Reference no: EM132455393
Question 1:
Review chapter 10 of the course text. In your own words, discuss the actions that could lead to the development of effective risk management capabilities.
References:
McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.
Question 2:
Read the Nationstate Case Study in the textbook.
Discussion Questions
1. List and describe all of the potential benefits (and costs) that Nationstate would realize from the establishment of an enterprisewide architecture as envisioned by Jane Denton?
2. Build a business case for Seamus O'Malley to present to the senior management team at Nationstate in order to get their buy-in. In addition to benefits and costs, the business case must answer the "what's in it for me" question that the BU 3presidents all have.
References:
McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson.
Question 3:
What steps or techniques would you include in order to complete the initial analysis of a suspect file on a system?
References:
Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress
Question 4:
For this week's assignment, please research a scholarly article on scholar.google.com and briefly summarized the article on the topic of File Identification and Profiling in Digital Forensics.
References:
Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress.
Attachment:- Malware Forensics Field Guide for Windows Systems.rar
Attachment:- IT Strategy Issues and Practices.rar