Pr4

 

  1. Describe the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
  2. Discuss how group and organizational dynamics may affect the success of your information assurance change initiative.
  3. Evaluate the leadership style needed to successfully implement your information assurance change initiative.
  4. Describe your change strategy and the potential resistance factors to be managed.
  5. Describe the change model most appropriate for your information assurance change initiative.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

mod6

 

Module 06 Content

  1. XYZ Technologies had a DDoS (Distributed Denial of Service) attack to their environment yesterday. Your deliverable will include reviewing the incident details document and create a RCA (Root Cause Analysis) report based on this incident. Review the details of the incident below:
    Incident Details: DDoS (Distributed Denial of Service) Attack
    At 2:26 CST the internet facing firewalls peaked at 100% CPU load. This load level caused any additional connection to be lost, giving the appearance that the corporate website and connectivity to the other IoT devices supported by this site to lose connectivity. Initial investigation of the log data showed 1.25 million syn requests by the following external IP addresses:
    1.169.228.122, 5.254.97.84, 27.254.56.45, 37.48.80.165, 37.186.206.134, 41.32.37.226, 42.61.188.34, 103.213.45.145, 111.91.82.161, 151.233.52.209, 168.187.104.130, 186.167.1.54, 190.205.33.163, 213.184.112.102, 217.219.150.126
    In the first 8 minutes, the following remediation techniques were used:

    • The addition of attacking IP addresses to a global block list. Result, a new attacking IP appears with the same number of syn requests.
    • When the website is disabled, the syn requests drop to zero.
    • When the website is brought up in a new location, the syn requests return, and bring down the protecting firewall.
    • Remediation:
      After 8 minutes of complete down-time, a decision was made to disable the site in IIS until an appropriate solution could be implemented.
      At 23 minutes, a recommendation was made to the support team to offload the syn requests to a cloud-based firewall, called incapsula.
      At 42 minutes Incapsula implemented solution with a 30-day free trial.
    • Setup of Incapsula Tool
    • Configuration of primary website within Incapsula
    • Configuration of DNS from original location to Incapsula
    • At 45 minutes the website was returned to functional status, by re-enabling the site in IIS.
      Future State:
      XYZ currently has only 2 websites with public facing addresses. These two sites will be protected by the incapsula tool to offload any future DDoS attempts.
  2. Root Cause Analysis (RCA) Report
    After reviewing the incident above, create a RCA (Root Cause Analysis) report based on this incident. While your report is a technical document, rich in detail, it is your role as the cybersecurity professional to tailor this RCA to meet the expectations of the target audience of non-technical, executive leadership, and customers. Please be sure to address the following:

    • A breakdown of the incident details (Areas Affected, Dates, and Times).
    • Information on the root cause of the incident.
    • Specifics of how the incident was resolved, or if additional steps need to be taken to fully resolve the incident.
    • Preventative measures for future incidents.
    • Be sure to tailor this RCA so that it is rich in detail but does not rely on technical language to meet the expectations of the target audience of non-technical, executive leadership, and customers.
    • Your report should use professional tone and vocabulary, APA format, and proper spelling and grammar.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extensions to the filenames.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

digital surveillance

 

Module 06 Content

  1. For your written assignment for this week, write a 2-3 page paper about the ways an individual might be tracked by digital veillance on an average day:
    • Discuss what devices might be used
    • What data might be collected and to what extent can a person reject or resist digital veillance?
    • Make sure to use APA formatting and proper references.
      Submit your completed assignment to the drop box below. Please check the Course Calendar for specific due dates.
      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CMGTCB/554: It Infrastructure Assessment

  

After the CEO reviewed your recommendation, he asked you to review the business application, the ERP system, and provide a system management plan. This plan provides the executive team with the details of a new or upgraded system implementation and helps to decide if it’s a viable solution for the business. A plan of this nature is typically 4 to 5 pages in length with charts when appropriate.

Develop a system management plan for a new enterprise system for International Plastics, Inc. 

Ensure you:

• Incorporate an ERP, CRM, Supply Chain Management (SCM), and data management into the International Plastics’ IT infrastructure. (Incorporate an ERP, CRM, Supply Chain Management (SCM), and data management into the International Plastics’ IT infrastructure)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Forensics – Assignment

   

download the .ova file. download and install the virtual box tool.

open virtual box and import the ova file .

In this assignment you will work on the first steps of seizing and imaging an evidence disk. And create a well-organized report that has documentation with Text and Pictures about your work. 

Objectives:

– Learning how to seize a digital evidence found on the scene of the incident

– Being aware of the Dos and Don’ts when handling the evidence

– Filling the chain of custody and Learning its importance.

– Identifying the tools, both hardware and software, required for imaging the evidence data

– Preforming the imaging process which can be cloning or just imaging

– Validating the created image of evidence data

Context: [Fictional]

Scenario: The XYZ security team received a notification that suspicious cyber activity is taking place in Wilson Building. Surveillance cameras showed that a person, who could be the suspect, was seen in room Wilson 106 and then he left. When the team arrived at the scene, they only found a USB drive that could have been used in implementing the suspicious activity. They decided to seize it so they can perform the needed analysis to identify its content. 

Scene Location: Wilson 106 

· [For pictures, you can use your own place if you cannot access Wilson 106] 

Evidence: A USB drive 

· [a please have/use your own USB blank flash drive for this work. For faster performance you can use 8GB or less drives. Also, you can use SAU machines in case your machine is not powerful enough.]

Please follow all the steps/guidelines/phases below, as much as possible, however points in green only will be considered while grading.

· Will a warrant be needed in this case? Justify your answer and Add legal references [ 5 pts]

[Based on: Scientific Working Group on Digital Evidence.]

· General Instructions: [Seizing the Evidence] 

1- Ensure the safety of all individuals at the scene. [X]

2- Protect the integrity of evidence. [X]

3- Evaluate the scene and formulate a search plan. [X]

4- Identify potential evidence. [The USB drive given to you]

5- All potential evidence should be secured, documented, and photographed. [ 5 pts ]

a. For this assignment No need to secure; just document and photograph.

i. In the report, the caption for photos/figures is required.

6- Conduct interviews. [X]

7- Any item to be removed from the scene should be properly packaged and secured. [X]

 

· For Removable Drives: 

1- Document in writing the location and condition of all removable media [ 2 pts]

a. For this assignment: The only the USB drive.

2- Remove any connected external media (e.g. external drives or thumb drives) after the computer has been powered down. [X]

 

· Creating the image: 

1- Document the tools you plan to use. [ 5 pts ]

a. For this assignment: 

i. Hardware [X]

1. Tableau Forensic USB 3.0 Bridge

2. T8u: 

a. Firmware:1.5.0.1, Date: 10/31/2016 , Time: 11:47:27

b. Serial: 000ecc13 0008415f

ii. Software.

2- List clearly the steps/work plan for creating the disk image. [ 3 pts ]

3- Use snapshots for each step while creating the disk image using the Parrot Security Linux distribution. [10 pts]

a. Using hashing, Verifying the disk and the image are important [5 pts]

4- Use the Chain-Of-Custody (COC) document to describe the item and fill required information. [ 5 pts]

a. Assume that the evidence was released to another person on the team, and fill the necessary information.

Notes: 

· Deliver The above work in a very well formatted and organized report that you will submit, in PDF format. [5 pts]

o Poorly formatted report will badly affect your grade regardless of the accuracy of your work, i.e. > 50% of the grade.

§ Have to have: Title Page, TOC, Pictures with Captions, Divide text into Sections…etc. 

· The COC document should be the last page of the report.

EVIDENCE CHAIN OF CUSTODY TRACKING FORM

Case Number: ________________________ Offense: ______________________________

Submitting Officer: (Name/ID#) _______________________________________________

Victim: ______________________________________________________________________

Suspect: _____________________________________________________________________

Date/Time Seized: __________________Location of Seizure: ______________________

  

Description of   Evidence

 

Item   #

Quantity

Description of Item (Model, Serial #, Condition, Marks, Scratches) 

 

 

 

 

 

 

 

 

 

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

APD_Form_#PE003_v.1 (12/2012) Page 1 of 2 pages (See back)

EVIDENCE CHAIN-OF-CUSTODY TRACKING FORM
(Continued)

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

 

 

  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

unit 3 submission link

 

In this literary response, you will find a famous work of art, write a researched history of the artist and the artwork, and create a Descriptive Poem that uses imagery to describe the artwork and your reaction to it.

This assignment focuses on your ability to: research academic and reliable sources; translate the information from those sources into a cohesive piece of writing; respond creatively to artwork.

The purpose of completing this assignment is: as a student and a career professional, and individual, you will often be required to research information that will further a school assignment, a work-related project, or a personal endeavor. Also, you might be asked to translate research into a written or oral presentation that you can share with coworkers and peers in a way that will describe, persuade, or evoke emotion. This assignment has all of these skills!

Please be sure to read the assignment page and rubric for complete criteria and requirements. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mock Dissertation Chapter One Introduction

Topic:

 Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning

There is a connection between chapter three and chapter one. Therefore, as an extension of our week in the mock chapter three from last week, we will write a mock chapter one. This assignment will help determine your readiness to write a full-length chapter one.

Directions:

Develop a 2 page (more is fine) mock chapter one to include the following expectations from the university:

Overview (1-2 well developed paragraphs)

Background and problem statement (1-2 well developed paragraphs)

Purpose of the study (1 well developed paragraph)

Significance of the study (1 well developed paragraph)

Research Questions (numbered list)

Limitations of the Study (1 short paragraph)

Assumptions (1 short paragraph)

Definitions (list)

Summary (1 well developed paragraph)

References needed

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

misleading graphs discussion board post

Discuss why the graph is misleading. Go beyond simply repeating the information found on the website.  Discuss the following:

What about the graph makes it misleading? How could you make the graph more accurate?

Does the source of the graph have any impact on the interpretation of the data?

Your answers need to include your interpretation of the material that you have watched and read along with your personal experiences.  It is okay to use outside sources—if you do, list the author’s name and the article’s title at the bottom of your post.  Please use complete paragraphs in your posts. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hacking

Research security-related matters affecting the common good and write a 500-750 word document reflecting “Hacking” and the impact current technologies and practices have on society’s ability to justly and humanely address associated concerns.

You must use APA style to include cover sheet, abstract, text, and references. You must cite at least three sources, with a minimum of two from refereed or edited publications.

Explore the ethical dimensions and dilemmas associated with “Hacking”, and reflect on how your experiences have shaped your perspective. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT348 week5

The articles [links] below demonstrate the need to have a sustainable IoT infrastructure. One tool used to analyze feasibility and sustainability is calculating the ROI. First, read and then summarize the articles. Note: Cite the authors of the papers.

https://cdn.inst-fs-iad-prod.inscloudgate.net/2588d2c5-4ca7-450e-82d1-3f7c3a620979/Calculating_the_ROI_Of_IoT.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii8yNTg4ZDJjNS00Y2E3LTQ1MGUtODJkMS0zZjdjM2E2MjA5NzkvQ2FsY3VsYXRpbmdfdGhlX1JPSV9PZl9Jb1QucGRmIiwidGVuYW50IjoiY2FudmFzIiwidXNlcl9pZCI6bnVsbCwiaWF0IjoxNjQ0NTAzOTQ3LCJleHAiOjE2NDQ1OTAzNDd9.nNFWOiCIwLScaUvKv5uOopDeXNI5kmucAuMXRmp-Xe53PCxsDTvcNt-fxx_VCztFxRoMrlRBMKcYuyDKQWfkJw&download=1&content_type=application%2Fpdf

https://cdn.inst-fs-iad-prod.inscloudgate.net/6e16dcb7-b2d3-441c-b67b-46b5a9804ce3/ROI_of_IoT.pdf?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii82ZTE2ZGNiNy1iMmQzLTQ0MWMtYjY3Yi00NmI1YTk4MDRjZTMvUk9JX29mX0lvVC5wZGYiLCJ0ZW5hbnQiOiJjYW52YXMiLCJ1c2VyX2lkIjpudWxsLCJpYXQiOjE2NDQ0ODM4MTcsImV4cCI6MTY0NDU3MDIxN30.aiaOAZqRDDx6tbR-kgEHdswSRDDQokG7WrYYgvz_3XY3KXLyiMzhx3aQEjq3nPFl4V-XuELqzewz1SwDZ6E7Qg&download=1&content_type=application%2Fpdf


Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now