Threat Interception Project

  

Threat Interception Project Assignment Instructions

Overview

When accessing the Internet via wireless methodologies, a certain level of protection has been granted to the users. This protection is largely due to the many types of security protocols that have been developed. Without these different security protocols, users would not be able to engage in the activity that they have become accustomed to on the Internet. In order to preserve this freedom with which users utilize the Internet, IT professionals must have both a thorough understanding of the primary forms of security protocols as well as how each security protocol functions.

One of the best methods that can be utilized to minimize security threats is by intercepting these attacks before they are successfully utilized. Three security protocols that are used to achieve this include Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Private Communications Transport (PCT). Do any other security protocols exist? Research one additional modern security protocol and add this to your analysis.

Instructions

Assume that you are the information security officer of a business, and you must evaluate these four (4) security protocols in order to determine which should be implemented in your organization.  Analyze the protocols on at least two (2) different operating systems from a threat interception standpoint. Use current threat and vulnerability data when performing this assessment. US-CERT, the United States Computer Emergency Readiness Team, is one example of a U.S. Department that has information on current threats to information systems.  Regardless, many other public and private sector organizations can be used as long as they are credible.  

In order to perform this analysis, if you do not have access to two different physical workstations with different operating systems, it is recommended you use virtual machines. VMware and Oracle VirtualBox are examples. Search for either and download them free of charge. Subsequently, you can use open source pre-built images or install from the operating system ISO images. For instance, Kali Linux is a popular operating system that has the tools to do this analysis. Search “Kali Linux VirtualBox Image” to find a virtual box image pre-installed with Kali Linux.

In your analysis, be sure to assess the threats that each protocol is likely to mitigate or prevent and evaluate the strengths and weaknesses associated with each of these protocols. Be sure to include the following in your project:

· A properly formatted APA paper;

· Screenshots with visible OS dates of the network security threat assessments on the two different operating systems, at least one OS being Linux, using relevant security tools on Kali Linux or Linux alternatives;

· Justification and use of appropriate security tools to demonstrate and evaluate the vulnerability of intercepting information from each of the four (4) networking protocols;

· A review of which safeguards the organization could implement to guard against these attacks, and

· A well supported report regarding the most advantageous safeguard/mitigating factors of the network security threats your project addresses;

· Hint: Create Microsoft Excel spreadsheets that list the operating systems, security assessments, tools used, four (4) networking protocols, and findings from the threat interceptions that occurred;

· Your project must be a minimum of 1500 words and must contain at least 7 peer-reviewed sources;

· Before being graded, all code, security tool logs/reports, server logs, access control rules, and diagrams (each) must include screenshots with a valid OS date/timestamp and a unique piece of data that shows completion on the student’s Kali Linux distribution or relevant alternative security OS. Include the screenshots in appendices in your written paper.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PROJECT: METHODOLOGY DEVELOPMENT ANALYSIS ASSIGNMENT

  

Project: Methodology Development Analysis Assignment Instructions

Overview

This part of the project develops the methodology and begins analysis of the information security solution. The problem statement, project scope, risk analysis, and literature review performed in the Project: Problem Identification Assignment must justify the selection of the elements that require analysis for the final fault-tolerant security solution. For example, if the final solution requires a network security solution, an analysis may begin by evaluating the network architecture diagram in Project: Problem Identification Assignment.

Instructions

Segments of the network must be assessed, such as all local node connections in the LAN (e.g. local processes, local devices, local data storage), as well as other connections to the LAN (e.g. network gateways, WANs, wireless APs, network control resources, network databases, cloud integrations). The environment and architecture must justify the analysis of the coinciding threats. A few of the many network threats you could analyze (but are certainly not limited to) are DDS, session hijacking, parameter modification, server-side includes, addressing errors, message integrity, protocol flaws, reconnaissance, impersonation, wiretapping, malicious active code, connection flooding, man-in-the-middle, spoofing, misdelivery, redirection, and/or other transmission failures. The analysis in the latter example must identify any targets such as confidentiality, integrity, or availability and the coinciding vulnerability such as impersonation, protocol flaw, or misdelivery.

This is just an example given for a network security project and in no way limits the outcomes. The review of literature and detailed analysis of the system or application will determine the primary deliverables. Each requires objective justification for credit.

It is critical to identify the proper targets and vulnerabilities to ensure the final fault tolerant security design includes the appropriate correlated controls. For example, if the target is confidentiality, and the vulnerability is misdelivery, an appropriate control solution to design could be encryption. If the target is availability, and the target is a DNS attack, an appropriate control solution to design could be an intrusion detection system (IDS), access control list, and honeypot.

Current and proper APA formatting is required and must include a title page, proper margins, citations, organization, proper grammar and spelling, and an ending resources page.

At the minimum, this phase of the project must include:

I. Executive summary, introduction, and conclusion

II. Methodology (must be supported by relevant and current research from scholarly, peer-reviewed journals)

a. Approach(es) for the information security analyses and design

i. Organizational security structure

ii. System, computing, network, or application architecture

iii. Security models that will be utilized

b. How the data will be gathered to objectively analyze the solution

i. System evaluation method

c. Limitations of the analysis

i. Security threats and risks inside the scope that need to be addressed

ii. Security threats and risks outside the scope

III. Synthesis review of literature to support analysis decisions

a. Analysis of the proper solution

i. Targets of the attack

ii. Vulnerabilities

iii. Controls

b. Create the appropriate correlated diagrams

c. Detail the results of the analysis

d. NOTE: Required minimum length (8 peer-reviewed sources and at least 7 double-spaced current APA formatted pages) in the grading rubric excludes all systems analysis and design (SAD) diagrams and any other tables and/or graphical elements

IV. Diagram examples in this phase could include but are not limited to:

a. Advanced system and/or network architecture diagrams

b. Use case, activity, class, system sequence, and/or state machine diagrams

c. Fault tree

d. Access control matrix

e. Authentication, traffic, and/or data map

f. Dataflow diagrams (DFD)

g. CPU/Memory/OS buffer, segmenting, address, and/or data bus mappings

h. NOTE: A minimum of 5 diagrams exist that accurately analyze a secure system, network, and/or application solution. Within EACH of the 5 diagrams, a minimum of 10 elements exist that accurately detail analysis of the environment that needs securing (Note, if 10 elements are not necessary in a diagram add diagrams as needed to sufficiently meet this requirement). Each diagram is thoroughly developed based upon existing architecture and/or applications. Each diagram meets the associated technical requirements, programming language, notations, formatting, and modeling rules of the language (e.g. UML), industry standards for the diagram, and/or literature review. Analysis and design diagrams must have an associated industry standard that is widely accepted to be recognized (e.g. UML).

Each diagram must be justified by the literature review. In other words, if the plan secures an object-oriented language such as Java, the Java Virtual Machine must be properly analyzed from the class loader to the applet security manager. Analysis and associated diagrams must parallel the proper notations, formatting, and modeling rules and standards outlined in the prior IT infrastructure and systems analysis and design. These must align with peer-reviewed journal research as well as industry best practices.

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

8 peer-reviewed sources exist (can have overlap from Phase 1 if appropriate) and a minimum of 7 double-spaced, current APA-formatted pages, excluding the SAD diagrams, graphics, tables, or any other non-textual components.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Security Top Proposal

12. 

Propose and defend a topic for your final Text.  Write  450 words or more explaining why this topic is important for your peers to understand. Be focused and specific.  You should do a deep dive into a topic. Do not do a survey. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in format not in bulleted, numbered or other list format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Planning

 Do research on one-or-two large software systems that were implemented successfully and on one-or-two large software systems that failed in their implementation. Write at least a 3-page Word document, double-spaced, detailing each system.

 Your paper should include a number of topic sections. Using the concept of A.D.D.I.E., create a section to discuss the A.-Analysis that went into the system, a section to discuss the D.-Design of the system, a section to discuss the D.-Development of the system, a section to discuss the I.- Implementation of the system (successful or failed) and a section to discuss the E.-Evaluation of the system (successful or failed). Provide the following: 

1. An Introduction paragraph describing the assignment and a short description of the systems selected. 2. A section that describes the first Software System (with an appropriate section Heading) and a description of that Software System to include: 

a. What is its purpose? 

b. What operations it performs? 

c. What are its inputs (resources, interfaces, when used)? 

d. What are its outputs (interfaces, data)? 

e. The system’s complexity/cost/feasibility. 

f. Any constraints or risks found during the research. 

3. Sections with details for each component of A.D.D.I.E. (with an appropriate section Heading) to include: 

a. Success or failures identified. 

b. Issues or findings identified. 

c. Recommendations or lessons learned. 

Your paper should then conclude with a Findings section the compares the two systems. Provide the following: 

1. What made one system successful but make the other system fail. 

2. What could have been done to make the failed system more successful. 

3. What could have been done to make the successful system even more successful. 

You must include at least 3 scholarly references with citations.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Anthropology of Language and Communication

 

For this assignment, you need to do the following:

  • Search and submit reference details for at least four scholarly resources on your language and topic
  • Your references should be in APA format
  • Design and submit a list of tentative interview questions that you would like to ask your relatives or other persons associated with your ancestral language
  • Plan ahead and submit a tentative list of family members you want to interview, as well as a tentative interview schedule
  • For additional information, review the assignment guidelines and requirements in your syllabus

Instructions: 

Use the Worksheet attached to the assignment. In Part I, create a reference list of at least four scholarly sources that you will use in your final project; references should follow APA format (7th edition). In Part II, include your tentative list of questions, relatives you would like to interview, and a tentative interview schedule.

Finding scholarly sources  

For this part of the final project, UMGC library databases, or Google Scholar to locate four scholarly or credible sources on your chosen topic.

What is a scholarly or credible source? You should rely on sources that have credibility. Appropriate sources are articles written by experts in the field, articles found in peer-reviewed journals, published documents from well-known research groups (e.g., Pew Research), and reports published by government agencies (e.g., NIH, CDC). Inappropriate sources would include popular websites (e.g., about.com, ehow.com, Wikipedia) or media outlets (e.g., Fox, MSNBC, Wall Street Journal, New York Times, Forbes, etc.). These sources do not always accurately report their findings and are sometimes prone to bias. If a website or article fails to report the credentials of the author(s) and does not include citations for the information contained in the article, chances are it is not a scholarly source and therefore should not be used. 

Submit a summary of each article using the attached worksheet. In your own words, identify the key findings of the article. Do not simply state what the article was about (e.g., “This article talks about cyberbullying”). What specific information did you learn from your source? (e.g., “Cyberbullying has become a popular means of abuse among teenagers, affecting about half of all young people.”) The purpose of the key findings section is to demonstrate that you have read and understood each of your sources. Your key findings should be 250 words in length. Do not simply copy and paste the abstract or any other part of your source! This is plagiarism and violates university policy. 

The purpose of this assignment is to 1) ensure that you are using appropriate, scholarly sources, and 2) to make sure you are on track for your final project. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organizational Ethical Analysis

  

The organizational analysis will utilize a minimum of five external, peer-reviewed academic sources and contain the following sections:

Organizational Ethical Analysis

This is your introduction. Write 100-150 word introductions to ethical analysis here. 

What is the organization and how would you describe it?

Write 200-250 words minimum with 2-3 paragraphs. Describe your chosen organization, what type of product or service the organization offers. When it was formed and how the organization was started.  

Who are the leaders of the organization? Write 200-250 words minimum with 2-3 paragraphs. Describe leadership at your chosen organization. Address the leadership board or executives at the organization. Discuss the organizational structure and any information regarding change in leadership.  An organizational chart if available can be shown in this section. But you have to analysis the leadership and do not just list bulletins. 

Is the organization successful? Write 200-250 words minimum with 2-3 paragraphs. Describe and discuss if the organization is successful or not successful. Why makes this organization successful or not successful. Critical analysis and thinking from your own perceptive of the organization and its success or failure should be addressed in this section. 

How do you determine whether an organization is ethical or not? Write 200-250 words minimum with 2-3 paragraphs. From your own perspective and point of view discuss how to determine if the organization is ethical or not ethical. Discuss any unethical occurrences such as fraud and failure of leadership here. Use what you have learned so far in class to address how to determine if organization is ethical or not ethical. 

Based on your assessment and research, is the organization ethical? Write 200-250 words minimum with 2-3 paragraphs. Write your assessment if the chosen organization is ethical or not ethical? Use your research and analysis to answer this question. Why do you think that the actions outlined are considered as ethical or not ethical?  

What would you change about the organization to make it better, without sacrificing ethical standards?

Write 200-250 words minimum with 2-3 paragraphs. Address any organizational or leadership changes that you would recommend making the organization ethical or not ethical. Do you think that an ethics department or ethics manager might be needed to oversee ethics at the organization?  Address any and all changes that you think are needed to standardize ethics and enforce ethics at the organization.

Conclusion

Write 100-150 words minimum to summarize your paper and close this organizational ethical analysis.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information -7

 

Submit a paper with two pages of information, in APA format. Include a cover page, an abstract statement, and at least three references.

Include these topic in your paper:

Describe the concept of Business Process Re-engineering (BPR) and discuss how information systems are used in BPR.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Digital Signatures

Analyze the advantages and disadvantages of digital signatures.

500 words with APA format needed along with references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 DB: Data Mining and Business Intelligence

 Your friends John and Pam’s business has been expanding at a very fast pace.  At this phase, they want to broaden their business scope and sell packaged meals at grocery stores and online.  You have mentioned to them the importance of data mining and business intelligence in today’s business, and they have asked you to explain the following:

  • Data mining and online analytical processing and how it applies to their business model.
  • The adoption of business intelligence techniques and their benefits to John and Pam’s organization.

In response to your peers, explain how these concepts are used in today’s marketing. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Asymmetric and symmetric encryption

Analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted 

500 words needed

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now