. According to recent surveys, China, India, and the Philippines are
the three most popular countries for IT outsourcing. Write a short paper
(2-4 paragraphs) explaining what the appeal would be for US companies
to outsource IT functions to these countries. You may discuss cost,
labor pool, language, or possibly government support as your reasons.
There are many other reasons you may choose to highlight in your paper.
Be sure to use your own words.
6. Go online and search for information about companies that have
been harmed or bankrupted by a disaster. Choose one such company and
create a brief case study about it. Successful narratives will focus on
the manner in which the organization was impacted, including financial
losses, losses of sales, or the need for layoffs. Your assignment should
be 3-4 paragraphs in length.
8. Some organizations prohibit workers from bringing certain kinds of
devices into the workplace, such as cameras, cell phones, and USB
drives. Some businesses require employees to use clear or see-through
backpacks when carrying personal items. What other devices might not be
allowed in certain facilities, and why would they be restricted? The
video on Google’s Data Center may give you some ideas to write about for
Your written assignment should consist of 2-3 paragraphs.
9. For this assignment, you are asked to locate any company privacy
policy. Some of the more popular ones might include GOOGLE, APPLE, or
MICROSOFT, but you may elect to review another agency. In 3- 4
paragraphs, explain what you find to be the most interesting information
include a LINK to the policy you have reviewed.
Select one of these biometric techniques and explain the benefits and
the vulnerabilities associated with that method in 3-4 paragraphs.
11. In this module, you learned that random numbers (or, at least,
pseudorandom numbers) are essential in cryptography, but it is extremely
difficult even for powerful hardware and software to generate them. Go
online and conduct research on random number generators. What are the
different uses of these tools besides cryptography? How do they work?
Explain your answer using your own words in 2-3 paragraphs.
14. If you could, what would you do to help create a national
“security culture,” in which everyone is more knowledgeable and
proactive about threats to information security?
13. Law enforcement professionals and investigators use digital
forensic methods to solve crimes every day. Locate one current news
article that explains how investigators may have used these techniques
to solve a crime. Explain the crime that was solved and the methods used
to determine how the crime was committed. Some examples of crimes
solved may include locating missing children, finding criminals who have
fled the scene of a crime, or unsolved crimes from the past that have
been solved due to the use of new techniques (such as DNA testing).