The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, “Key Components of an Information System as Related to the Cyber Domain,” is looking for more information on the cyber domain in hopes of determining the organization’s cybersecurity needs. As a cybersecurity consultant, you believe you can provide the CIO with the information he needs. Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter:

The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, “Key Components of an Information System as Related to the Cyber Domain,” is looking for more information on the cyber domain in hopes of determining the organization’s cybersecurity needs. As a cybersecurity consultant, you believe you can provide the CIO with the information he needs.

Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter:

A definition of the cyber domain and its key components or aspects. The cyber domain encompasses cybersecurity, a discipline that involves the following:
Securing computer information, communications systems, networks, infrastructures, assets
Protecting them against damage, unauthorized use, modification, exploitation
The components of an information system, elaborating on the similarities to the cyber domain
An approach to implementing information security for the organization you chose and how that approach could be expanded to the larger cyber domain
The systems development life cycle compared to the cyber domain life cycle
The components of the threat environment for the organization you chose, including an argument that a threat to the organization is also a threat to the larger domain
Include citations as necessary in APA format.

Q1. Prepare a process diagram that displays the steps that GBI (Global Bike, Inc., the company illustrated in the textbook) must execute in order to fill a customer order, based on the five assumptions listed below. Make certain to include the financial and material impacts of each step as illustrated in the chapter 9 (textbook by Magal and Word). 0. Rocky Mountain Bikes (A GBI customer located in the Western United States) has ordered 250 road helmets (RHMT 1000) from GBI.

Q1. Prepare a process diagram that displays the steps that GBI (Global Bike, Inc., the company illustrated in the textbook) must execute in order to fill a customer order, based on the five assumptions listed below. Make certain to include the financial and material impacts of each step as illustrated in the chapter 9 (textbook by Magal and Word).

0. Rocky Mountain Bikes (A GBI customer located in the Western United States) has ordered 250 road helmets (RHMT 1000) from GBI.

0. The San Diego plant has 50 road helmets valued at a moving average price of $25.13 each

0. The Miami plant has 400 road helmets valued at a moving average price of $25.25.

0. GBI has decided to move 100 road helmets from Miami to San Diego and to purchase 300 helmets from Spy Gear at $25.54 each.

0. GBI sells road helmets for $50 each.

Please study chapter 9 of the textbook and prepare your answer based on the similar examples discussed in the chapter.

————————————————————–

Q2. To answer this question you need to explore the online sources, and use your own experience (if any). A) Find out what it takes to implement the ERP software like SAP (the software you have been using for this course), in terms of costs, time, IT infrastructure, training, change management (changing business practices / processes) and migration (from existing systems). Examine what type of organizations can afford to implement this software – in terms of size, industry, context (like companies in turnaround situations, or with fragmented IT systems).

B) Do you recommend implementation of the ERP software, for the two companies, you worked on during the course ( Muesli Cereal plant – maximum 200 employees, and GBI). These companies could consider three alternatives:

1) In-house implementation of ERP software,

2) Use an ASP (third party Application Service Provider – not SAP) for the ERP application delivery, and

3) A few years ago, SAP started offering a ERP software called “Business by Design” as SAAS (Software As Service) for Small and Medium Size Enterprises (SMEs). It is basically, SAP software in “Cloud” for specific industries. The companies just need to have computers with internet connection. No need for any servers, software upgrades and maintenance. Configuration (customization) / implementation is done by SAP in consultation with the customer (for a one time fee ranging from $30,000 to $100,000). The license fee of $149 per month, per license (minimum 10 licenses). Explore the “Business by Design” information on the web and evaluate whether it will be a good choice.

Instead of “Business by Design”, you may also explore any other cloud based ERP software suitable for small and medium sized businesses (50 to 500 employees). Please provide the name of the software and its main features.

You should discuss both the risks and benefits of each alternative before providing your recommendation.

Assume that a security model is needed for the protection of information in your class. In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class.

Assume that a security model is needed for the protection of information in your class.

In a 1/2- to 1-page paper, describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information in your class.

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data. Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will improve data security.

You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data.

Write a 1- to 2-page recommendation paper outlining methods the company should consider to protect access to data, including recommendations for policies to be enacted that will improve data security.

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

Confidentiality
Integrity
Availability
Some or all of the three (Confidentiality, Integrity, and/or Availability)
Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

1.From the e-Activity, select two (2) types of online traps that have the most adverse impact on children. Next, speculate on one (1) way not discussed in the article in which parents or society can protect children from online exploitation. Provide a rationale for your response.

1.From the e-Activity, select two (2) types of online traps that have the most adverse impact on children. Next, speculate on one (1) way not discussed in the article in which parents or society can protect children from online exploitation. Provide a rationale for your response.

Identify at least three (3) types of exploitation that prevalently occur over the Internet. Next, give your opinion of whether or not you believe that the current primary federal laws are efficient in combatting the types of Internet exploitation in question. Justify your response.
Please make sure theses are separate