Why do you believe that the Zachman ontology has stood the test of time? After all, it was created in 1984 and was originally published in the 1987 IBM Systems Journal. What makes this a viable framework today?

Below are links that provide more information about the Zachman Framework as well as the Zachman Framework “evolution”:

The Zachman Framework

and

The Zachman Framework Evolution

For this week’s Discussion, please share your thoughts on the statement, “Treating the enterprise as a complex system like a living organism, focusing more on solving business problems than on extensive documentation, and taking a data-driven approach to business transformation all herald an upheaval in the practice of EA itself”. Additionally, answer ONE of the following questions:

1. Why do you believe that the Zachman ontology has stood the test of time? After all, it was created in 1984 and was originally published in the 1987 IBM Systems Journal. What makes this a viable framework today?

2. Please look at the following link:

Explain the following two (2) consultation techniques applicable to designing user experience solutions in 100-150 words: Bottom-up approach.

Designing User Experience

Provide your response to each question in the box below.

Q1: Answer the following questions regarding consultation and communication techniques and methodologies:
1.1. Explain the following consultation methodologies in context to their description, benefits and consideration applicable to designing user experience solutions in 100-150 words:
⦁ Team Meetings
⦁ Survey
⦁ Group email
1.2 Explain the following two (2) consultation techniques applicable to designing user experience solutions in 100-150 words:
⦁ Bottom-up approach
⦁ Top-down approach
1.3 Describe the following two (2) communication techniques applicable to designing user experience solutions in 70-120 words:
⦁ Lateral communication
⦁ External communication
1.4 Explain any two (2) communication methodologies applicable to designing user experience solutions in 100-150 words.

 

List any questions you have about the Case Study (A5) assignments.

Case study challenge

Review the materials in the LM5 main learning module. List any questions you have about the Case Study (A5) assignments. Skim through the healthcare.gov case study: https://oig.hhs.gov/oei/reports/oei-06-14-00350.asp and ask any questions you have below. Share as appropriate with your team.

Join a team within the course. List your teammates full names below. Comment on the process used to choose your teammates. List any questions, concerns, or comments you have about your team and/or its formation.

How do cloud access security brokers contribute to cloud governance policies?How is CASB used to uncover Shadow Cloud IT?

Cybersecurity – Cloud Access Security Brokers

Write a professional paper regarding Cloud Security Access Brokers.

1. CASBs have four critical pillars as foundational building blocks visibility, compliance, data security, and threat protection. What is the purpose of each pillar?
2. What unique security issues does CASB solve compared with those offered by other security controls such as enterprise/web application firewalls and secure web gateways.
3. How do cloud access security brokers contribute to cloud governance policies?
4. CASB Risk Assessment – CASB enforces Zero trust via internal and external data access controls
5. How is CASB used to uncover Shadow Cloud IT?

 

Write down common functions and descriptions of Windows debugging tools. Write your answer in 150-200 words.

Answer the following questions on functions and features of debugging
and testing tools
3.1 Determine the following features of debugging tools:
• Breakpoints
• Breaking On Exceptions
Write your answer in 150-200 words.
3.2 Write down common functions and descriptions of Windows debugging tools. Write your answer in 150-200 words.
3.3 Describe any three (3) common features of idol testing tools. Write your answer in 150-200 words.
3.4 Explain functions of static and dynamic testing tools. Write your answer in 200-250 words

Critically evaluate security technologies and the problems and issues with information security and risks, and the current strategies for management to mitigate them, and write a report on your findings.

Security and Risk Management in a Digital Environment

Subject Title – “Traditional KPIs or metrics for evaluating business risks are inefficient for understanding cyber risks”

In light of the above statement, critically evaluate security technologies and the problems and issues with information security and risks, and the current strategies for management to mitigate them, and write a report on your findings.
Support your arguments and discussion with relevant examples and references.
Your report should be 1200 words and show evidence of research in the available, relevant literature and you should use the IEEE referencing system, supplying full details of all references used.

Identify resources to reference/use for different types of IT security controls and organize by administrative, technical, and physical controls.

Cyber Security: Organization Security Controls

PROJECT ESSAY

Identify resources to reference/use for different types of IT security controls and organize by administrative, technical, and physical controls. Also, how/if those controls apply to end-user , technical user , and executive users.

CompTIA Network+ N10-008
CompTIA Security+ Get Certified Get Ahead SY0-501
CompTIA Security+ SY0-601
https://csrc.nist.gov/search?keywords=security+controls&ipp=25&sortBy=relevance&showOnly=publications%2Cprojects%2Cnews%2Cevents%2Cpresentations%2Cglossary%2Ctopics&topicsMatch=ANY
https://www.sans.org/#addsearch=security%20controls
https://www.sans.org/cyber-security-skills-roadmap/
https://www.eccouncil.org/information-security-management/
CISSP – Sybex Book 8th Edition
ISO IEC 27001/ISO 27002
NIST Cybersecurity Framework
COBIT
Center for Internet Security Controls

Identify resources for analysis/data collection for improper use or lack of security controls and consequences. Use examples of real-world consequences for improper use/lack of security controls.

ISO IEC 27001/ISO 27002
NIST Cybersecurity Framework
COBIT
Center for Internet Security Controls
https://purplesec.us/