Ask Management Information System Expert

IT 238 Essay Questions

This part of the exam consists of four essay questions worth 10-20 points each. These questions require longer answers than the short answer questions, and there's no single correct answer for the questions. For that reason, your explanation is more important than a specific answer.

Spell check and proofread your answers carefully. One free typo per question, after that each typo will result in a deduction of one point, up to five points per question. There are additional specific grading policies described with each question.

Everything you need to answer these questions can be found in the textbook or other reading and videos assigned during the course. You may search the internet for relevant information, but be aware as always that the internet is an unreliable source of information and terminology varies, so this is a risky approach.

All work on the exam must be your own. You are not allowed to use any quotations from any source in your answers. Any students found to be working together or sharing answers will each receive a zero on the entire final exam. Plagiarism from any source will also result in a zero.

You must upload your answers to all questions in a single PDF document.

Question 1. The United States has taken the position that the acceptability of cyber espionage depends upon the motivation of the espionage and what is done with the stolen information. This is most obvious in the United States position towards China's espionage activities.

What does the United States believe is an appropriate motivation for espionage, and what is inappropriate? Your answer must include an example of a cyberattack we read about this quarter that had appropriate motivation and one with inappropriate motivation.

Grading for question 1. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points. The answer to this question requires that you describe two attacks. If you fail to do so, you will lose 2 points for each one.

Question 2. You are in charge of IT for an electric utility. The CEO of the company suggests disconnecting the company's computer network from the internet so that you don't have to worry about all of that "cybersecurity stuff".

Respond to the CEO by saying why the suggestion of creating an "air gap" is not sufficient to protect your network against cyberattacks. In your response, describe one cyberattack that we learned about this quarter where the target was not connected to the internet.

Grading for question 2. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points. 5 points will be deducted if you do not describe a cyberattack as required in the instructions.

Question 3. Explain whether you believe the following statement to be true, and why or why not?
Countries are unlikely to attack the United States in cyberspace because they fear that the United States will retaliate with cyberattacks against them.

You must justify your answer by referring to topics covered in the class, you can't just base your answers on general beliefs like "other countries fear (or do not fear) the US".

Grading for question 3. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points.

Question 4. You have been hired by President-elect Trump as a cybersecurity advisor. Write an essay proposing what you believe is the most important action/policy/law he should pursue to improve cybersecurity in the United States.

Your essay must include the following:

• A description of the proposal.

• What effect would implementing the proposal have - how would it improve cybersecurity?

• Which of the three elements of deterrence is the proposal most closely related to?

• Identify at least one cyberattack we have read about this quarter where the proposal would make the attack less likely to occur, and explain why.

Please do not inject political commentary in your answer, what you write should be the same regardless of who actually won the election.

Grading for question 4. This question is worth 20 points. Your answer to Question 4 should be 250-400 words in length. If your answer is between 200 and 250 words, the maximum score is 15 points. If your answer is between 150 and 250 words, the maximum score is 10 points. If your answer is less than 150 words in length, no credit will be given.

Each of the bullet points above are given equal weight in the grading of this question

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92067201

Have any Question?


Related Questions in Management Information System

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Question how can company protect the new emerging

Question : How can company protect the new emerging technology ventures from profit pressures of the parent organization (APA format required, Turntin check required . Minimum 250 words essay) How do companies overcome l ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Data resources management questionsq1 the dama dmbok

Data Resources Management QUESTIONS Q1. The DAMA DMBOK textbook describes the following two core activities as part of the Data Architecture management exercise: "Understanding enterprise information needs" and "Develop ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As