{"id":16739,"date":"2024-03-20T22:04:09","date_gmt":"2024-03-20T22:04:09","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/write-a-3-page-paper-answering-case-study-questions-and-cover-module-learning-modules-blow\/"},"modified":"2024-03-20T22:04:09","modified_gmt":"2024-03-20T22:04:09","slug":"write-a-3-page-paper-answering-case-study-questions-and-cover-module-learning-modules-blow","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/write-a-3-page-paper-answering-case-study-questions-and-cover-module-learning-modules-blow\/","title":{"rendered":"Write a 3 page paper answering case study questions and cover module learning modules blow:"},"content":{"rendered":"<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Course learning outcomes connected to this student deliverable include:<\/strong><\/em><\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Describe the use and function of management information systems (MIS) in global business today.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Identify the major components of a computer-based information system, including hardware, software, operating systems, and operating environments.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Distinguish the components of wired and wireless telecommunications networks that support Internet, Intranet and Extranet systems which are integral to the successful operations of the modern firm.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Compare, evaluate, and select the most efficient and effective computer-based information systems from a management perspective.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Explain the interdependence and functionality of the hardware and software components of information systems and apply this knowledge to be able to advise and assist MIS staff about technical decisions.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Analyze how information technology can be used to synthesize complex data to enhance sound business decisions.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Examine the ethical and social issues associated with information systems confronting today&#8217;s technology managers and the organizations for which they work.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Formulate processes and systems, in conjunction with technology personnel, to best leverage MIS for competitive advantage, including knowledge management, business intelligence, and customer intimacy.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Apply the knowledge obtained in this course in order to evaluate and mitigate security threats to the hardware and software systems of an organization. &nbsp;<\/li>\n<\/ul>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Review the CASE STUDY<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">Is the Equifax Hack the Worst Ever<\/em><strong style=\"font-weight: bold; cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">\u2014<\/em><\/strong><em style=\"cursor: auto; color: inherit;\">and Why?<\/em><span style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">&nbsp;<\/em><\/span>on pages 331-333 of your text.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Respond to the four Case Study questions on page 335: 8-13, 8-14, 8-15 and 8-16.<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">You may wish to enhance your submission by comparing and analyzing the similarities and differences to other data breach episodes not discussed specifically in the Case Study. For example, Chief Security Officer (CSO) Magazine Online Editor Dan Swinhoe ranked the Equifax hack as only #6, as of January 2021<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">(Students may wish to research and locate an updated list for comparison)<\/em>:<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Biggest Data Breaches<\/strong><\/p>\n<ol style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Adobe&nbsp;<\/li>\n<li style=\"cursor: auto; color: inherit;\">Adult Friend Finder<\/li>\n<li style=\"cursor: auto; color: inherit;\">Canva<\/li>\n<li style=\"cursor: auto; color: inherit;\">Dubsmash<\/li>\n<li style=\"cursor: auto; color: inherit;\">eBay<\/li>\n<li style=\"cursor: auto; color: inherit;\">Equifax<\/li>\n<li style=\"cursor: auto; color: inherit;\">Heartland Payment Systems&nbsp;<\/li>\n<li style=\"cursor: auto; color: inherit;\">LinkedIn<\/li>\n<li style=\"cursor: auto; color: inherit;\">Marriott International<\/li>\n<li style=\"cursor: auto; color: inherit;\">My Fitness Pal<\/li>\n<li style=\"cursor: auto; color: inherit;\">MySpace<\/li>\n<li style=\"cursor: auto; color: inherit;\">NetEase<\/li>\n<li style=\"cursor: auto; color: inherit;\">Sina Weibo<\/li>\n<li style=\"cursor: auto; color: inherit;\">Yahoo<\/li>\n<li style=\"cursor: auto; color: inherit;\">Zynga<\/li>\n<\/ol>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Of course, it does matter how the rankings were determined:<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">&#8220;CSO compiled this list of the biggest 21<sup style=\"font-size: 12px; cursor: auto; color: inherit;\">st<\/sup>&nbsp;Century breaches using simple criteria: The number of people whose data was compromised. We also made a distinction between incidents where data was stolen for malicious intent and those where an organization inadvertently left data unprotected and exposed. Twitter, for example, left the passwords of its 330 million users unmasked in a log, but there was no evidence of any misuse. So, Twitter did not make this list&#8221; (Swinhoe, 2021,&nbsp;\u00b62).<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Source: Swinhoe, D. (2021).<em style=\"cursor: auto; color: inherit;\">&nbsp;<\/em><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">The 15 biggest data breaches of the 21st century&nbsp;<\/em><\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"margin: -1px; cursor: auto; color: inherit;\">Links to an external site.<\/span><\/span><\/a><em style=\"cursor: auto; color: inherit;\">.&nbsp;<\/em>CSO Magazine Online. January 8, 2021.&nbsp;<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">MODULE LEARNING OBJECTIVES&nbsp;THAT SHOULD BE EMPHASIZED IN THIS ASSIGNMENT<\/strong><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">7-1 What are the principal components of telecommunications networks and key networking technologies?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">7-2 What are the different types of networks?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">7-3 How do the Internet and Internet technology work, and how do they support communication and e-business?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">7-4 What are the principal technologies and standards for wireless networking, communication, and Internet access?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">8-1 Why are information systems vulnerable to destruction, error, and abuse?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">8-2 What is the business value of security and control?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">8-3 What are the components of an organizational framework for security and control?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">8-4 What are the most important tools and technologies for safeguarding information resources?<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/strong><\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">Your total submission should be approximately 5 pages, including the cover page and references, or about 3 pages of double-spaced text. Be sure to follow the APA template provided for formatting and, of course, spell and grammar check. An annotated sample paper is also provided for more detailed formatting help. Complete information can be found on the APA Style website Links to an external site..<\/p>\n<p style=\"margin: 12px 0px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\">\n","protected":false},"excerpt":{"rendered":"<p>Course learning outcomes connected to this student deliverable include: Describe the use and function of management information systems (MIS) in global business today. Identify the major components of a computer-based information system, including hardware, software, operating systems, and operating environments. Distinguish the components of wired and wireless telecommunications networks that support Internet, Intranet and Extranet [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[3],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/16739"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=16739"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/16739\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=16739"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=16739"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=16739"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=16739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}