Empowering Leadership and Effective Collaboration Question

Empowering Leadership and Effective Collaboration Question
This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool.
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

    ORDER A PLAGIARISM-FREE PAPER NOW

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:Empowering Leadership and Effective Collaboration Question

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.
 
 
Empowering Leadership and Effective Collaboration Question

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Authenticating People, Encrypting Files & Secret And Public Keys Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Summarize the different situations in which people use file encryption software.

According to text, one way in which people use file encryption software would be sending a file to another person. In a work situation, putting an encryption on an email sent, the receiving user would need to have the access to this particular encryption to read the file, message, etc. This type of encryption is a good practice, the issue is that users only do this part of the time. For example, military are encouraged to use this particular feature when sending and digitally signing their emails, but the extra couple of clicks seem to be too much for some. Another example the text gave was transferring files via USB, but where I have worked while in the military and now as a contractor, USB anything is not allowed into the building and/or workspace. This is to include anything that also Bluetooth transmittable (ie: phones, fitbits, headphones w/ voice access, etc.) to prevent adversaries from indirectly accessing data not meant for public use.

An issue with USB transfer brings to mind the recent presidential election and the debated results. While one side claims that this election was the most secured in history, the other side have testimonial and sometimes video proof of persons either leaving unattended USB drives in voting machines, workers uploading the files from the USB drives multiple times, or conveniently lost USB drives.

Again, according to text, another way in which people use file encryption software is to keep files on hard drives safe. Any files on a computer, no matter the security measures, still leave these types of files open to malicious attacks. The examples the text gives are these files can be accessed by Trojan horse, separately booted operating system and/or low-level data written to the hard drive. When a person deletes a file, where does that file go? Just because the user is unable to find the file in a generalized search does not mean that the file is actually gone. Due to this conundrum, if an adversary penetrates the system, though the file is supposed to be deleted forever, he or she may still find files embedded on the user’s hard drive. Windows offers built-in encryption, but whether it be Windows or another operating system, there is not a cure-all to anyone’s information if someone is determined to get information. Separately booting an operating system may give an adversary accesses to plain text files though they have been encrypted.

Makes one wonder exactly the nature of intent when an adversary attacks someone’s system.

Smith, R. E. (2015). Elementary Information Security. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/9781284093070/

-Erica

RESPONSE 2:

1.Describe the five basic attacks on authentications systems.

Clone or borrow, sniff, Denial of service (DOS), trial and error, and retrieve from offline are five of the basic attacks on authentication system. Clone or borrow the credentials can be performed by memorizing someone’s password or using common access card (CAC) that doesn’t belong to you to gain access without permission. Sniff is a method this that acquire credentials or any log on information when a user uses his or her credentials to log on to an information system. Denial of service is self-explanatory, and it is as simple as blocking a user or damaging the information system to prevent the user from using it. Trial and error are in some way similar to brute force attack, where the perpetrator will be trying to guess someone’s password by using patterns left on a screen until he gains access to the system.   Lastly retrieve from offline is retrieving information form any kind of external storage device to access the system.

2.Outline the symmetric encryption process and explain the components involved in the process

The symmetric encryption is a methodology of using encryption keys to encode and decode data. The process is simple, we use an algorithm that converts plain text into unreadable format.  Then the system will perform several changes called permutations on the plain text to convert it into ciphertext. Once it is converted into the ciphertext the other user will need the encryption key it was use by the originator to be able to read the text or convert it back to plain text.

3.Summarize the different situations in which people use file encryption software.

People use encryption in order to protect information from unwanted users or the people that doesn’t have the need to know. It could be used as well to protect Personal identifiable information (PII). In the military is used

to protect mission critical information that could affect the operations if it was known by other people.

4.Describe the different categories of asymmetric encryption algorithms and how they are used in practice.

– Diffie-Hellman – This encryption algorithm requires both users to have a public and private key in order to send and read encrypted messages between the two.

– Elliptic Curve – Similar encryption as Diffie-Hellman but using different mathematical calculation both parties still need secret keys commonly used in military operations and government agencies.

– Rivest-Shamir-Adleman – RSA encryption uses a public and a private key and each pair contains tow modules, public exponent, and modular inverse.

Reference:

Smith, R. E. (2016). Elementary Information Security (2nd ed.). Burlington, MA: Jones & Bartlett Publisher.

SORO

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Information System Management Mod 6

Minimum references for each is 4

ISMG Chapter 4 Netflix Case Study

For this assignment, read Chapter 4 – “Netflix – The making of an e-commerce giant and

the uncertain future of atoms to bits” from the ISMG book and answer the following

questions. Please submit your file in a Word/PDF format only and name the file as:

“Firstname_Lastname_ISDS705_Netflix_CS”.

1. Discuss all the components of IS (Hardware, Software, Data, People, and Process) in

the context of Netflix as outlined in the case (in the context of the time period presented

in the case) (Use the information in the case or refer to external sources to formulate

your answer)..………………….………………………………………………..…….25 points

2. The chapter presents Netflix’s (then) business model – utilizing the DVD-by-mail option

and how it became a market leader. Describe how Netflix gained competitive advantage

in a niche and novel market (at the time of the case) by using Porter’s five forces model.

…………………………………………………………………………………………..25 points

3. Today, Netflix is one of the leading online subscription based streaming service

providers. But it is operating in a highly competitive market along with other streaming

service providers like Apple, Disney Plus, Hulu, YouTube, Amazon Prime etc. Identify the

ways in which Netflix is using or can use IS / IS based strategies to compete with these

market players. Propose some steps that Netflix should take in order to maintain a

dominant position in this market. ……………………………………………………………..25 points

Grading Notes:

1. To be considered for grading, you must submit your assignment in the stated

file format only and follow the file naming conventions.

2. Each question carries 25 points, total points for this assignment – 75.

3. You must answer all the three questions and your answer must address all parts

of the question, for example in question 1 you need to discuss all the five

components of IS. For question 2, you need to elaborate on the five forces

discussed in the chapter and how they apply to this case.

4. Answers to each of the three questions must meet a minimum word count is 350 words.*

5. Include the word count for each answer (excluding references Minimum 4 References), 5 points

per question will be deducted if the word count is not included in the

6. Turnitin is enabled for this assignment and your Turnitin score for this

assignment must be less than 7% (Higher Turnitin scores are unacceptable

and points will be deducted for not meeting the Turnitin score threshold).

*References will not be counted in the word count, you can use any format MLA / APA.

• To prepare for this assignment, you may refer to Module 1 for a refresher on

Porter’s Five Forces model. Additionally, review the supporting resources

(videos, links) for this case study available on Moodle to prepare your answers.

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Discussion

Q1   Social Organizations and Core Competencies”  Please respond to the following:

  • Investigate the importance of effective change leadership in relation to an organization’s adoption of social media initiatives. Next, suggest two (2) ethical issues that a CIO may encounter when implementing social media initiatives. Propose (1) strategy for addressing each identified issue. Provide a rationale for your response.
  • Select three (3) of the twelve (12) core competencies for IT professionals from Chapter 14 of the Roberts text. Rank each one (1) according to its importance for IT professionals to possess in order to develop their careers and compete in the job market. Justify your ranking.

Q2

“Cultural Change and Project Sponsorship” Please respond to the following:

  • Examine the primary reasons why project management causes a cultural change and the impact of that change on integrative information technology. Support your response with at least one (1) example of a cultural change that project management can cause.
  • The literature affirms that project sponsorship is a major component for the successful completion of projects. Select an organization where you would aspire to serve as a CIO. Explore the role of a project sponsor, and highlight the significant reasons why such a position is pivotal to your organization’s success. Provide a rationale for your response.

Q3

Project Management Best Practices and Recognizing Project Migraines”  Please respond to the following:

  • As a newly minted CIO, you have been hired to join a company without a history of project best practices. Suggest strategy and process for your Chief Executive Officer (CEO) to develop standards for your organization that is without any such organizational project history. Justify the main reasons why your suggestion would be effective.
  • Reflect upon Kerzner’s “Sources of Smaller Migraines” from Chapter 2. Select three (3) issues from the list. Then, specify the reasons why these issues are more critical to control than the others. Justify your response.
 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Cybersecurity And Risk Management

Consider your organization or another organization that has been  affected by a cyber-attack. Feel free to research current events on this  topic if you do not have personal experience with an organization who  has been affected by a cyber-attack. Once you have selected an  organization, answer the following questions:

  • Provide a summary of the organization you have selected.
  • What type of cyber-attack occurred?
  • How did the attack occur?
  • As a business manager, what are some recommendations you would  make to the organization, from a business perspective, to better defend  itself in the future?
  • What steps can the business take to better support IT security? Explain.

Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer.

Use APA style guidelines.

You are required to reply to at least two peer discussion question  post answers to this weekly discussion question and/or your instructor’s  response to your posting. These post replies need to be substantial and  constructive in nature. They should add to the content of the post and  evaluate/analyze that post answer. Normal course dialogue doesn’t  fulfill these two peer replies but is expected throughout the course.  Answering all course questions is also required.

 

Required

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"