CYBER SECURITY

 

This week’s discussion topic is Defensive Programming.

Instructions: Research and discuss Defensive Programming and whether or not you would use it when developing procedures, processes, and architectures that guide work execution at the program and/or system level.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

w4

 

Hello Class!

Welcome to Week # 4. This week’s assignment will help you to fulfill the requirements for the fourth-course objective (CO-4)

Assignment Instructions:

Select the PDF attached to this assignment to download and read the Geoff Keston article titled “Developing A Security Communications Plan.”

According to Keston (2013), “A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A good security communications plan will include sending updates and alerts as well as maintaining a repository of documentation. Creating such a repository (or a consolidated document) makes information easier to find, and it helps to link together disparate elements into a unified plan.”

For the purpose of this assignment, you are tasked as the Cybersecurity Director to prepare a Security Communications Plan for execution at the program level. You are to develop a security communications plan for your organization that addresses the handling of all communications related to security. Follow the requirements below:

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Develop a comprehensive security plan that does the following:
    • Identify archiving procedures
    • Establish approval processes for sending communications
    • Describe legal and regulatory requirements
    • Define key terms
    • Define severity levels and message types
    • Using the definitions of severity levels and message types, diagram who receives messages and through what means they receive them (e.g., text messages)
    • The plan will address the concerns of many constituents, including executives, IT staff members, and end users, as well as customers and partners. Each group has somewhat different needs, so it is helpful to structure a plan to protect sensitive information from the entire group and to make targeted information easy for its audience to find.
  4. Reference Section

MISCELLANEOUS:

  1. Your references should not be more than 5 years old
  2. Your assignment is due by Sunday, not later than 11:59 p.m. Eastern time.

CATEGORY

4

3

2

1

Multiplier

Total

Introduction

The introduction clearly states the main topic and previews the structure of the paper.

The introduction clearly states the main topic but only partially previews the structure of the paper.

The introduction states the main topic, but does not preview the structure of the paper.

There is no clear introduction to the main topic or structure of the paper.

X 2.5

Paragraph Construction

All paragraphs include the introductory sentence, explanations or details, and a concluding sentence.

Most paragraphs include introductory sentences, explanations or details, and concluding sentences.

Paragraphs included related information but were typically not constructed well.

The paragraphing structure was not clear, and sentences were not typically related within the paragraphs.

X 2.5

Sequencing

Details are placed in a logical order and correspond to the structure presented in the introduction.

Details are sometimes logically placed but do not correspond to the structure presented in the introduction.

Some details are not in a logical or expected order, distracting the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

X 2.5

Transitions

A variety of thoughtful transitions are used. They clearly show how ideas are connected.

Transitions clearly show how ideas are connected, but there is little variety.

Some transitions work well, but connections between other ideas are fuzzy.

The transitions between ideas are unclear or nonexistent.

X 2.5

Supportive Research

Supporting research studies and/or reports are research-based and accurately reported.

Supporting research studies and/or reports are not accurately reported.

Research studies and/or reports do not support the discussion.

Research studies and/or reports are limited and/or inaccurately reported.

X 2.5

Quality of Information

Information clearly relates to the main topic. It includes several supporting details and/or examples. The paper is in APA format, and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. It provides 1-2 supporting details and/or examples. The paper is not completely in APA format, and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. No details and/or examples are given. The paper is not completely in APA format, and the body of the paper is between 8 and 10 pages.

Information has little or nothing to do with the main topic. The paper is completely in APA format, and the body is between 8 and 10 pages.

X 2.5

Conclusion/

Recommendations

The conclusion effectively summarizes the discussion and provides at least two recommendations for further research.

The conclusion summarizes the paper but provides only one recommendation for further research.

The conclusion partially summarizes the discussion but provides no recommendations.

The conclusion is poorly constructed.

X 2.5

Sources

Citations

References

All sources (information and graphics) are accurately documented in APA. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Two sources are not documented in APA format. If you had a citation in the body of your work, you must have the appropriate reference in the reference section. (Provided at least 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. (Provided less than 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section. Provided less than 5 references)

X 2.5

Mechanics

No grammatical, spelling, or punctuation errors.

One grammatical, spelling, or punctuation error.

Two grammatical, spelling, or punctuation errors.

More than two grammatical, spelling, or punctuation errors.

X 2.5

Timeliness

All late submissions have a 10 point (10%) deduction.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MIT 3

APA FORMAT 300 words Citation and references to support the opinion please do not use any AI Chatgpt or Plagiarism
Watch the video above the link of “Who Owns Your Data / Banking “.  Note how your data is shared among others particularly to market new goods and services to you.  Note the discussion of the “segment of one” analysis?  Were you even aware your data might be analyzing your data like this?

Do you consider this practice to be helpful and useful or do you consider it an invasion of your privacy?  (Note I am asking for your opinion here so there is no right/wrong answer – however please give a reasoned opinion, and if you offer facts to support your opinion make sure to supply your sources.)

Does your bank allow you to “opt-out” of marketing techniques like this?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

601 week 3

APA FORMAT 300 WORDS WITH references and citations 

Requirement 1: Provide a list of technologies that have gone from analog to digital. What was the reasoning behind each conversion?

Requirement 2: What is the basic function of a codec?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC499 week 8 assignment

 

Instructions

Hello Class!

Welcome to Week # 8. This week’s assignment will help you to fulfill the requirements for the 8th course objective (CO-8: Prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives). For this week’s assignment instructions, please see below:

Assignment Instructions:
You are tasked as the Cyber Security Director at your new organization to prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives.

REQUIREMENTS:

  1. 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  2. Cover Page
  3. Background Section
  4. Analysis of current research on the subject matter
  5. Recommendations
  6. Reference Section (a minimum of 5 references)

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook
  2. Your report may focus only on the topic of your choosing – imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.
  3. Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IDS recommendations

 

As a penetration tester and security consultant, you have been engaged by a company to assist them in selecting an Intrusion Detection System (IDS) for their infrastructure. They’re considering installing a signature or anomaly based IDS product. They’ve asked you to provide a concise analysis of the strengths and potential weaknesses of each of the IDS types.

Discuss and explain the strengths and weaknesses of each type of IDS and any considerations they should make in selecting one over the other.

200-250 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

managing conflict

 

The ability to deal with professional conflict is one of those soft skills that is very useful when working in teams. In 3-4 paragraphs, discuss the following:

  • Imagine you are on a team at work, and the Project Manager has asked each of the team members for their input on how the team is working together. What do you hope the other team members will say about you?
  • Suppose one of the team members isn’t contributing very much or providing you with something you need in order to proceed with your part of the project. How might you address the situation? Include a rationale for why you would take that approach.
  • What might you do if you approached the Project Manager about the issue with a teammate and the Project Manager ignored your concerns?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project recommendations

 

For this assignment, you will create a response to the following memo from your Project Manager:

Memo
From: The PM
To: Members of the project team
Attached is the Gantt chart for the project. As you can see, we have a tight schedule. Please review it and comment on your area, as we know the coming project will be challenging. With everyone’s help, though, I’m sure we can pull this off with a minimum of scope creep. I look forward to hearing from you before the meeting on Tuesday.
This project involves moving our current in-house system to a cloud solution. We are not sure yet if we’re going to partner with an outside company to manage the cloud services or if we’re going to just rent space on Google, Amazon, Microsoft, or other cloud services. I’ll expect a recommendation from each of you based on your area of expertise. Do your research and provide me the pros and cons of the option you are recommending. Be sure to share where you got that information, so I can take a look at your reasoning if I have questions. DO NOT just cut and paste what you find, but rather explain the pros and cons in your own words.

 As the cybersecurity expert, what concerns do you have, and which methods will you use to secure the network and the cloud solution? What does the partner service provide, and what will we need to do/know in the company, and what training will be needed for users? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Unit 4 Assignment IT 545 Lab Part 2

 

Purpose

The purpose of the Unit 4 assignment is for you to engage in defining a mitigation strategy for a malware threat being introduced into the system. 

Assignment Instructions

  1. You are a cybersecurity professional employed in a research and development firm working on medical research related to identifying effective treatments for several diseases. It is known that a similar type of research organization was recently hacked by a foreign state agent through the use of malware, and many patents and other intellectual property were stolen. Your CEO and CIO want to be certain that their organization’s systems are protected against this type of attack. They have asked you to perform a high-level risk assessment and provide a risk management approach related to this type of malware attack. Assume the following for the assignment:
    • The organization has an outward facing website that provides information on the research in progress and presents general news of interest to its followers. The web server housing this website is in the organization’s demilitarized zone (DMZ). The DMZ uses a single firewall system. Users can request information by submitting a form.
    • Servers on the internal network houses several databases. One holds all current patent information for patents held by the organization. The second database holds the researchers’ notes and all research project information for projects that are in progress. The patent database is encrypted. There is also a collaboration area where researchers that work together can share notes and ideas. A third database houses employee information. 
    • Also, on the internal network are an email server, print servers, and application servers.
    • The organization does not use any cloud computing. An incremental backup of the servers and databases is made daily and stored in the same building.
    • The organization has biometric identification to the external door and all internal lab rooms and server rooms. There are no security cameras. 
  2. Use the following risk management approach to determine where compromises may exist, what the consequences of those compromises are, and controls and methods to reduce the likelihood of or severity of the compromise. Identify at least two vulnerabilities, threats, and risks. Recommend what you think is the best control for each vulnerability, threat, and risk identified.

Assignment Requirements

The paper should be at least 3 pages, use 12 pt. Times New Roman, and be in APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Unit 4 Assignment IT 550

 

Purpose

This assignment introduces you to some of the methodologies used in computer forensic investigations along with legal constraints to work within these investigations. It also introduces some of the formal approaches to finding out more about a given investigation. You will work with a case to review the incident, handling of evidence, and legal restrictions typically found in such cases.

Instructions and Requirements

Assignment Instructions

A large commercial corporation has witnessed a security breach of the network and has found one laptop on the scene belonging to someone known to have the expertise for launching large-scale cyber-attacks against secure networks. The laptop and its data provide you with sources of physical and digital forensics evidence. Since the laptop was connected to the network, any communications involving the laptop could also provide you with some additional digital evidence.

This commercial corporation’s Point of Contact (POC) has requested your computer forensics team provide investigative expertise in this matter in multiple areas. In the preliminary investigative discussion, your POC for the cybercrime case would like your team to disclose, in your forensics plan, how you will approach the incident review and include the identification of any collection requirements for seizing, preserving, and authenticating the evidence. You will provide the POC with the known facts of the incident and what procedures were used during the initial case reviews.

Assignment Requirements

The expected length of the report is 8–10 pages or 2,000–2,500 words. Your submission should include the following in a Word document:

  • A title page

A report that includes the following:

  • An effective introduction.
  • The use of APA citations throughout the main body of the paper for all technical assertions.
  • How you will approach the incident review, including the identification of any collection requirements for acquiring and authenticating the evidence.
  • How your team will approach any legal restrictions and the determination of intent and scope.
  • The known facts of the incident and what procedures were used during the initial case reviews.
  • A conclusion allowing the reader to reach a high level of understanding of all the major topics presented.
  • A reference page in APA format.

Submission

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor’s discretion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now