Disaster Recovery for Cyber Security

Individual Assignment.

Both Deliverables: Post in Discussion Board.

(1) Prepare a list of four (4) Back-up and Disaster Recovery vendors.

Vendors: https://solutionsreview.com/backup-disaster-recovery/backup-and-disaster-recovery-solutions-directory/

Provide a brief description of their services.

Create a grid of them and compare and contrast them. 

(2) Disaster Recovery – AWS Outage 

Disaster Recovery Preparedness

At 9:45 AM (PST) on February 28, 2017, Amazon reported a severe degradation with Amazon Web Services (AWS). Many companies and organizations rely on AWS for their infrastructure. As a result, the incident created a highly-deprecated experience for customers. 

Many companies engineering teams worked through this outage and restored services using an alternate site. 

Companies are continuously enhancing/improving their back-up and disaster recovery readiness. Organizations learned from this incident to mitigate the risks associated with large scale outages from their service providers.

Using Internet resources, research and answer the following questions using MS Word/PDF:  

1. When did the AWS outage start and how long did it last?

2. What was the root-cause of the outage?

3. About how many sites were effected and what are some names of the larger companies?

4. When was the last time AWS was down prior to this incident and what was the root-cause?

5. Has AWS been down since this incident? If so, when, for how long, and what was the root-cause of the outage?

6. What can AWS do to prevent an outage again?

7. Briefly describe the AWS Shared Responsibility Model

8. What can a customer of AWS do to continue uninterrupted computer operations?

9. See this link on Barracuda Security for AWS: https://www.barracuda.com/programs/aws

If you were a customer of AWS, would you consider implementing Barracuda Security for AWS? What security features and why?

10. Prepare a high-level diagram of the AWS infrastructure and pinpoint in the diagram where the root-cause of the security vulnerability occurred.

Grading – 15 Points broken down as follows:

– 5 Points – The details in Deliverable 1

– 10 Points –  The details in Deliverable 2

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Vulnerability Process and Assessment Memorandum

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Remediation:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Measuring Progress and Requirements

 

Measuring progress and requirements in a project can be completed through performance testing. As you review the results, it leads to ways to maintain the project progress. In this week’s assignment you will develop requirements that need measurable results through performance testing. Review the scenario and complete the activity below.

The Recreation and Wellness Intranet Project team is working hard to ensure that the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows that the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.

Complete the following in a Microsoft Word document.

Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case.

Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.

Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials.

Submit your assignment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Automated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code.

 

For this assignment, My task is to scan the WebGoat source code using the VCG SAST tool and verify the findings within the code. In particular, you will be be using VisualCodeGrepper, which is an open-source SAST tool running on Windows. It supports multiple programming languages(C++, C#, VB, PHP, Java, and PL/SQL).

. Prepare a simple report based on OWASP Findings Report Guide, and submit the report in a PDF format   There should be a section summarizing all the findings by:

  1. Risk level
  2. OWASP Top 10 Threats

To install VCG and run your scans, follow these instructions:

  1. Download WebGoat 8.0 from GitHub in a zip format.
  2. Extract the zip file into a directory.
  3. Download VCG from the project page.
  4. Install VCG on a Windows machine. Consider the system requirements on the project page.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security measures

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity Diagram

Create an activity diagram of the Request For Proposal (RFP)/Proposal interaction between a potential customer and Acme Electric, LLC (Acme).

You are an analyst tasked to create an activity diagram in the analysis phase of an object-oriented analysis and design project. What follows is the interaction between a potential customer and Acme. The activity starts when the potential customer creates and sends an RFP. This activity ends when the potential customer either accepts or rejects Acme’s Proposal and possibly informs Acme of the decision.

You are NOT documenting a system, you are creating an activity diagram for a business process. The business process that you will model using an activity diagram is as follows:

A potential customer (Customer) creates and sends to the owner of Acme (Owner) a Request For Proposal (RFP) which includes an Electrical Drawing (ED) for the proposed work. An ED is an architecture blueprint which only includes the electrical portion of the work.

Owner studies the ED and RFP for the following:

  • Amount and types of electrical materials required
  • Amount and types of special equipment that may be required
  • Amount of labor that may be required
  • Specific dates Customer may have asked for the project to occur
  • Any other information that Customer may have included in the RFP

Owner sends to his supply person (Supply) a:

  • Bill of Materials (BOM)
  • special equipment list

For both lists, Supply enters the wholesale price and availability of each item. The gathering of data for each list is not dependent on the other for completion and return. Supply obtains the information for the BOM either from stock on-hand or electrical supply vendors, completes the form, and returns the BOM to the Owner. Supply obtains the special equipment information from equipment vendors, completes the form, and returns the special equipment list to Owner.

Owner checks his crews’ calendars for availability during the time period that the customer has requested.

After Owner has gathered all the information, Owner decides on a proposal price. Owner prepares a proposal and sends it to Customer.

If Customer likes the proposal, they sign it and return it to Owner. If Customer does not like the proposal, they either ignore it or inform the owner of the decision.

– UML state/activity

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Application Assignment: Blogs and Defamation

As an avid user of online social media, you identify a very untrue blog written by an anonymous writer. The blog contains many horrible accusations that are unfounded and untrue. After identifying this blog, you feel violated and confused. What steps can you take to have the blog removed? What defamation charges can be filed against the creator of the blog? 

Three Required Headers:

Blog Scenario

Procedure

Defamation Charges 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Apply: Systems Requirements Presentation

 

Assignment Content

  1. Imagine this scenario: After considering their 3 target markets, Pine Valley Furniture’s board of directors has selected the student furniture project for the WebStore. They are asking you to help them choose a method for determining the requirements. 

    Create a 12- to 18-slide presentation in which you:

    • Compare traditional, contemporary, radical, and agile methodologies for requirements gathering.
    • Outline advantages and disadvantages in your comparison.
    • Recommend the methodology you think will work best for Pine Valley Furniture’s student furniture WebStore.
    • Explain the figure below. It used to be “Figure 7-22: Level-0 DFD for the WebStore” of Ch.7, “Structuring System Process Requirements” from Modern Systems Analysis and Design. 
    • Figure 7-22: Level-0 DFD for WebStore

      Include detailed speaker notes.

      Consider incorporating multimedia and images where appropriate.

      Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Submit your assignment.

      Resources

    • Center for Writing Excellence
    • Reference and Citation Generator
    • Grammar and Writing Guides
    • The Rubric Template shows how the paper will be graded:

      Week3_IA_Rubric_template.docx

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Technology Entrepreneurship

Que 1:

Discuss the advantage of acquiring and maintaining intellectual property rights

Que 2:

Discuss this statement: “How do you know if the company is progressing or not?” What separates “vanity metrics” and real, actionable metrics.

Que 3: 

Discuss this statement: “With the rapid advances in science, growing market opportunities in convergent technology marketplaces and sustained levels of public and private investment in research and development means there are ample opportunities for technology-based entrepreneurs”. Discuss the opportunities for technology-based entrepreneurs.

NOTE:  My assignment will need actual references from EBSCO, Google scholar, or Semantic Scholar with a website link at the end 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please write a 1000 words essay on the following and refer to the four attachmnets provided. 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now