Week 2 Risk

 

It is an accepted truth that without risk there can be no gain. Every individual and organization must take some risks to succeed. Risk management is not about avoiding risks, but about taking risks in a controlled environment. To do this, one must understand the risks, the triggers, and the consequences.

Instructions

Write a 3-4 page paper in which you:

  1. Define risk management and information security clearly. Discuss how information security differs from information risk management.
  2. Explain security policies and how they factor into risk management.
  3. Describe at least two responsibilities for both IT and non-IT leaders in information risk management.
  4. Describe how a risk management plan can be tailored to produce information and system-specific plans.
  5. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good source for resources.

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Assess how risk is addressed through system security policies, system-specific plans, and contingency plans.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dataset compare chart

Compare across a set of variables that might be meaningfully related, and then discuss what the comparison shows in text. Note that to make a table or chart from these variables, you would have to set it up yourself using the means you computed from the data 

You can choose one of two sets below to run the comparison, whichever is the simplest

* relationship to transportation are ordinal

*locating_counseling to communicating_with_professor

* locate_counseling to communicate_with_professor are all nominal

There are three options you can choose from far as the comparisons; the comparisons are side by side. (for example relationship to transportation)

Attachments: For the excel sheet- You should be analyzing sheet 1 for the data for the variables and I have also attached the codebook if you need it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 544 Unit 5

 

IT544-2: Analyze the cybersecurity software development life cycle (SDLC).

Scenario

You recently took a position as a cybersecurity analyst for a small software company. The software company currently has three commercially available off-the-shelf software products that are sold to businesses and/or organizations (B2B). They can range from small companies to very large companies, including those in the Fortune 500. One of their products has been identified by CERT to have several vulnerabilities. Since this event occurred, the chief cybersecurity officer (CCSO) suspects that not enough security is built into the software development process used at the company. You have been asked by the CCSO to conduct a cyberattack surface analysis on one of their Web-based products in an effort to improve the software development process.

For the assignment, assume that the presentation layer resides on a dedicated server in the company’s DMZ. The other two layers of the software are behind the corporate firewall and can reside on one or two dedicated servers. The Web application is accessible from the Internet and is browser based. Firefox, Chrome, Internet Explorer, and Safari are the supported browsers.

Assignment Instructions

For Assignment purposes, select a multi-layered (presentation layer, business layer, and database layer) web-based open source project in place of the software company’s web-based product. In place of the open source project, if you are familiar with another web-based system that meets the requirements, then discuss using it with your instructor.

Examples of multi-layered open source projects/products include:

  • Office Libre
  • Facebook
  • Mozilla Firefox
  • GIMP (for web development)
  • Audacity
  • WordPress
  • MySQL

You will conduct a cyberattack surface analysis on the system/application you selected. Focus your analysis from an external cyberattack point of view. It is not necessary to focus on end user cyberattacks (social engineering attacks, etc.).

  • Define the cyberattack surface (including operating systems and web servers) by identifying and mapping the cyberattack vectors.
    • Categorize what was identified
    • Describe three use cases that involve the attack surfaces
  • Create a graphic representation of the attack surface with labels (Use Visio or any other open source diagramming or drawing tool).
  • Discuss how the attack surface can be reduced.

Your attack surface analysis can be done mentally and on paper or you can use an open source attack surface analyzer (OWASP’s Zap is one example).

Assignment Requirements:

  • 3–4 pages of content (exclusive of title page and reference page), double-spaced in 12pt Times New Roman font, using correct APA formatting and including a title page and reference page
  • At least one credible source.
  • Correct spelling and grammar.
  • Correct APA formatting.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discu 2

I.  After reading the information presented in Module 4 and other sources, please answer the following in the space below after you review the following: 

(1)  Ten Commandments of Computer Ethics, on page 91 (Section 4-2).   

(2)  Brief case on page 84 (Section 4-1):   Employee Monitoring:  Improving Productivity or Invasion of Privacy  

(3)  Case Study 4-1 – Telecommuting with a new Twist on page 104 , at the end of the chapter; and,

(4)  Case Study 4-2 –Privacy and Other Legal Issues at Google.

II.  Answer the following questions in the space below.  Whenever using an AI tool,  please specify the AI tool that you are using for the assignment.   

1-Question:  Is employee monitoring ethical? Using the AI tool, request information indicating two reasons why it is ethical and two reasons when is it not ethical.  Provide the answers provided by the AI tool.  See if the results presented by the AI tool are comparable to what is stated in the Ten Commandments of Computer Ethics and make a statement regarding this. 

1-Answer from AI tool: Provide the question for the AI tool and the AI tool’s answer (in quotes) in the space that follows.    

2-Question:   – What are 3 software tools that are used for employee monitoring?  State these tools and ask the AI tool to provide the pros and cons of each.  

2-Answer from AI tool: Provide the question for the AI tool and the AI tool’s answer (in quotes) in the space that follows.    

3-Question: Assume that you are a department manager.  Get the AI tool to list and describe at least 4 ways in which you could see might monitor your employees, while they are working and using the employer’s computer resources.  Ask the AI tool to brainstorm about these tools.  

3-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool’s answer (in quotes) in the space that follows.    

4-Question: Ask your AI tool to list 3 ways how/why Google Maps’ Street View might create privacy issues and other legal issues.

4-Answer from AI tool:  Provide the question you stated for the AI tool and the AI tool’s answer (in quotes) in the space that follows.    

5-Question: Briefly, identify and describe what each of the following acronyms represents: HIPAA, FACTA, COPPA, and GDPR laws.   Ask the AI tool to describe one of the acronyms, that you select, and why it is so important.

5-Answer from AI tool: Provide the question you stated for the AI tool and the AI tool’s answer (in quotes) in the space that follows.   

Don’t forget to provide a reference for your AI work.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Secure Network Design

 

You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.

Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.

For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:

•  “Company A Network Diagram”

•  “Company A Risk Analysis”

•  “Company B Network Diagram”

•  “Company B Vulnerability Report and Cybersecurity Tools”

Scenario Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.  The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services. Requirements Your submission must be your original work.
.    A.  Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
 B.  Analyze the given network diagram and vulnerability scan for both companies by doing the following:  1.  Describe two existing vulnerabilities for each company.  2.  Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.  
C.  Create a network topology diagram with details of the proposed merged network requirements.  
D.  Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.  
E.  Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.          F.   Explain two secure network design principles that are used in the proposed network topology diagram.  
G.  Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:  •   the name of the regulatory compliance requirement  •   why the regulatory requirement is relevant to the newly merged company  •   how the proposed merged network topology diagram meets the regulatory requirement   
H.  Describe two emerging threats that are applicable to the merged organization, including the following in the description:  •   potential network security risks of implementing the topology  •   potential performance impacts on the merged network after implementation of the proposed design  •   how to manage the identified potential security risks  
I.  Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:  •   a cost-benefit analysis for on-premises and cloud infrastructure solutions  •   a justification for your recommendations to implement the proposed secure merged network design  
J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.   
K.  Demonstrate professional communication in the content and presentation of your submission.

Follow this rubric  :  A:BUSINESS REQUIREMENTS:The submission accurately describes 2 or more current network security problems and at 2 or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.  
B1:VULNERABILITIES : The submission accurately describes 2 or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan.  
B2:IMPACT, RISK, LIKELIHOOD:  The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.  
C:TOPOLOGY DIAGRAM: The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario. MAke a table under the topology for costs that include everything that we added and show that it stays under the 50k budget
D:TOPOLOGY COMPONENTS: The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCP/IP protocol stack
E:RATIONALE : The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario.  F:SECURE NETWORK DESIGN PRINCIPLES :  The submission explains 2 or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.  
G:REGULATORY COMPLIANCE : The submission accurately explains how the proposed merged network topology diagram addresses 2 or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.  
H:EMERGING THREATS : The submission accurately describes 2 or more emerging threats that are applicable to the newly merged organization and includes all the given points.
I:SUMMARY RECOMMENDATIONS: The submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

build and excel spreadsheet

 

This project requires you to develop a spreadsheet that tracks the cost of elementary school supplies distributed to teachers over a two-month period. You’ll assume the role of Office Manager, who has multiple responsibilities, including distributing and maintaining classroom supplies. For this project, you must prepare an Excel spreadsheet and chart that will be sent to the school District Manager.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Panda challenge 2

Your responsibility is to aggregate the data to and showcase obvious trends in school performance.

Your final report should include each of the following:

District Summary

  • Create a high level snapshot (in table form) of the district’s key metrics, including:
    • Total Schools
    • Total Students
    • Total Budget
    • Average Math Score
    • Average Reading Score
    • % Passing Math (The percentage of students that passed math.)
    • % Passing Reading (The percentage of students that passed reading.)
    • % Overall Passing (The percentage of students that passed math and reading.)

School Summary

  • Create an overview table that summarizes key metrics about each school, including:
    • School Name
    • School Type
    • Total Students
    • Total School Budget
    • Per Student Budget
    • Average Math Score
    • Average Reading Score
    • % Passing Math (The percentage of students that passed math.)
    • % Passing Reading (The percentage of students that passed reading.)
    • % Overall Passing (The percentage of students that passed math and reading.)

Top Performing Schools (By % Overall Passing)

  • Create a table that highlights the top 5 performing schools based on % Overall Passing. Include:
    • School Name
    • School Type
    • Total Students
    • Total School Budget
    • Per Student Budget
    • Average Math Score
    • Average Reading Score
    • % Passing Math (The percentage of students that passed math.)
    • % Passing Reading (The percentage of students that passed reading.)
    • % Overall Passing (The percentage of students that passed math and reading.)

Bottom Performing Schools (By % Overall Passing)

  • Create a table that highlights the bottom 5 performing schools based on % Overall Passing. Include all of the same metrics as above.

Math Scores by Grade**

  • Create a table that lists the average Math Score for students of each grade level (9th, 10th, 11th, 12th) at each school.

Reading Scores by Grade

  • Create a table that lists the average Reading Score for students of each grade level (9th, 10th, 11th, 12th) at each school.

Scores by School Spending

  • Create a table that breaks down school performances based on average Spending Ranges (Per Student). Use 4 reasonable bins to group school spending. Include in the table each of the following:
    • Average Math Score
    • Average Reading Score
    • % Passing Math (The percentage of students that passed math.)
    • % Passing Reading (The percentage of students that passed reading.)
    • % Overall Passing (The percentage of students that passed math and reading.)

Scores by School Size

  • Repeat the above breakdown, but this time group schools based on a reasonable approximation of school size (Small, Medium, Large).

Scores by School Type

  • Repeat the above breakdown, but this time group schools based on school type (Charter vs. District).

As final considerations:

  • Use the pandas library and Jupyter Notebook.
  • You must submit a link to your Jupyter Notebook with the viewable Data Frames.
  • You must include a written description of at least two observable trends based on the data.
  • See Example Solution for a reference on the expected format(attachment1).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study 5

The purpose of this assignment is to develop skills in problem solving, decision making in complex situations, and learn/use the APA 6.0 style guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Best Practices for IT Infrastructure Security Policies Discussion post

Discuss at least four (4) best practices for IT infrastructure security policies in domains other than the User Domain. Pick one domain outside the user-domain to focus on.

 Address the following topics using your own words: 

 1. IT framework selection 

 2. When to modify existing policies that belong to other organizations versus creating your own policies from scratch 

3. Policy flexibility 

4. Cohesiveness 

5. Coherency 

6. Ownership 

Explain your answers.  If using content from internet please Cite them in APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer word

Insert a SmartArt graphic and add text.

  1. Place your insertion point in front of the second section heading (“Emergency Telephone Locations”).
  2. Insert the Vertical Chevron List SmartArt graphic from the List category (Figure 4-122).Type 1 in the graphic text box in the upper-left corner of the SmartArt graphic (first chevron shape).
    1. Type 2 in the second graphic text box in the first column of the graphic.
    2. Type 3 in the third graphic text box in the first column of the graphic.
    3. Type the following text in the bulleted text boxes in the second column. You do not need to add bullets because bullets are already included in the SmartArt.
    4. This table lists text to be typed in a SmartArt graphic
    • Press the “Help” button
    • Speak when the light comes on
    • Stay on the line
    • You will be connected with the college police
    • State clearly the nature of the emergency and your location
    1. Use Backspace to remove the extra bullet in the last graphic in the second column.
  3. Resize and format the SmartArt
    1. Select the frame of the graphic to select the entire graphic.
    2. Change the height to 2.5″ and the width to 4.2″.
    3. Change the text wrapping to Top and Bottom.
    4. Change Colors [SmartArt Design tab] of the entire SmartArt graphic to Dark 2 Fill (Figure 4-123).
      Alternate Instruction for Microsoft 365 Apps icon Change Colors [SmartArt Tools Design tab] of the entire SmartArt graphic to Dark 2 FillApply the Intense Effect SmartArt style.
  4. Convert text to a table.
    1. Select the tabbed text below the second section heading (“Emergency Telephone Locations”). Do not select the paragraph mark below the last row.
    2. Convert Text to Table and select AutoFit to contents.
  5. Sort the table text by Column 1 in Ascending order.
  6. Add a title row and insert text.
    1. Add a row above the first row.
    2. Merge the cells in this row.
    3. Type Blue Emergency Telephones in the merged first row.
  7. Format the table.
    1. Select Header Row, First Column, and Banded Rows in the Table Style Options group (if necessary). Deselect all other options.
    2. Apply the List Table 2 table style.
    3. Select the entire table and change the top and bottom cell margins to 0.04″ and the left and right cell margins to 0.1″.
    4. Vertically center all text in the table. (Hint: Use the Cell tab in the Table Properties dialog box.)
    5. Select the first row and horizontally center the text. This text should be centered vertically and horizontally.
  8. Insert, resize, and position the SPCCD logo.
    1. Place your insertion point at the beginning of the document and insert the SPCCDlogo-04 picture (downloaded from the Resources link). Use the Insert Picture dialog box.
    2. Change the width to 3″ and keep the size proportional.
    3. Change the text wrapping to Top and Bottom and drag the logo above the title (if necessary).
    4. Set the Horizontal Absolute position to 0.3″ to the right of Page.
    5. Set the Vertical Absolute position to 0.3″ below Page.
    6. Change the Color [Picture Format tab, Adjust group] to Saturation: 0%.
      Alternate Instruction for Microsoft 365 Apps icon Change the Color [Picture Tools Format tab, Adjust group] to Saturation: 0%.
  9. Insert, modify, and position an icon.
    1. Place your insertion point at the end of the title.
    2. Insert an icon and select the phone in the Communication section Change the width to 2″ and keep the size proportional.
    3. Change the text wrapping to Tight.
    4. Set the Horizontal Alignment to Right relative to Margin.
    5. Set the Vertical Absolute position to 1.1″ below Margin.
    6. Change the Graphics Fill color to Dark Blue, Text 2 (fourth color in the first row of Theme Colors).
  10. Modify the footer to include a symbol and the current date.
    1. Edit the footer and space once at the end of the text on the right side of the footer.
    2. Insert a solid circle symbol from the Symbol font set (Character code 183) and space once after it.
    3. Type Revised: and space once.
    4. Insert the current date in MM/DD/YY format, set it so that it does not update automatically, and close the footer.
  11. Edit the alt text of the graphic objects.
    1. Edit the alt text of the Sierra Pacific logo, type Sierra Pacific logo as the alt text.
    2. Select the entire SmartArt graphic, type Graphic of emergency telephone instructions as the alt text.
    3. Edit the alt text of the phone icon, type Icon of a blue phone as the alt text, and close the Alt Text pane.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now