Describe potential challenges that the procurement process may experience by not having a proper business and assurance case.

I just need the document in a clear well written single spaced.  1-2 pages is fine more is okay just make the information flow. I will do the editing no need to send cover page or double space. I will do that through my review.
Avoid using “This” explain what “This” is!
I need 4 clear and quality references.
These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.
Hints these are current subject related cited references.
No ebooks.
No google books
No paid sites for access.
No make believe books.
****Must be current and visible references*****
Will not accept anything but true references.
References mean the world to me and they should to you if you want to accept my money.
Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.
I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.
No google books or Wiki. I need media articles to references and see. Please understand this requirement.
Also this needs to follow APA style and be in 12 Times. 
here is the example of APA:
https://owl.english.purdue.edu/owl/resource/560/18/
Thank you and see the topics below that need addressed.

Select what you believe to be the top-three benefits of making a business and assurance case prior to proceeding with a procurement plan. Support your response with a rationale. Describe potential challenges that the procurement process may experience by not having a proper business and assurance case.

Recommend two practices that should be performed when administering procurement contracts and explain why you recommend them. Determine how these practices will ensure that subcontractors fully comply with the requirements of the contract within your recommendation.

Construct examples that demonstrate how qualitative and quantitative methods could be applied to measure risk and prioritize risk responses.

I just need the document in a clear well written single spaced.  1-2 pages is fine more is okay just make the information flow. I will do the editing no need to send cover page or double space. I will do that through my review.

Avoid using “This” explain what “This” is!

I need 4 clear and quality references.

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Hints these are current subject related cited references.
No ebooks.
No google books
No paid sites for access.
No make believe books.

****Must be current and visible references*****

Will not accept anything but true references.

References mean the world to me and they should to you if you want to accept my money.

Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.

I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.

No google books or Wiki. I need media articles to references and see. Please understand this requirement.
Also this needs to follow APA style and be in 12 Times. 
here is the example of APA:

https://owl.english.purdue.edu/owl/resource/560/18/

Thank you and see the topics below that need addressed.

Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the risk management process and explain why. 

Construct two examples that demonstrate how qualitative and quantitative methods could be applied to measure risk and prioritize risk responses. Recommend two factors that should be considered when prioritizing risk responses.

Select what you believe to be the top benefits of making a business and assurance case prior to proceeding with a procurement plan.

I just need the document in a clear well written single spaced.  1-2 pages is fine more is okay just make the information flow. I will do the editing no need to send cover page or double space. I will do that through my review.
Avoid using “This” explain what “This” is!
I need 4 clear and quality references.
These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.
Hints these are current subject related cited references.
No ebooks.
No google books
No paid sites for access.
No make believe books.
****Must be current and visible references*****
Will not accept anything but true references.
References mean the world to me and they should to you if you want to accept my money.
Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.
I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.
No google books or Wiki. I need media articles to references and see. Please understand this requirement.
Also this needs to follow APA style and be in 12 Times. 
here is the example of APA:
https://owl.english.purdue.edu/owl/resource/560/18/
Thank you and see the topics below that need addressed.

Select what you believe to be the top-three benefits of making a business and assurance case prior to proceeding with a procurement plan. Support your response with a rationale. Describe potential challenges that the procurement process may experience by not having a proper business and assurance case.

Recommend two practices that should be performed when administering procurement contracts and explain why you recommend them. Determine how these practices will ensure that subcontractors fully comply with the requirements of the contract within your recommendation.

Identify what you believe to be the most important step in the risk management process and explain why.

I just need the document in a clear well written single spaced.  1-2 pages is fine more is okay just make the information flow. I will do the editing no need to send cover page or double space. I will do that through my review.

Avoid using “This” explain what “This” is!

I need 4 clear and quality references.

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Hints these are current subject related cited references.
No ebooks.
No google books
No paid sites for access.
No make believe books.

****Must be current and visible references*****

Will not accept anything but true references.

References mean the world to me and they should to you if you want to accept my money.

Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.

I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.

No google books or Wiki. I need media articles to references and see. Please understand this requirement.
Also this needs to follow APA style and be in 12 Times. 
here is the example of APA:

https://owl.english.purdue.edu/owl/resource/560/18/

Thank you and see the topics below that need addressed.

Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the risk management process and explain why. 

Construct two examples that demonstrate how qualitative and quantitative methods could be applied to measure risk and prioritize risk responses. Recommend two factors that should be considered when prioritizing risk responses.

Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force.

Cite 8 examples where security was either good (4) or bad (4) to illustrate your point given the data breach events of late? 4 examples of where policies and procedures either made or broke a situation?

I need at least 3 resources in APA. — https://owl.english.purdue.edu/owl/resource/560/18/

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Based of the following discussion thread.

 Security strategy plays an essential role in a company to mitigate or avoid any information risk related to people, processes, and technologies. It protects the company from damaging its security. Security strategy sets guidelines, policies, procedures, standards, and practices to effectively identify, remediate and manage the risk associated with the information. In today’s environment data is a valuable resource that needs to be accessible and reliable and at the same time be able to be protected from threats.  With everyone using network infrastructure to run their business it is imperative that the network is available but secure.

The discussion for the week present this question:  Only focusing on the follow-up discussion as mentioned above.  Below is only for reference and does not need to be answered.

Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force. Select what you believe to be the most important reason and explain why.   

Propose three activities that could be performed by the Human Resources Department to screen and hire personnel effectively. Choose one activity you proposed and justify how it would support personnel security functions.

Describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.

 
Experiment with the tool – Steganography Online (http://stylesuxx.github.io/steganography/) to get a feel of how the steganographic tool works.

In steganalysis, which methods are used to detect steganography?
Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.

Grading Criteria Discussion
Maximum Points
Meets or exceeds established assignment criteria
45
Demonstrates an understanding of lesson concepts
45
Mechanics, punctuation, sentence structure,
spelling that affects clarity, APA formatting  
10
Total
100

Determine reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force.

Cite 8 examples where security was either good (4) or bad (4) to illustrate your point given the data breach events of late? 4 examples of where policies and procedures either made or broke a situation?

I need at least 3 resources in APA. — https://owl.english.purdue.edu/owl/resource/560/18/

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Based of the following discussion thread.

 Security strategy plays an essential role in a company to mitigate or avoid any information risk related to people, processes, and technologies. It protects the company from damaging its security. Security strategy sets guidelines, policies, procedures, standards, and practices to effectively identify, remediate and manage the risk associated with the information. In today’s environment data is a valuable resource that needs to be accessible and reliable and at the same time be able to be protected from threats.  With everyone using network infrastructure to run their business it is imperative that the network is available but secure.

The discussion for the week present this question:  Only focusing on the follow-up discussion as mentioned above.  Below is only for reference and does not need to be answered.

Determine three reasons why an organization should define the boundaries of control, identify personnel security functions based on risks, and manage change within the work force. Select what you believe to be the most important reason and explain why.   

Propose three activities that could be performed by the Human Resources Department to screen and hire personnel effectively. Choose one activity you proposed and justify how it would support personnel security functions.

Which methods are used to detect steganography?

 
Experiment with the tool – Steganography Online (http://stylesuxx.github.io/steganography/) to get a feel of how the steganographic tool works.

In steganalysis, which methods are used to detect steganography?
Briefly describe how cryptography is applied in ATM, SSL, digital signatures, hashes and drive encryption.

Grading Criteria Discussion
Maximum Points
Meets or exceeds established assignment criteria
45
Demonstrates an understanding of lesson concepts
45
Mechanics, punctuation, sentence structure,
spelling that affects clarity, APA formatting  
10
Total
100

Discuss computer forensics laws impacting and constraining investigators.

The Discussion Board is part of the core of online learning. The purpose of the Discussion Board is to allow you to learn through sharing ideas and experiences as they relate to course content and the Discussion Board question. Classroom discussion in an online environment requires your active participation with classmates and your instructor to create robust interaction and dialogue. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.
At a minimum, you will be expected to complete 3 posts during the unit: 1 original response to the Discussion Board question and 2 posts responding to classmates, following these guidelines:
Your original post must be at least 200 words in length. It must reference the text or course learning materials at least once. Please note that even if the question asks for an opinion, you are still expected to support opinions with references to course materials and any other credible academic sources to support your opinions. Do not use Internet sources other than those provided in the course materials. APA format is not necessary for your Discussion Board when citing references, but you are required to acknowledge your resources: In the narrative, describe where information was obtained. For example, “As mentioned in Chapter 2 of the course textbook, prioritizing tasks is…” 
Your two response posts must be at least 75 words in length. Responses should contribute to the conversation by being reflective, specific, and engaging. Quick responses (such as “I agree” or “Thank you!”) will not be counted as adequate.
Your first contribution must be posted before midnight CST (Central time) on Friday of each week. You must make 2 additional posts—on separate days between Saturday and Tuesday—before midnight CST. The original response and the peer responses can be completed in any order.
For assistance in supporting your assignment, please use your text and all course materials.
After you have reviewed the Assignment Details below, click the Discussion Board link under the My Work heading above to make your post.
How to Post to the Discussion Board
Assignment Details 
Professional Proposal

Before starting the actual report required for the course, it will be critical to understand the legal constraints impacting investigations. The assignment for this week is to discuss computer forensics laws impacting and constraining investigators. Understanding the legal constraints will be critical in developing reports and implementing any forensics procedures because failure to do can result in severe penalties, fines, the loss of a civil or criminal case, or even imprisonment.

Discuss the impact of at least 3 of the following legal entities, and state the legal significance and impact to investigations of all 3:

U.S. Statutory Law: Wiretap Act (18 U.S.C. § 2511)  
U.S. Statutory Law: Pen Register and Trap and Trace Devices (18 U.S.C. § 3121-27)  
U.S. Statutory Law: Stored Wire and Electronic Communication (18 U.S.C. § 2701-120)  
Electronic Communications Privacy Act (ECPA), 18 U.S.C. § 22510-22 (1986)  
Constitution: Fourth and Fifth Amendments  
Federal Rules of Evidence (admissibility), Federal Rules of Criminal Procedure  
Legal requests, warrants (legal related documentation) 

Respond to 2 of your fellow classmates with a reply of at least 100 words. Use the following questions as a guide: 

What did you learn from your classmate’s posting?  
What additional questions do you have after reading the posting?  
What clarification do you need regarding the posting?  
What differences or similarities do you see between your posting and other classmates’ postings? 

1 2 3 144