1 / 26100%
CIS512
Preview: CIS512 : Advanced Computer Architecture
Course Guide
Prerequisites
Course Description
Instructional Materials
This course examines the structure and operation of digital computers in the context of providing
data and infrastructure security. Emphasis will be placed on strategies to select, deploy, integrate
and administer modern computing environments to support the organization's overall security
posture. Topics include hardware components of modern computing environments and their
deployment in compliance with applicable cybersecurity laws and policies.
Required Resources
William Stallings. 2019. Effective Cybersecurity: A Guide to Using Best Practices and
Standards. CIS512 Pearson Education 1st edition textbook available at
https://www.strayerbookstore.com
Miloslava Plachkinova. 2018. Teaching Case: Security Breach at
Target. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=eric&AN=EJ1173595&site=eds-live&scope=site
National Institute of Standards and Technology. No date. NIST | National Institute of Standards and
Technology. https://www.nist.gov/
Iqbal Ahmed. December 2019. A Brief Review: Security Issues in Cloud Computing and Their
Solutions. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
NOTE: The links in this document do not function. Please refer to your course to
view/download linked content.
Course Learning Outcomes
direct=true&db=a9h&AN=138666095&site=eds-live&scope=site
Kumar Patel. September 2019. Cloud Computing Security Risks: Identification and
Assessment. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=139240729&site=eds-live&scope=site
Vijaya Pise. March 2019. Cloud Computing - Recent Trends in Information Technology.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=136460620&site=eds-live&scope=site
Supplemental Resources
Janine S. Hiller. March 2017. Privacy in Crises: The NIST Privacy Framework.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=a9h&AN=121368202&site=eds-live&scope=site
Shen Lei. December 2014. The NIST Cybersecurity Framework: Overview and Potential Impacts.
http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=99971017&site=eds-live&scope=site
Mark-David McLaughlin. September 2018. Challenges and Best Practices in Information Security
Management. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=131666795&site=eds-live&scope=site
National Institute of Standards and Technology. No date. Cybersecurity.
https://www.nist.gov/topics/cybersecurity
Walter Primoff. December 2017. The Equifax Data Breach: What CPAs and Firms Need to Know
Now. http://libdatab.strayer.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&db=bth&AN=126654696&site=eds-live&scope=site
Jordi Pujol. February 17, 2020. Is This the End of Privacy? Snowden and the Power of
Conscience. https://doi.org/10.1080/23753234.2020.1713017
Tarzie. March 2017. Edward Snowden, Frenemy of the State. http://libdatab.strayer.edu/login?
url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=121624989&site=eds-
live&scope=site
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Weekly Course Schedule
Week 1 - To Do List
Learn: Read Chapters 6, 7, and 16 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 6, 7, and 16 PowerPoint presentations.
Discuss: Introduce yourself and participate in the discussion, Preventing Denial-of-Service (DoS)
Attacks.
Prepare: Read the instructions and scoring guide for the Information Management assignment due
in Week 2.
Week 2 - To Do List
Evaluate the hardware components of modern computing environments and
their individual functions.
1
Review the basic security implications of modern computing environments.
2
Review foundational cybersecurity concepts and the federal, state and local
cyber defense partners/structures.
3
Research the applicable laws and policies related to cyber defense and
describe the major components of each pertaining to the storage and
transmission of data.
4
Examine responsibilities related to the handling of data as it pertains to legal,
ethical and/or agency auditing issues, and how the type of dispute affects the
evidence used to resolve it.
5
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Week 2 - To Do List
Learn: Read Chapters 12 and 17 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 12 and 17 PowerPoint presentations.
Discuss: Complete the discussion, Security Risks Associated With VPNs.
Assignment: Complete and submit the Information Management assignment.
Week 3 - To Do List
Learn: Read Chapters 1 and 18 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 1 and 18 PowerPoint presentations.
Discuss: Participate in the discussion, ISO/IEC 27000 Suite of Security Standards.
Prepare: Read the instructions and scoring guide for the Virtualization assignment due in Week 4.
Week 4 - To Do List
Learn: Read Chapters 2 and 3 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Week 4 - To Do List
Learn: Review the Chapters 2 and 3 PowerPoint presentations.
Discuss: Participate in the discussion, The Role of Strategic Planning in Information Security.
Assignment: Complete and submit the Virtualization assignment.
Week 5 - To Do List
Learn: Read Chapters 4 and 5 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 4 and 5 PowerPoint presentations.
Discuss: Participate in the discussion, Bring Your Own Device (BYOD) Policies.
Prepare: Read the instructions and scoring guide for the Data Protection assignment due in Week
6.
Week 6 - To Do List
Learn: Review Chapter 6 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Read Chapter 8 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Week 6 - To Do List
Learn: Review the Chapters 6 and 8 PowerPoint presentations.
Discuss: Complete the discussion, Confidential E-mails.
Assignment: Complete and submit the Data Protection assignment.
Week 7 - To Do List
Learn: Read Chapter 9 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapter 9 PowerPoint presentation.
Discuss: Participate in the discussion, Cloud Computing: Challenges and Risks.
Prepare: Read the instructions and scoring guide for the Security Breach at Target assignment due
in Week 8.
Week 8 - To Do List
Learn: Read Chapter 10 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapter 10 PowerPoint presentation.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Week 8 - To Do List
Discuss: Complete the discussion, Password-Based Authentication.
Assignment: Complete and submit the Security Breach at Target assignment.
Week 9 - To Do List
Learn: Read Chapters 11 and 13 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 11 and 13 PowerPoint presentations.
Discuss: Complete the discussion, Change Management and Infrastructure.
Prepare: Read the instructions and scoring guide for the Cloud Computing assignment due in
Week 10.
Week 10 - To Do List
Learn: Review Chapter 13 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Read Chapter 14 in Effective
Cybersecurity:
A
Guide
to
Using
Best
Practices
and
Standards.
Learn: Review the Chapters 13 and 14 PowerPoint presentations.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Week 10 - To Do List
Discuss: Complete the discussion, Compare and Contrast Cloud Computing Service Models.
Assignment: Complete and submit the Cloud Computing assignment.
Week 11 - To Do List
Discuss: Participate in the Course Reflection discussion.
Grading Scale
Participation Total Points % of Grade
Discussion Participation 440 44%
Assignment Total Points % of Grade
w02a1 - Information Management 100 10%
w04a1 - Virtualization 100 10%
w06a1 - Data Protection 100 10%
w08a1 - Security Breach at Target 130 13%
w10a1 - Cloud Computing 130 13%
Totals 1000 100%
Final Course Grade
Points Percentage Grade
900 - 1000 90% - 100% A
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Points Percentage Grade
800 - 899 80% - 89% B
700 - 799 70% - 79% C
0 - 699 69% and below F
Unique Course Features
Grading Scale Notation
Please consult the University Catalog and your academic advisor to determine the final grade needed
in this class to satisfy your specific degree conferral requirements.
Assignments
w02a1 - Information Management
Summary
Click the linked activity title to access this assignment.
Text
Overview
Regardless of industry, organizations are responsible to protect and secure their customers’
information. Information management is the process of protecting an organizations data in terms of:
Classification and handling.
Privacy.
Document and records management.
Sensitive physical information.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
To reduce the risk of customer information being jeopardized, organizations often establish a
separation of duties to ensure employees only have access to information they need to do their
jobs.
Organizations need to abide by several U.S. privacy laws and regulations to be in compliance and to
protect consumers (see page 195 of your textbook).
Requirements
Specifically you will write a 2–3-page paper in which you:
1. Research an organization that has violated U.S. privacy laws and regulations.
2. Diagnose how the system failed.
3. Examine how the organization rebounded from the violation.
4. Recommend measures to prevent the violation from occurring or to reduce the risk.
5. Determine key lessons learned.
6. Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment
at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.
Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please
refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your
professor for any additional instructions. Note the following:
The preferred method is for your paper to be typed, double-spaced, using Times New Roman
font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the
course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list
page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Research the applicable laws and policies related to cyber defense and describe the major
components of each pertaining to the storage and transmission of data.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Scoring Guide
Research an organization that has violated
U.S. privacy laws and regulations. 10 %
Unacceptable
Did not submit or
insufficiently
researched an
organization that has
violated U.S. privacy
laws and regulations.
Needs Improvement
Partially researched
an organization that
has violated U.S.
privacy laws and
regulations.
Competent
Satisfactorily
researched an
organization that has
violated U.S. privacy
laws and regulations.
Exemplary
Thoroughly
researched an
organization that has
violated U.S. privacy
laws and regulations.
Diagnose how the system failed. 25 %
Unacceptable
Did not submit or
insufficiently
diagnosed how the
system failed.
Needs Improvement
Partially diagnosed
how the system failed.
Competent
Satisfactorily
diagnosed how the
system failed.
Exemplary
Thoroughly diagnosed
how the system failed.
Examine how the organization rebounded
from the violation. 15 %
Unacceptable
Did not submit or
insufficiently
examined how the
organization
rebounded from the
violation.
Needs Improvement
Partially examined
how the organization
rebounded from the
violation.
Competent
Satisfactorily
examined how the
organization
rebounded from the
violation.
Exemplary
Thoroughly examined
how the organization
rebounded from the
violation.
Recommend measures to prevent the
violation from occurring or to reduce the risk.
25 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Did not submit or
insufficiently
recommended
measures to prevent
the violation from
occurring or to reduce
the risk.
Needs Improvement
Partially
recommended
measures to prevent
the violation from
occurring or to reduce
the risk.
Competent
Satisfactorily
recommended
measures to prevent
the violation from
occurring or to reduce
the risk.
Exemplary
Thoroughly
recommended
measures to prevent
the violation from
occurring or to reduce
the risk.
Determine key lessons learned. 10 %
Unacceptable
Did not submit or
insufficiently
determined key
lessons learned.
Needs Improvement
Partially determined
key lessons learned.
Competent
Satisfactorily
determined key
lessons learned.
Exemplary
Thoroughly
determined key
lessons learned.
Go to Strayer University Online Library to
locate and integrate into the assignment at
least three quality, peer-reviewed academic
resources, written within the past five years.
5 %
Unacceptable
No references
provided.
Needs Improvement
Does not meet the
required number of
references; some or
all references are
poor-quality choices.
Competent
Meets the required
number of references;
all references are
high-quality choices.
Exemplary
Exceeds the required
number of references;
all references are
high-quality choices.
Clarity, writing mechanics, and formatting
requirements. 10 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Serious and
persistent errors in
clarity, writing
mechanics, and
formatting
requirements.
Needs Improvement
Partially free of errors
in clarity, writing
mechanics, and
formatting
requirements.
Competent
Mostly free of errors in
clarity, writing
mechanics, and
formatting
requirements.
Exemplary
Error-free or almost
error-free in terms of
clarity, writing
mechanics, and
formatting
requirements.
w04a1 - Virtualization
Summary
Click the linked activity title to access this assignment.
Text
Requirements
Virtualization offers organizations these benefits:
Savings on infrastructure and support costs.
Fast recovery of information systems in the event of an equipment mishap.
New opportunities for disaster recovery and business continuity.
In addition to examining these virtualization benefits in this assignment, you will also examine
challenges associated with virtualization. Specifically you will write a 2–3-page paper in which you:
1. Define virtualization.
2. Justify the need for organizations to use virtualization.
3. Evaluate two virtual technologies/solutions.
4. Determine alternatives to virtualization.
5. Research security risks associated with virtualization and potential countermeasures.
6. Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment
at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.
Formatting
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
This course requires the use of Strayer Writing Standards. For assistance and information, please
refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your
professor for any additional instructions. Note the following:
The preferred method is for your paper to be typed, double-spaced, using Times New Roman
font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the
course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list
page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Evaluate the hardware components of modern computing environments and their individual
functions.
Scoring Guide
Define virtualization. 10 %
Unacceptable
Did not submit or
insufficiently defined
virtualization.
Needs Improvement
Partially defined
virtualization.
Competent
Satisfactorily defined
virtualization.
Exemplary
Thoroughly defined
virtualization.
Justify the need for organizations to use
virtualization. 15 %
Unacceptable
Did not submit or
insufficiently justified
the need for
organizations to use
virtualization.
Needs Improvement
Partially justified the
need for
organizations to use
virtualization.
Competent
Satisfactorily justified
the need for
organizations to use
virtualization.
Exemplary
Thoroughly justified
the need for
organizations to use
virtualization.
Evaluate two virtual technologies/solutions.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
20 %
Unacceptable
Did not submit or
insufficiently
evaluated two virtual
technologies/solutions
.
Needs Improvement
Partially evaluated
two virtual
technologies/solutions
.
Competent
Satisfactorily
evaluated two virtual
technologies/solutions
.
Exemplary
Thoroughly evaluated
two virtual
technologies/solutions
.
Determine alternatives to virtualization. 15 %
Unacceptable
Did not submit or
insufficiently
determined
alternatives to
virtualization.
Needs Improvement
Partially determined
alternatives to
virtualization.
Competent
Satisfactorily
determined
alternatives to
virtualization.
Exemplary
Thoroughly
determined
alternatives to
virtualization.
Research security risks associated with
virtualization and potential countermeasures.
25 %
Unacceptable
Did not submit or
insufficiently
researched security
risks associated with
virtualization and
potential
countermeasures.
Needs Improvement
Partially researched
security risks
associated with
virtualization and
potential
countermeasures.
Competent
Satisfactorily
researched security
risks associated with
virtualization and
potential
countermeasures.
Exemplary
Thoroughly
researched security
risks associated with
virtualization and
potential
countermeasures.
Go to Strayer University Online Library to
locate and integrate into the assignment at
least three quality, peer-reviewed academic
resources, written within the past five years.
5 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
No references
provided.
Needs Improvement
Does not meet the
required number of
references; some or
all references are
poor-quality choices.
Competent
Meets the required
number of references;
all references are
high-quality choices.
Exemplary
Exceeds the required
number of references;
all references are
high-quality choices.
Clarity, writing mechanics, and formatting
requirements 10 %
Unacceptable
Serious and
persistent errors in
clarity, writing
mechanics, and
formatting
requirements.
Needs Improvement
Partially free of errors
in clarity, writing
mechanics, and
formatting
requirements.
Competent
Mostly free of errors in
clarity, writing
mechanics, and
formatting
requirements.
Exemplary
Error-free or almost
error-free in terms of
clarity, writing
mechanics, and
formatting
requirements.
w06a1 - Data Protection
Summary
Click the linked activity title to access this assignment.
Text
Requirements
Some countries have implemented measures to protect the privacy of their citizens. In this
assignment you will examine the General Data Protection Regulation (GDPR) implemented in the
European Union to enforce privacy laws. You will then compare these regulations to their U.S.
counterparts.
Specifically, in a 3–4-page paper you will:
1. Define the GDPR.
2. Justify the need for the GDPR.
3. Review the GDPRs key principles.
4. Research an organization that violated the GDPR.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
5. Describe the specifics about the violation, including the violator, the GDPR principles that were
violated, the impact on consumers, and the remedy that was applied.
6. Compare and contrast an existing U.S. initiative that protects citizens’ privacy with the GDPR.
7. Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment
at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.
Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please
refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your
professor for any additional instructions. Note the following:
The preferred method is for your paper to be typed, double-spaced, using Times New Roman
font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the
course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list
page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Review foundational cybersecurity concepts and the federal, state and local cyber defense
partners/structures.
Scoring Guide
Define the GDPR. 10 %
Unacceptable
Did not submit or
insufficiently defined
the GDPR.
Needs Improvement
Partially defined the
GDPR.
Competent
Satisfactorily defined
the GDPR.
Exemplary
Thoroughly defined
the GDPR.
Justify the need for the GDPR. 10 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Did not submit or
insufficiently justified
the need for the
GDPR.
Needs Improvement
Partially justified the
need for the GDPR.
Competent
Satisfactorily justified
the need for the
GDPR.
Exemplary
Thoroughly justified
the need for the
GDPR.
Review the GDPR's key principles. 10 %
Unacceptable
Did not submit or
insufficiently reviewed
the GDPRs key
principles.
Needs Improvement
Partially reviewed the
GDPR’s key
principles.
Competent
Satisfactorily
reviewed the GDPRs
key principles.
Exemplary
Thoroughly reviewed
the GDPRs key
principles.
Research an organization that violated the
GDPR. 15 %
Unacceptable
Did not submit or
insufficiently
researched an
organization that
violated the GDPR.
Needs Improvement
Partially researched
an organization that
violated the GDPR.
Competent
Satisfactorily
researched an
organization that
violated the GDPR.
Exemplary
Thoroughly
researched an
organization that
violated the GDPR.
Describe the specifics about the violation,
including the violator, the GDPR principles
that were violated, the impact on consumers,
and the remedy that was applied. 15 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Did not submit or
insufficiently
described the
specifics about the
violation, including the
violator, the GDPR
principles that were
violated, the impact
on consumers, and
the remedy that was
applied.
Needs Improvement
Partially described
the specifics about
the violation, including
the violator, the GDPR
principles that were
violated, the impact
on consumers, and
the remedy that was
applied.
Competent
Satisfactorily
described the
specifics about the
violation, including the
violator, the GDPR
principles that were
violated, the impact
on consumers, and
the remedy that was
applied.
Exemplary
Thoroughly described
the specifics about
the violation, including
the violator, the GDPR
principles that were
violated, the impact
on consumers, and
the remedy that was
applied.
Compare and contrast an existing U.S.
initiative that protects citizens' privacy with
the GDPR. 25 %
Unacceptable
Did not submit or
insufficiently
compared and
contrasted an existing
U.S. initiative that
protects citizens’
privacy with the
GDPR.
Needs Improvement
Partially compared
and contrasted an
existing U.S. initiative
that protects citizens’
privacy with the
GDPR.
Competent
Satisfactorily
compared and
contrasted an existing
U.S. initiative that
protects citizens’
privacy with the
GDPR.
Exemplary
Thoroughly compared
and contrasted an
existing U.S. initiative
that protects citizens’
privacy with the
GDPR.
Go to Strayer University Online Library to
locate and integrate into the assignment at
least three quality, peer-reviewed academic
resources, written within the past five years.
5 %
Unacceptable
No references
provided.
Needs Improvement
Does not meet the
required number of
references; some or
all references are
poor-quality choices.
Competent
Meets the required
number of references;
all references are
high-quality choices.
Exemplary
Exceeds the required
number of references;
all references are
high-quality choices.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Clarity, writing mechanics, and formatting
requirements. 10 %
Unacceptable
Serious and
persistent errors in
clarity, writing
mechanics, and
formatting
requirements.
Needs Improvement
Partially free of errors
in clarity, writing
mechanics, and
formatting
requirements.
Competent
Mostly free of errors in
clarity, writing
mechanics, and
formatting
requirements.
Exemplary
Error-free or almost
error-free in terms of
clarity, writing
mechanics, and
formatting
requirements.
w08a1 - Security Breach at Target
Summary
Click the linked activity title to access this assignment.
Text
Requirements
In this assignment, you will read the article, Teaching Case: Security Breach at Target. Then you will
write a 3–4-page case analysis in which you:
1. Outline the security breach at Target.
2. Describe how Target became aware of the security breach.
3. Examine the security breachs impact on Targets customers.
4. Recommend security controls that could have been implemented to prevent the data breach from
occurring.
5. Research how the data breach at Target affected Target’s and other companies’ security
practices.
6. Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment
at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.
Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please
refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your
professor for any additional instructions. Note the following:
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
The preferred method is for your paper to be typed, double-spaced, using Times New Roman
font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the
course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list
page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Examine responsibilities related to the handling of data as it pertains to legal, ethical and/or
agency auditing issues, and how the type of dispute affects the evidence used to resolve it.
Scoring Guide
Outline the security breach at Target. 10 %
Unacceptable
Did not submit or
insufficiently outlined
the security breach at
Target.
Needs Improvement
Partially outlined the
security breach at
Target.
Competent
Satisfactorily outlined
the security breach at
Target.
Exemplary
Thoroughly outlined
the security breach at
Target.
Describe how Target became aware of the
security breach. 10 %
Unacceptable
Did not submit or
insufficiently
described how Target
became aware of the
security breach.
Needs Improvement
Partially described
how Target became
aware of the security
breach.
Competent
Satisfactorily
described how Target
became aware of the
security breach.
Exemplary
Thoroughly described
how Target became
aware of the security
breach.
Examine the security breach's impact on
Target's customers. 10 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Did not submit or
insufficiently
examined the security
breach’s impact on
Targets customers.
Needs Improvement
Partially examined the
security breachs
impact on Target’s
customers.
Competent
Satisfactorily
examined the security
breach’s impact on
Targets customers.
Exemplary
Thoroughly examined
the security breachs
impact on Target’s
customers.
Recommend security controls that could have
been implemented to prevent the data breach
from occurring. 35 %
Unacceptable
Did not submit or
insufficiently
recommended
security controls that
could have been
implemented to
prevent the data
breach from
occurring.
Needs Improvement
Partially
recommended
security controls that
could have been
implemented to
prevent the data
breach from
occurring.
Competent
Satisfactorily
recommended
security controls that
could have been
implemented to
prevent the data
breach from
occurring.
Exemplary
Thoroughly
recommended
security controls that
could have been
implemented to
prevent the data
breach from
occurring,
Research how the data breach at Target
affected Target's and other companies'
security practices. 20 %
Unacceptable
Did not submit or
insufficiently
researched how the
data breach at Target
affected Target’s and
other companies’
security practices.
Needs Improvement
Partially researched
how the data breach
at Target affected
Targets and other
companies’ security
practices.
Competent
Satisfactorily
researched how the
data breach at Target
affected Target’s and
other companies’
security practices.
Exemplary
Thoroughly
researched how the
data breach at Target
affected Target’s and
other companies’
security practices.
Go to Strayer University Online Library to
locate and integrate into the assignment at
least three quality, peer-reviewed academic
resources, written within the past five years.
5 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
No references
provided.
Needs Improvement
Does not meet the
required number of
references; some or
all references are
poor-quality choices.
Competent
Meets the required
number of references;
all references are
high-quality choices.
Exemplary
Exceeds the required
number of references;
all references are
high-quality choices.
Clarity, writing mechanics, and formatting
requirements 10 %
Unacceptable
Serious and
persistent errors in
clarity, writing
mechanics, and
formatting
requirements.
Needs Improvement
Partially free of errors
in clarity, writing
mechanics, and
formatting
requirements.
Competent
Mostly free of errors in
clarity, writing
mechanics, and
formatting
requirements.
Exemplary
Error-free or almost
error-free in terms of
clarity, writing
mechanics, and
formatting
requirements.
w10a1 - Cloud Computing
Summary
Click the linked activity title to access this assignment.
Text
Overview
Many organizations have adopted cloud computing. In this assignment, you will research cloud
computing and explore its advantages and disadvantages. You will also consider best practices for
adopting cloud computing, selecting a particular cloud computing service model, and assessing and
mitigating security risks.
For your research, please consult Chapters 13 and 14 of your textbook and these articles:
"A Brief Review: Security Issues in Cloud Computing and Their Solutions."
"Cloud Computing Security Risks: Identification and Assessment."
"Cloud Computing - Recent Trends in Information Technology."
Note: If you wish you may consult additional articles, but this is not required.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Requirements
Specifically you will write a 3–4-page paper in which you:
1. Outline the planning process that needs to be in place before adopting cloud computing.
Be sure to identify the stakeholders who need to be involved and the discussions that
need to take place.
2. Evaluate the advantages and disadvantages of cloud computing.
3. Describe the methodology you would use to select a cloud computing service model.
4. Review the security risks and mitigation activities that need to take place before adopting cloud
computing.
5. Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment
at least three quality, peer-reviewed academic resources, written within the past five years.
Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.
Formatting
This course requires the use of Strayer Writing Standards. For assistance and information, please
refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your
professor for any additional instructions. Note the following:
The preferred method is for your paper to be typed, double-spaced, using Times New Roman
font (size 12), with one-inch margins on all sides.
Include a cover page containing the assignment title, your name, your professor's name, the
course title, and the date. The cover page is not included in the required page length.
Include a source list page. Citations and references must follow SWS format. The source list
page is not included in the required page length.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Review the basic security implications of modern computing environments.
Scoring Guide
Outline the planning process that needs to be
in place before adopting cloud computing. 15
%
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Unacceptable
Did not submit or
insufficiently outlined
the planning process
that needs to be in
place before adopting
cloud computing.
Needs Improvement
Partially outlined the
planning process that
needs to be in place
before adopting cloud
computing.
Competent
Satisfactorily outlined
the planning process
that needs to be in
place before adopting
cloud computing.
Exemplary
Thoroughly outlined
the planning process
that needs to be in
place before adopting
cloud computing.
Evaluate the advantages and disadvantages
of cloud computing. 25 %
Unacceptable
Did not submit or
insufficiently
evaluated the
advantages and
disadvantages of
cloud computing.
Needs Improvement
Partially evaluated the
advantages and
disadvantages of
cloud computing.
Competent
Satisfactorily
evaluated the
advantages and
disadvantages of
cloud computing.
Exemplary
Thoroughly evaluated
the advantages and
disadvantages of
cloud computing.
Describe the methodology you would use to
select a cloud computing service model. 20 %
Unacceptable
Did not submit or
insufficiently
described the
methodology you
would use to select a
cloud computing
service model.
Needs Improvement
Partially described
the methodology you
would use to select a
cloud computing
service model.
Competent
Satisfactorily
described a
methodology you
would use to select a
cloud computing
service model.
Exemplary
Thoroughly described
a methodology you
would use to select a
cloud computing
service model.
Review the security risks and mitigation
activities that need to take place before
adopting cloud computing. 25 %
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
© 2020 Strategic Education, Inc.
Unacceptable
Did not submit or
insufficiently reviewed
the security risks and
mitigation activities
that need to take
place before adopting
cloud computing.
Needs Improvement
Partially reviewed the
security risks and
mitigation activities
that need to take
place before adopting
cloud computing.
Competent
Satisfactorily
reviewed the security
risks and mitigation
activities that need to
take place before
adopting cloud
computing.
Exemplary
Thoroughly reviewed
the security risks and
mitigation activities
that need to take
place before adopting
cloud computing.
Go to Strayer University Online Library to
locate and integrate into the assignment at
least three quality, peer-reviewed academic
resources, written within the past five years.
5 %
Unacceptable
No references
provided.
Needs Improvement
Does not meet the
required number of
references; some or
all references are
poor-quality choices.
Competent
Meets the required
number of references;
all references are
high-quality choices.
Exemplary
Exceeds the required
number of references;
all references are
high-quality choices.
Clarity, writing mechanics, and formatting
requirements. 10 %
Unacceptable
Serious and
persistent errors in
clarity, writing
mechanics, and
formatting
requirements.
Needs Improvement
Partially free of errors
in clarity, writing
mechanics, and
formatting
requirements.
Competent
Mostly free of errors in
clarity, writing
mechanics, and
formatting
requirements.
Exemplary
Error-free or almost
error-free in terms of
clarity, writing
mechanics, and
formatting
requirements.
2020 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary
information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed
written permission of Strayer University.
Students also viewed