report will often provide insights that can help address some of these questions. Visit Writing Workshop Video for this Assignment: https://cdnapisec.kaltura.com/index.php/extwidget/preview/part ner_id/956951/uiconf_id/38285871/entry_id/0_i2y6molp/embed /dynamic Read chapters 1–3 in the course textbook and complete the LEARN E-Activities for Weeks 1–3 as they set the foundation to this assignment. Be sure to cite your sources! Begin your paper on Page 2 below and write a minimum of four (4) pages. The minimum page count does not include the Title or Source pages. Week 3 Assignment 1 Write your introduction here. Include one (1) paragraph
  • 24. (not more than 6 lines of text) that explains what your paper will discuss. Much of your introduction may be taken from the assignment instructions (in your own words). Read all assignment resources to understand what should be included in your paper. Be sure to review the assignment instructions in Blackboard, the grading rubric, and the recorded writing workshop to understand the requirements. Do not exceed 6 lines of text in this introduction. There should be no direct quotes in this introduction. Globalization Thoroughly assess how globalization has impacted the corporation you researched. Provide a thoughtful and well researched response. Consider for example, how your chosen company has been involved in expanding globally, how it has been impacted by global competition, and the global economy. Do not simply define the term globalization. You will need to conduct an assessment (i.e. an evaluation) of the impact globalization has had on your selected corporation. Your assessment/evaluation should demonstrate that you have read, understand, and can apply the globalization concepts covered in the textbook and course resources. Do not write about globalization in general terms. Your assessment should be directly related to your selected corporation. If your company has locations in other countries, do not simply list the various countries in which the company does business. Your writing here should thoroughly assess how globalization has impacted your chosen corporation. Do not Google “globalization” or simply provide a definition. You must display an understanding based on what is studied in this course and an ability to apply the concepts in a real-world evaluation of a corporation. Your textbook must be a source along with other credible sources that support the globalization concepts covered in this course. Read Chapters 1-3 in the course text book as each chapter provides a solid background and clues on Globalization that apply to this section. Review the Week 1 & 2 Learn video Lectures for supporting content. Cite your sources and avoid or
  • 25. limit the use of direct quotes. Technology Thoroughly assess how technological changes have impacted the corporation you researched. Provide a thoughtful and well researched response. Consider for example, how the company has been impacted by cloud computing, social media, crowdfunding, program apps, email, texting, websites, mobile, automation, robotics, IOT (Internet of Things), AI (Artificial Intelligence), e-commerce, data and analytics, etc. Research how the company may have been impacted by diffusion and disruptive technologies as explained in the textbook. Do not simply define the term technology. You will need to conduct an assessment (i.e. an evaluation) of the impact changes in technology have had on your selected corporation. Your assessment/evaluation should demonstrate that you have read, understand, and can apply the concept of technology covered in the textbook and course resources. Do not write about technology in general terms. Your assessment should be directly related to your selected corporation. If your company is technologically advanced, do not simply list the various technologies they possess but rather evaluate how changes in technology have impacted the corporation. You must display an understanding based on what is studied in this course and an ability to apply the concepts in a real-world evaluation of a corporation. Do not Google “technology” or simply provide a definition. Your writing here should thoroughly assess how changes in technology have impacted your chosen corporation. Your textbook must be a source along with other credible sources that support the technology concepts covered in this course. You must display an understanding based on what is studied in this course. Read Chapters 1-3 in the course text book as each chapter provides a solid background and clues on Technology that apply to this section. Review the Week 1 & 2 Learn video Lectures for supporting content. Cite your sources and avoid or limit the use of direct quotes. Industrial Organization Model
  • 26. Thoroughly apply the industrial organization model to determine how your corporation could earn above-average returns (i.e. revenue). This model is based upon the corporation’s external environment which is anything outside of the corporation that can influence or impact its business (macro)/operations (micro). Your application should walk through what the model suggests is needed to earn above average returns (hint: see figure 1.2 in the textbook). Do not Google “Industrial Organization Model” or simply provide a definition or write in general terms. Your writing here should apply the model to your specific corporation, demonstrate your understanding of the concepts, as described in this course, and your ability to apply those concepts to a real-world corporation. Read Chapter 1 in the course text book as it provides a solid background and clues on this model that apply to this section. Review the Week 1 Learn video Lecture for supporting content. Cite your sources and avoid the use of direct quotes. Resource-Based Model Thoroughly apply the resource-based model to determine how your corporation could earn above-average returns (i.e. revenue). Consider the corporation’s unique resources (corporate culture, land, location, equipment, brand, reputation, trademarks, patents, etc.) and capabilities (skills, experience, capabilities, etc. that set it apart from its competition). Your application should walk through what the model suggests is needed to earn superior returns (hint: see figure 1.3 in the textbook). Do not Google “Resource-Based Model” or simply provide a definition or write in general terms. Your writing here should apply the model to your specific corporation, demonstrate your understanding of the concepts, as described in this course, and your ability to apply those concepts to a real- world corporation. Read Chapter 1 in the course text book as it provides a solid background and clues on this model that apply to this section. Review the Week 1 Learn video Lecture for supporting content. Cite your sources and avoid the use of direct quotes.
  • 27. Vision Thoroughly assess how the vision statement of the corporation influences its overall success. Include the actual vision statement for your chosen company (be sure to quote and cite per SWS or APA). Consider the key concepts discussed in chapter 1 regarding vision in your assessment of your selected corporation’s vision statement. Do not simply provide a definition of vision or general statements. In addition to the actual vision statement for your corporation, your writing must demonstrate that you understand the concept of vision, as discussed in this course, and can assess the impact your corporation’s vision statement has on its overall success. Read Chapter 1 in the course text book as it provides a solid background and clues on vision that apply to this section. Review the Week 1 Learn video Lecture for supporting content. Cite your sources. Mission Thoroughly assess how the mission statement of the corporation influences its overall success. Include the actual mission statement for your chosen company (be sure to quote and cite per SWS or APA). Consider the key concepts discussed in chapter 1 regarding mission in your assessment of your selected corporation’s mission statement. Do not simply provide a definition of mission or general statements. In addition to the mission statement of your selected corporation, your writing must demonstrate that you understand the concept of mission, as discussed in this course, and can assess the impact your corporation’s mission statement has on its overall success. Read Chapter 1 in the course text book as it provides a solid background and clues on mission that apply to this section. Review the Week 1 Learn video Lecture for supporting content. Cite your sources. Stakeholders Thoroughly evaluate how each category of stakeholder impacts the overall success of your selected corporation. Do not Google “stakeholders” and simply provide a definition or list. You must
  • 28. provide an evaluation that demonstrates your understanding of each classification of stakeholders, as described in this course. Do not write in general terms about stakeholders. Your evaluation must describe how each classification of stakeholders impacts your selected corporation’s success. Study Chapter 1 for additional background on Stakeholders as it provides a solid background on stakeholders that apply to this section. Review the Week 1 Learn video Lecture for supporting content. Cite your sources and avoid the use of direct quotes. Sources Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2013). Strategic management: Concepts and cases: Competiveness and globalization (10th ed.). Mason, OH: South-Western Cengage Learning. List your sources on this page and remember to delete the instructions, which are in blue font. Use at least three (3) quality sources, one of which must be the course text book to support your ideas/work. Note: Wikipedia and college essay sites do not qualify as academic resources. Cite your sources throughout your work when you borrow someone else’s words or ideas. The source page must include all sources used. All sources listed here must be cited in your paper. Look for a permalink tool for a webpage when possible (especially when an electronic source requires logging in. When using SWS remember to organize sources in a numbered list and in order of use throughout the paper; use the original number when citing a source multiple times; and follow this format for all sources: Author. Publication Date. Title. Page # (written as p. #). How to Find (e.g. web address) The APA format may also be used for a Reference page.
  • 29. Questions to ask yourself before submitting your paper. · Did I read the required course material and complete the required activities? · Have I deleted the blue font instructions in this template? · Did I leave the provided section headings in place, as provided in this template? · After deleting the blue fonts in this template, have I changed all font to black? Additional things to keep in mind. · You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills using the grading rubric. · Strayer uses SafeAssign – an automated plagiarism checker. It is advised that you do your own writing and use external resources to support what you have written in your own words.