Final Security Plan

https://www.homeworkmarket.com/files/nist800-171securitycontrols-xlsx

https://www.homeworkmarket.com/files/cybersecurityplan-edited2-docx

  

· Provide 30 controls (of your choice) from the NIST 800-171 Security Controls documentation. Each one will be to cover all three of the above systems or, if a control is specific to one of the three notate that in the control writeup. Copy and paste the below to provide all 30 controls.

NIST 800-171 Control Number: 

Control Family: 

NIST 800-53 Mapping: 

Relevant 20 Critical Control:  

Control Summary: 

Implementation Status: 

Immediate Action Plan (6 months): 

Action Plan (12-24 months): 

Long Range Action Plan (3-5 years): 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Appcelerator Titanium

Appcelerator Titanium was released in December 2008, and has been steadily growing in functionality since its release. Starting with its Titanium Developer product, Appcelerator provides a single-point interface to run applications. Titanium Studio is a full-featured IDE which provides a single place to handle all steps of the development environment including a debugging solution.  Titanium is not a magic bullet; however, it does include a solid framework for developing a single codebase to deploy to multiple platforms.  In addition, it allows developers to use a language they are more familiar with to create apps in a domain outside of their knowledge.

  • What are some advantages to using Appcelerator Titanium?
  • Though Appcelerator is reasonably priced, why do some mobile app developers feel that the bugs don’t make it worth the effort?.
  • How is Appcelerator different from other mobile application developerment?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project

 

This is the first of a series of five sequential assignments (the course project) in which you will act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design. A venture capital group has funded this innovative start-up.

The CEO has given you 60 days to deliver an information technology project plan in anticipation of the company relocating to a new facility. Since this is a start-up company, currently no building or technology infrastructure exists to support the business. All information technology (hardware and software) must be implemented in a hosted solution, an on-site solution, or a hybrid model. The CEO expects you to integrate different technologies from a variety of partners and incorporate industry best practices to develop the company’s technological systems.

Additional background on the hypothetical companyCompany InformationCurrent StatusGrowth Projections (over next two years)Facility TypeNew facility is a two-story standalone building–Number of Employees1030Revenue$5 million$30 million

This assignment consists of two parts:

Part 1: Project Plan Inception

You will write a 5–7-page document outlining the project specifics, such as company background information, company business, and an overview of the company’s information systems infrastructure.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Architecture

 Assessment Description

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

  1. Identify all types of data and sensitive data the organization will store.
  2. Define where that information is stored.
  3. Record all hardware and software devices in your network.
  4. Describe how the security controls are positioned and how they relate to the overall systems architecture.
  5. Define security attacks, mechanisms, and services, and the relationships between these categories.
  6. Specify when and where to apply security controls.
  7. Present in-depth security control specifications.
  8. Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.
  9. Include the full scope of policy, procedural, and technical responsibilities.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Design

 Assessment Description

The System Design Document (SDD) describes the high-level system design and the low-level detailed design specifications from which a system is built. As part of the security development team, this document provides the information necessary in designing and implementing a system.

Create a system design document making sure to:

  1. Describe the design goals and considerations.
  2. Provide a high-level overview of the system architecture.
  3. Describe the data design associated with the system.
  4. Describe the human-machine interface and operational scenarios.
  5. Design a drawing appropriate for implementation. The high-level system design should be further decomposed into low-level detailed design specifications for each system component, including hardware, internal communications, software, system integrity controls, and external interfaces.

Refer to the “System Design Document,” provided within the required readings as an example. Note: Only the criteria listed above is required within the System Design Document; additional sections are not required.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 System Design Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

how the course is applied in workplace

 

What was your Main term course? Reflect on the connection between knowledge or concepts from this courses and how those have been or could be applied in the work place. 

Include the following: Course Name, Course ID, and a 300 word description of how knowledge and skills obtained in this course were applied in your current position or an employment opportunity in your field of study. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Architecture and Design Executive Program Practical Connection Assignment

  

Executive Program Practical Connection Assignment

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Security Architecture and Design course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

LEED Certification assessment

Topic: Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area or work location. Remember to get permission from security. If you wish you may approach the subject in terms of Best Practices. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Architecture and Design Individual Assignment 5

Individual Assignment 5 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. Report due by Saturday.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risks associated with web servers Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

The Apache web server is an open source web server that was created in 1995. With very little configuration Apache is able to handle large amounts of traffic and because of open source there are developers continuously working on updates and better functionality. Apache can also be used on multi-platforms. Apache is able to accept and route traffic to certain ports. By default it will run on port 80, but with specific address-port combinations it is able to route ports. Ways to make Apache more secure are through some of the following ways. Disabling the trace HTTP request. By default this is enabled and allow cross-site tracing that could potentially expose your cookie information. Disabling the directory listing will prevent access to the files and sub-directories within the browser. Tools that can be used to secure your Apache server are mod security that is an open source web application first this will provide you with several features designed to protect the server.  

The Microsoft Internet Information Server (IIS) has been in service since Windows Server 2003 and only operates on the Windows operating system. Like Apache you are able to route traffic to other ports. IIS benefits from being popular due to its platform that supports all the Microsoft applications. Some of the features of IIS are Remote management that allows the management of the program via command line interface or union PowerShell. IIS also comes with security features that allows users to manage TLS certificates and allows the user to filter requests that will allow for the traffic of whitelists and blacklists. These are tools that will assist in securing IIS. Disable the OPTIONS Method. The OPTIONS method gives a list of the methods supported by a web server and disabling this ensures that potential attackers won’t be able to access the information. Enable Dynamic IP address restrictions will block access to IP address that go over a certain amount of requests. This can prevent denial of service attacks. 

Reference 

(February 20, 2020). Ultimate guide IIS server: What is IIS? IIS tutorial. DNS stuff. Retrieved from https://www.dnsstuff.com/windows-iis-server-tools

Acunetix (November 5, 2014). Microsoft IIS – 8 Tips for security best practices. Acunetix. Retrieved from https://www.acunetix.com/blog/articles/iis-security-best-practices/

Hernandez, J. (May 8, 2019). What is Apache? In-depth overview of Apache Web Server. Sumo Logic. Retrieved from https://www.sumologic.com/blog/apache-web-server-introduction/

Kumar, C. (June 6, 2019). Apache web server hardening and security guide. Geekflare. Retrieved from https://geekflare.com/apache-web-server-hardening-security/

– VINCENT

RESPONSE 2:

Security on an Apache webserver is only as good based on its configurations.  Along with proper security configuration, it’s important to keep Apache updated with the latest security patches as they become available.  The following are some configuration changes in securing an Apache server:

Securing an Apache webserver should be configured to use only what is required for functionality. Configure on the module required to run functionality and restrict other unnecessary services.  

Run as an unprivileged user:  this refers to locking down the Apache server with minimal permission than necessary.  This would require to set the server as an unprivileged systems user versus root or admin user.

Disabling server-info directive, server signature and server-status Directive to prevent the exposure of server information, such as version, paths, data directories, server performance, HTTP requests and client IPs. 

Setting the ServerToken directive to Prod will direct Apache to a specified name, like Apache in the server response header. This prevent the server from sending server information out when responding to a request.

OpenSSL is one tool I ran into when researching Apache security.  Because Apache does not come with encryption, running OpenSSL with it can provide traffic encryption and public/private key pairs to force all traffic over SSL protocol.

A Microsoft IIS server has similar security configuration recommendations as the Apache.  These include:

Installing and properly configuring only the necessary modules required for functionality and implementing the least privileged rule. As well as enabling Window authentication with extended protection to protect against credential relaying and phishing attacks.

Maintaining an up-to-date anti-virus and security patches.  Also enabling SSL and SSL certificates.     

Web application isolation includes isolating web application pools, ASP.Net temp folders and content and ensure access controls list are configured to allow access as per set permissions.

Claudia 

Acunetix. (2021, March 12). 10 tips for apache security. Retrieved August 03, 2021, from https://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/

The most important steps to take to make an Apache server more secure. (n.d.). Retrieved August 03, 2021, from https://help.dreamhost.com/hc/en-us/articles/226327268-The-most-important-steps-to-take-to-make-an-Apache-server-more-secure

Archiveddocs. (n.d.). Security best practices for iis 8. Retrieved August 03, 2021, from https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj635855(v=ws.11)

– CLAUDIA

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now