week 8 security cloud

Discuss in 500 words or more  why, in this age of distributed computing, centralized IAM systems are necessary.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week12 discussion

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Assurance

Pick one of the many information security standards organizations and describe in 350 words, what they do and what type of standards they are responsible for.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud policy

 

1. Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets.  A policy is an administrative control. 

If no policy exist in the IT department, research shows that employees will default to a defacto policy.  A defacto policy means a policy that is in effect ,but not formally recognize.  To stop this for happening, It is important for students to understand how to take the cloud best practices discussed throughout this course and use them to create a cloud security policy.  Cloud security fundamentals and mechanisms is a huge part of the cloud security policy.  

For this assignment, read the attached article: “Our Journey to the Cloud”.  Use the SANS email policy template  to create a policy for the cloud.  Please note, the SANS policy is a template you can use to structure your policy.  If you are having trouble with the links above, these supporting documents can be found in the Cloud Policy Assignment Documents folder.  

Sept-Oct_2018_ISP_ONLINE_R.pdf 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Assignment

 

  • Discuss, in 500 words, how you would advise your current employer to use encryption to reduce the vulnerabilities of  their data at rest, in use, and in transit (or in motion).  Identify at what points you think their data is at the highest risk. Consider where the data is when it at rest, in transit, or in use and the potential vulnerabilities associated with each of those locations.Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 
    Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Use quotes to indicate where you have used other’s words. Your SafeAssign score is irrelevant if you have properly cited your work. However, it also shows when you have quoted work incorrectly so make sure your quotes use the original author’s language. 
    Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.
    It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 6

Discuss the challenges of maintaining information security at a remote recovery location.

DQ requirement: Note that the requirement is to post your initial response no later than Sunday and you must post one additional post during the week. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Reply 1:

Information security at a remote recovery location

Recovery is the act or preparation to overcome the man made or natural disaster.Information Security plays a vital role to overcome the disaster. Even though Information security is important there are lots of challenges in maintaining information security at remote recovery location. In case if information security is not maintained properly then there may chance of vulnerabilities like harmful instruction will delivered. Some other challenges include observing insights, implementing procedures, controlling remote site and making the site aware about the risk. It is difficult to monitor the entire resources towards the center of information security. And also gaining control and implementing process took some time at the remote recovery location. Some of the Major Challenges of maintaining information security are 
 1) Although remote locations often operate as independent small businesses, there is a constant requirement for sensitive information such as corporate resources, customerrecords, and payment data to be shared between the corporate headquarters and each site. Dangers of sending sensitive communication over the open web present significant security risks. Distributed enterprise organizations need a way to secure all communications between their corporate HQ and remote employee and business locations.

  The Possible solution to this challenge is :             

     Establishing an encrypted network connection, known as a Virtual Private Network (VPN), between the HQ and the remote location, or between two remote locations willensure that all communications are secure. 

 2) Credit cards have been a convenience to businesses and consumers alike for over 50 years. These small pieces of plastic make transacting easy, but securing those transactions in our connected world is a different story entirely. Purpose-built malware is popping up every day, designed specifically to compromise point of sale (POS) systems.For the Distributed Enterprise, cash-only is simply not an option. Organizations must accept and transmit customer payment information, which creates a unique set of security challenges for both the remote site and the corporate HQ.     

   The possible solution to this challenge is :   

           Remote locations that process credit card transactions must utilize best-in-class network security technologies to not only protect and monitor their payment systems, but toalso separate the network used for payment transactions from the rest of their network and all other information systems. Also, as the target of many dedicated attacks, organizations must employ solutions for protecting their POS systems from advanced and zero day malware threats. Sophisticated UTM appliances can offer Distributed Enterprises all of the advanced network protection they need from one easy-to-deploy offering. 

3) In recent years, regulatory bodies have been tasked with establishing data security standards and requirements,which are designed to protect both businesses and consumers from theft, fraud, and other damages. Although these compliance standards are valuable, they can generate serious challenges for IT professionals. Security systems need regular updates to correspond with the ever-evolving compliance standards. In addition, data storage and transmission systems need to be constantly monitored for unauthorized usage and access. Organizations that fail to comply with PCI DSS, HIPAA, and other global standards, are subject to enforcement actions and fines.

     The possible solution to this challenge is :    

       Businesses within the retail, health care, and hospitality markets are especially sensitive to regulatory compliance.Related aspects of PCI DSS, HIPAA, and other major regulatory compliance standards can be achieved leveraging UTM security appliances as they enable segmentation of network traffic and secure transfer of sensitive information between sites. Modern network visibility tools offer the ability to set alerts and automated reports on security events that are relevant to the compliance standard,including data-leakage, malware, and unauthorized user access. Maintaining clear visibility for auditing purposes is also a requirement for maintaining compliance.

4) Wireless Internet access is becoming an increasingly common service offered to customers, guests, and patients.Distributed Enterprises that choose to offer guest Wi-Fi must be aware of the associated liability. Users can often jump from the guest network to the corporate network,giving them access to sensitive employee and customer data. Businesses also assume liability for any copyright infringement that results from guests illegally downloadingcontent such as media. Organizations must balance the need for tight security, while at the same time providing a fast and seamless Wi-Fi experience for their customers, especially as the number of connected devices continues to grow.

     The possible solution to this problem is :

       Organizations that choose to offer Wi-Fi hotspots must implement technologies and processes that adhere to data security standards, including PCI DSS and HIPAA. Wi-Fi performance is a large influencer of customer satisfaction, so all security technologies must offer line speed performance during times of peak usage. Both firewall and wireless access point technologies must allow for network segmentation, which separates guests from sensitive corporate data. Full UTM, Data Loss Prevention and Advanced Malware protection are essential in protecting the wireless network from targeted and evolving threats

Reply 2:

Maintaining security at a recovery location

In the event of an incident, it is important to consider issues of cross-site contamination.  Failing over to a recovery location is not going to work in the event that the recovery site is also infected with Ransomware.  This is something to consider if you have a hybrid or warm site.  Pulling full snapshots of your environment will bring everything including the intrusions with it (Livens, 2018).

If your recovery location is in the cloud, you need to consider that the cloud-based threats now apply to your recovery site.  Contractual issues, chain of custody issues, lack of administrative controls and others like next-door neighbor issues.  Other could tenants may be under attack which may impact your operational capacity (Atchison, 2018)

Transportation.  Moving large volumes of data to a recovery location loud or other in a controlled and secure manner can be hard to maintain as the size of your data grows.

Physical security. Changes in full physical access to the hardware at your recovery site could cause issues.  Even in a site owned by the organization recovery sites should maintain restricted physical and network administration until activated as the primary. 

Hardware life cycle management.  Even your recovery environment needs to be updated, patched, performance-tested, and eventually decommissioned. 

General Maintenance.  Changes to your main production environment, size, capacity, configuration, patches, and even access control lists (ACL)s need to be considered and updates to the recovery environment need to be made.  Your organization may make changes to your internet capacity but forget about updating the internet bandwidth at the recovery site. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Deliverable 4: Cloud Technology and Virtualization

 Section 1: Design DocumentWrite a four to six  (4-6) page design document in which you: 

  1. Support the need for the use of cloud technology and virtualization within the company.
  2. Assess expected cost savings in hardware infrastructure.
  3. Determine the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies.
  4. Create a diagram through the use of Microsoft Visio or an open source alternative such as Dia to illustrate how cloud and virtualization technology could align with the company’s business processes and assist with attainment of organizational goals. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
  5. Provide a compelling recommendation for solution providers and partners that could help the company secure a firm competitive advantage by using cloud and virtualization technologies.  

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project PlanUse Microsoft Project to:

  1. Update the project plan (summary and detail) template, from Project Deliverable 3: Database and Data Warehousing Design, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

14md

A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Task and Resource Scheduling

 Complete Exercise 1, in Ch. 8, “Scheduling Resources and Costs” of Project Management: The Managerial Process, using Microsoft® Project 2016. 

 Create a network schedule using the information provided in the exercise, apply resources, and adjust the schedule to eliminate over commitment of resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DS Week8

 

Discuss in 500 words or more why Oracle 12c has introduced two new roles – AUDIT_ADMIN and AUDIT_VIEWER. Include a discussion of what database auditing is and what it does. Consider why these new roles were introduced and what problem they are meant to resolve. Do not simply define the roles. Explain why they are useful. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Cite your sources in-line and at the end. Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Your SafeAssign score is rendered irrelevant when you properly cite your work.  Use quotes to indicate where you have used other’s words. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now