Information Systems

Week 6

  

Question 1:

Review chapter 10 of the course text.  In your own words, discuss the actions that could lead to the development of effective risk management capabilities. 

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 2:

Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format.   

Discussion Questions 

1. List and describe all of the potential benefits (and costs) that Nationstate would realize from the establishment of an enterprisewide architecture as envisioned by Jane Denton? 

2. Build a business case for Seamus OMalley to present to the senior management team at Nationstate in order to get their buy-in. In addition to benefits and costs, the business case must answer the whats in it for me question that the BU 3presidents all have. 

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 3:

What steps or techniques would you include in order to complete the initial analysis of a suspect file on a system?  

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

Question 4:

For this week’s assignment, please research a scholarly article on scholar.google.com and briefly summarized the article on the topic of File Identification and Profiling in Digital Forensics.

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress