Benchmark – Framework Compliance Assessment Report

 

Using all of the previous assignment information, students will create a Cybersecurity Risk Report that helps their proposed business manage cybersecurity risks.

Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.

2.3: Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic initiatives.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Machine learning 4

 

Fundamentals of linear predictive modeling

Write a fully executed R-Markdown program and submit a pdf / word or html file performing classification task on the Binary response variable from the Santander Bank Case Study. Make sure to try various hyperparameters of the SVM algorithm to find the best available model.

You are required to clearly display and explain the models that were run for this task and their effect on the reduction of the Cost Function.

Points will be deducted in case you fail to explain the output. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Read the attached paper carefully and write a research summary

Read the attached paper carefully and write a research summary ,in two sections  Overall summary What you would like to add or change to the conclusion section  This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS498 Project Plan

Week 1 Assignment – Introduction to Project Management Tools Activity

Overview

The purpose of this activity is to expose you to the Microsoft Project tool for the purpose of developing a project plan and Gantt chart for a hypothetical 30-day hobby project of your choice. Examples include building a deck, painting the garage, or planting a vegetable garden. Completing this activity will help to jump start your successful completion of the project deliverables throughout the course.

This activity consists of two parts:

Part 1: Project Introduction, or Project Plan

You will write a 3–5-page document outlining the project specifics, such as its key objectives and scope, functional and technical requirements, key components, etc.

Part 2: Gantt Chart

You will use Microsoft Project to create a Gantt chart for your hobby project. Download Microsoft Project to your computer if you don’t already have it installed and familiarize yourself with its features.

  • Note: Microsoft Project is available at no cost to Strayer University students. For more information, refer to the left-hand menu option titled “Microsoft Azure for Education.” This information is also available via iCampus
  • You are to create or assume all necessary assumptions to successfully complete this activity.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: Project Introduction or Project Plan

Write a 3–5-page project plan in which you:

  1. Document the hobby project’s key objectives and scope.
  2. Develop the hobby project’s functional and technical requirements.
  3. Design the hobby project’s components, including size, shape, and quality.
  4. Implement the project according to the chosen design and components.
Part 2: Gantt Chart

Use Microsoft Project to create a Gantt chart identifying the major and minor tasks, illustrating dependency relationships between activities.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the project plan portion of your activity to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • You are not required to include a source list page for this introductory activity. You will, however, be responsible for citing sources and including a source list page for all of the course project deliverables

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Body of Knowledge Graphic Model

 

After completing your program of study (IT), you will ideally possess a body of knowledge that will allow you to contribute to society professionally and personally. Professionals need substantial knowledge and the ability to showcase their accolades and experience. Create a graphic model in which you demonstrate your research of professional opportunities, taking into consideration the discrepancies between your current qualifications and what you would need to become a more complete professional, and what actions you will take to reach professional and personal goals. You will highlight your expertise and the knowledge base that is imperative to obtaining the professional position you desire. Choose an appropriate graphic model for the assignment, and include the following:

  1. Name three companies and the positions you would like to obtain.

  1. Describe the core values, mission statements, and codes of conduct of the three companies you have chosen.

  1. What skills, qualifications, and experiences are necessary to obtain the posted positions you desire?

  1. In addition to your existing degree, consider internships, additional certifications, or other qualifications you may need in order to be an accomplished professional.

  1. Gather your body of knowledge and create a strategic roadmap that includes your current qualifications, addresses any deficiencies you have identified, and demonstrates a plan for how you will address those deficiencies ( Current qualification = Associate in Computer Engineering).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need a research paper on robotics 12-14 pages by 08/22 12 PM

Research paper on robotics

Chapter 2 – Review of the Literature (6-8 pages) In this section, it is important to clearly identify the major areas on which you will need to focus your research in order to build a solid foundation for your study in the existing body of knowledge. The literature review is the presentation of quality literature in a particular field that serves as the foundation and justification for the research problem, research questions or hypothesis, and methodology. You will develop a more comprehensive review of the literature as part of your report. Chapter 3 – Approach/Methodology (1 – 2 pages) Describe how you plan to address your research problem and accomplish your stated goal. List the major steps that must be taken to accomplish the goal and include a preliminary discussion of the methodology and specific research methods you plan to implement. Although specific details are not required at this point, you must provide adequate discussion of the general process you will follow to implement your research methodology. Chapter 4: Findings, Analysis, and Summary of Results (2 – 4 pages) Chapter 4 includes an objective description and analysis of the findings, results or outcomes of the research. Limit the use of charts, tables, figures to those that are needed to support the narrative. Most of these illustrations can be included as part of the Appendixes. The following topics are intended to serve as a guide:  Data analysis  Findings & discussion  Analysis  Summary of results & discussion Chapter 5: Conclusions (2 – 4 pages)  Conclusions – Clearly state the conclusions of the study based on the analysis performed and results achieved. Indicate by the evidence or logical development the extent to which the specified objectives have been  6 accomplished. If the research has been guided by hypotheses, make a statement as to whether the data supported or rejected these hypotheses. Discuss alternative explanations for the findings, if appropriate. Delineate strengths, weaknesses, and limitations of the study.  Implications – Discuss the impact of the work on the field of study and its contributions to knowledge and professional practice. Discuss implications for future research.  Recommendations – Present recommendations for future research or for changes in research methods or theoretical concepts. As appropriate, present recommendations for changes in academic practice, professional practice, or organizational procedures, practices, and behavior.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Computing Risks Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

When we talk about traditional architecture, the framework involves purchasing, installing, and maintaining the IT devices on site (Lynch, 2019). Maintaining traditional architecture is easy because of the freedom to decide security requirements needed for the system, to include network controls and cyber threat or attack response. The bottom line is the traditional approach allows the business to have more control over its devices; however, there are downsides to it:

1. Expensive – the cost to install and maintain is high. More data means more machines.

2. More Man-power – traditional IT systems require more in-house personal to maintain the hardware.

On the other hand, the cloud enables businesses to access their infrastructure via a third-party. Additionally, the third party manages the cloud computing needs. The infrastructure-as-a-Service approach allows businesses to move their data to off-site machines. Large cloud companies such as AWS (Amazon), Google, and Microsoft provide cloud services for businesses and they are able to manage comprehensive data security programs via the cloud. It saves businesses A LOT of money not having to pay for hardware for upgrades and hire additional employees to maintain and manage devices.

Now, let’s talk about cloud security and how Amazon’s AWS protect their customer’s data. Threat detection, key management, and encryption is used to ensure that data hosted on the AWS is protected from unauthorized access. Additionally, AWS is continuously being monitored from threats and shady account behaviors. Moreover, AWS provides its customers an internal Identity and Access Management (IAM) internal tool for system administrators to better restrict access of information within their organization. 

-Dexter

RESPONSE 2:

The cloud is a model of computing where servers, networks, storage, development tools, and applications are enabled through the internet. This can help to save money because companies wouldn’t have to make major investments to buy the equipment to host it all themselves. Not only are they saving on the equipment, but companies can also save on having to deal with the space that they would need to store all of their network equipment. The more storage a company needs the more space they need to host that information. Cloud storage also makes it easier to access your information or applications on different devices. You can go from your phone to your laptop to your tablet almost seamlessly. Cloud computing is becoming increasingly more popular with companies.

The flip side of that coin is that you are now putting all your information in someone else’s hands. When doing this you are also relying on their security measures they have in place and their employees to help make sure those security measures are up-to-date and no leaks happen. Anyone looking into cloud computing should definitely do their research into the companies that they would be storing their information with. Check into the security measures that they use, check if they have been attacked by a cyber criminal and the outcome of the attack, check to see what other companies use the service, and how long they have been using the service.

-Rose

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Remote Access Risks Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Virtual Private Networks (VPN) may be getting more utilization over the last year and half than ever before.  Simply because it seems more and more people are teleworking due to COVID 19.  Some types of VPNs are Point to Point Tunneling Protocols (PPTP), OpenVPN and Secure Socket Tunneling Protocol (SSTP).  All of these VPNs are utilized for the purpose of creating a secure tunnel or linkage from a private network to a public network.  This enables the user to send and receive data as if they were connected to a private network.

PPTP is one of the oldest versions of a VPN, due to it being one of the oldest versions it is also considered one of the more vulnerable VPNs.  The PPTP does offer quicker connection speeds than some of the other VPNs, but lacks some of the more secure features of modern modems.  The OpenVPN has grown in popularity as it is deemed almost unbreakable due to it’s strong encryption and authentication.  Lastly, the SSTP is popular due to it being compatible with most Microsoft applications.  The downside to the SSTP is it is proprietary property and developers do not have the underlying code.  However, this may not be a downside to Microsoft or Microsoft users as it could help enhance the security of the VPN.

Though VPNs are a means to secure data on a public network, anything that touches the internet is vulnerable to being hacked.  Some of the techniques used to circumvent VPNs are, malicious ads (bait and switch), login credentials and DDOS attacks.  Malicious ads can carry malware, if users are not able to identify the fraudulent add before clicking the add, malware could be loaded onto the machine.  Log-in credentials can stolen and used to connect to a VPN, again this is up to the user to secure their data, if users are careless with their passwords, VPN security can be circumvented.  Lastly, DDOS attacks can be utilized against VPNs, however depending on the type of VPN utilized a DDOS attack could be thwarted, but it is a technique utilized by havers. 

Overall VPNs are effective at thwarting most attacks to a network and are encouraged for use.

V/r

Jeff Cannon

https://www.technadu.com/can-vpn-be-hacked/45630/

https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols

RESPONSE 2:

Virtual Private Network (VPN) allows for a private network connection over the Internet.  VPNs creates a secure tunnel for the transmission of network traffic.  There are two types of VPNs:  remote access and site-to-site. 

Remote access VPN allows users to connect via a secure VPN tunnel to access a private networks services and resources while off-site.  Remote VPNs also serve to bypass regional Internet restrictions by routing your connection using a different patch where those restrictions do not exist.

Site-to-site VPN or router-to-router VPN is used by larger companies that have satellite office in different locations.  Site-to-site VPN allows those satellite locations to connect to other sites within their network structure. 

Although VPNs are used to establish a secure connection over the Internet, they are still subject to security risks depending on the type of encryption algorithm used to secure the connection. Encryption of these tunnels can be broken is there are known vulnerabilities or if the encryption key is accessed by a bad actor.  The success of stealing encryption keys uses multiple tactics like trickery, computing power, time dedicated to breaking keys, and behind-the-scenes persuasion (VPN Mentor, 2021).  Another existing vulnerability for VPNs tracing of your location based on IP leaks via your web browser during the transmission network traffic.  

-Claudia 

References:

Geeks for Geeks. (10 April 2019).  Types of Virtual Private Network (VPNS) and it Protocols.  Retrieved 18 August 2021 from https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/

VPN Mentor (27 Jun 2021). Can VPNs Be Hacked? We Did The Research, Here’s the 2021 Guide.  Retrieved 18 August 2021 from https://www.vpnmentor.com/blog/can-vpns-hacked-take-deeper-look/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study Phase 3

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

A) DISCUSS POSSIBLE RISK MITIGATION STRATEGIES BASED ON YOUR FINDINGS AND DISCUSSIONS IN CASE STUDY 1 & 2 (attached)
 

B) ENSURE YOUR REFERENCES PAGE CONTAINS AT LEAST 6 SOURCES.

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Favorite topic “Cloud Computing Risks”

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

QUESTION: Please summarize your favorite topic “Cloud Computing Risks” discussed in class explaining why.

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

Make sure you are using at least (2) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now