Unit 9 IT595

 

Report your evidence to support that the milestone was completed.

Submit a 2-page status report that includes recommendations for stakeholders pertaining to cybersecurity theories and frameworks for managing risks, threats, or vulnerabilities. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel, Word, or Project, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.

Assignment Requirements

You should follow current APA format.

For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

MILESTONE:

  

Milestone 4: Describe in Detail

The last stage is assessing the deployed system’s success and fine-tuning the system based on the actual information gathered from the field and consumers. Specific indicators, such as the depreciation of the attempts made by unauthorized personnel and the time required to identify and tackle threats, will be thoroughly monitored through continuous monitoring tools. Such training sessions will be necessary to introduce employees to the new system and to stress security problems and precautions. So, creating and submitting the comprehensive project report is an integral part of the project to describe the results and recommendations for further improvement. This project’s last step leaves the organization ready to protect itself from increased threats with time.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

INFO22

 

  • What is meant by the term ‘client-server architecture’ and what are the advantages of this approach?
  • Compare the client-server architecture with two other architectures. Include a description of the 3 service models defined by NIST.
    • Which cloud computing benefit do you feel is the most important and why?
    • Which cloud computing risk do you feel is the most important and why?
  • Describe the DBMS MS Access
    • How is MS Access used in contrast to SQLite?
    • What are the primary uses of MS Access?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 10 IT595

  

Unit Outcomes:

  • Develop a project presentation that synthesizes an effective and ethical cybersecurity solution.
  • Describe your decision analysis for your project.

Course Outcome:

IT595-4: Decision Analysis: Analyze data using accepted best practices for the purpose of synthesizing an effective and ethical cybersecurity solution.

Purpose

You are almost done! It is time to present your project to the stakeholders. Imagine you are standing right in front of them. You will put together a PowerPoint presentation that includes your audio narration. Remember, good communication skills are important for professional success and especially in cybersecurity. Good luck!

Assignment Instructions

Develop a project presentation to stakeholders.

Imagine your project has been completed and it is time to present a summary of it to the project stakeholders. You will prepare a professional PowerPoint presentation. If you want to use another presentation tool, please consult your instructor.

The presentation will also contain audio narration for each slide and a script for the narration in the notes section of the slide. The presentation should contain at least 25 SLIDES covering the purpose of the project, detailed descriptions of each milestone, your decision analysis throughout the project, industry best practices used, and finally why you think your solution is effective and ethical.

The rubric will provide further instructions on specific requirements for the assignment.

Assignment Requirements

You should follow current APA format, if appropriate.

PLEASE USE ATTACHED FOR THE INFORMATION FOR THE MILESTONES. 25 SLIDES MINIUMUM! AND A TRANSCRIPT FOR EACH SLIDE

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Developing Information Security Policies

 

Before you start:

Attention should be focused when writing policies to make sure that they are effective and do not conflict.  In order to make sure that your policies are effective, keep in mind the following secure design principles:

Mandatory Reading:
Read The Security Principles of Saltzer and Schroeder (link) blog for a greater understanding.

 

Project Overview

This project includes the following tasks:

  1. Review and prioritize scenario audit observations
  2. Develop an information security policy and related procedure
  3. Develop an implementation and dissemination plan
Objective: Developing Information Security Policies

A security policy is the document developed by an organization that formally states how it plans to protect its information and information systems. Organizations should treat a security policy as a “living document.” This means that the organization continuously reviews and updates the document as technology and employee requirements change.

Organizations use several documents to support its policy infrastructure. In this project, you will be developing the following documents:

  • An Information Security Policy
  • A procedure to support the policy

An effective security policy references the standards and guidelines that exist within an organization. An information security policy contains high-level statements with the intent of protecting information and assets. It is the responsibility of senior management to develop security policies.

Standards are mandatory controls that enforce and support the information security policy. Standards are a collection of properties or rules that an organization formally adopts and recognizes. There are many standards organizations in the information technology field including IEEE, EIA/TIA, NIST and ISO.

Guidelines are recommended, non-mandatory controls that support standards and provide a foundation for the development of best practices.

Procedures are the systematic instructions used by employees within the organization that explain how to implement the controls defined in the policies, standards, and guidelines.

For example, a password policy states the standard for creating strong passwords and protecting passwords. A password construction guideline defines how to create a strong password and provides best practices recommendations. The password procedure provides the instructions on how to implement the strong password requirement. Organizations do not update policies as frequently as they update procedures within the information security policy framework.

Supplemental Materials
  1. Information Security Policy — A Development Guide (link)
  2. Technical Writing for IT Security Policies in Five Easy Steps (link)
Website Links
  1. Information Security Policy Template (link)
  2. Security Awareness Planning Toolkit (link)
  3. https://youtu.be/ZlKgMUOpMf8

 

Project Scenario

ACME Healthcare is a healthcare company that runs over 25 medical facilities including patient care, diagnostics, outpatient care and emergency care. The organization has experienced several data breaches over the last five years. These data breaches have cost the organization financially and damaged its reputation.

The executive leadership team recently hired a new Chief Information Security Officer (CISO). The new CISO has brought in one of the top cybersecurity penetration teams to perform a full security audit on the entire organization. This independent contractor conducted the audit, and found the following vulnerabilities:

  1. Several accounts were identified for employees that are no longer employed by ACME.
  2. Several user accounts allowed unauthorized and escalated privileges and accessed systems and information without formal authorization.
  3. Several devices and systems allowed unsecure remote access.
  4. Forty percent of all organization passwords audited were cracked within 6 hours.
  5. Password expiration was not standardized.
  6. Sensitive files were found unencrypted on user systems and laptops.
  7. Several wireless hotspots used WEP for encryption and authentication.
  8. Evidence indicates that sensitive e-mail was sent unencrypted to and from employee homes and mobile devices.
  9. Intrusion detection logs were infrequently reviewed and analyzed.
  10. Systems with sensitive company data were used by employees for private use.
  11. Employee systems were left unattended and employees failed to logout of the company network and data systems.
  12. Inconsistent system updates and configurations were performed.
  13. Several firewall rules were set to permit all traffic unless specifically denied.
  14. Company servers were not updated with the latest patches.
  15. Intranet web server allowed users to change personal information about themselves, including contact information (address, phone number, etc.).

 

Policies, Procedures, and Guidelines: Overview the Scenario

  1. Read over the scenario given above. Watch the Information Security Policy (video) . Differentiate the various levels and types of policies. (describe at least 2 types and 2 levels of policies)  Make sure you cite your sources.

 

Policies, Procedures, and Guidelines: Review and Prioritize Audit Findings

  1. Review the security audit findings from the Project Scenario above.
  2. Research the types of vulnerabilities listed and determine which pose the greatest threat.
  3. Based on your research, select the top five security audit findings that ACME should address.
  4. Create a Vulnerabilities Ranking Table, like shown below, and record your rankings in a table which lists the a) Vulnerabilities, b) the Recommended Policy to mitigate this vulnerability, and c) your Justification.
  5. Remember to cite your justifications using footnotes.

Example: SS IN FILES BELOW Labeled Example 1

 RUBRIC:

Security audit findings

Find the top five starting with the greatest vulnerability.

Maximum score

8

Recommended Policies

Identify policies for top five vulnerabilities.

Maximum score

8

Policy Citations

Cite your policy for each vulnerability.

Maximum score

9

 

Policies, Procedures, and Guidelines: Develop Policy Documents

Part 1: Create an Information Security Policy
  1. Select a vulnerability from your submitted table and develop a security policy for one vulnerability. (Should be a policy, NOT a procedure or guideline.)
    1. Use the SANS templates (see Weblinks above) to develop your specific security policy for ACME Healthcare.

NOTE: Follow the template as a guideline. Address all existing policy elements in the template. No policy should exceed two pages in length.

Part 2: Create a Procedure
  1. Create a separate step-by-step set of instructions (a procedure) that supports your information security policy.
  2. Include all of the information that a user would need to properly configure or complete the task in accordance with the security policy.

You should be submitting two documents to get full credit!

RUBRIC:  

Information Security Policy

Document is an Information Security Policy that contains all sections included in the SANS template, not a procedure or Guideline.

Maximum score

15

Information Security Procedure

Document is a step-by-step set of instructions that contains all of the information that a user would need to properly configure or complete the task (Procedure)

Maximum score

10

 

Policies, Procedures, and Guidelines: Develop Plan to Disseminate and Evaluate Policies

Research and document the information required to create an information security policy implementation and dissemination plan. (Use the Security Awareness Planning Toolkit above) Include specific tasks and events that ACME Healthcare will use to make sure that all employees involved are aware of the information security policies that pertain to them. The plan should include any specific departments that need to be involved. ACME Healthcare must also be able to assess whether individuals have the proper knowledge of the policies that pertain to their job responsibilities.

EXample: SS In Files Labeled Example 2

 RUBRIC:

Tasks and Events

List at least ten tasks or events

Maximum score

10

List of departments that should be involved

List of departments that should be involved

Maximum score

10

Metrics

Method of assessing absorption of information by employees

Maximum score

5

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information assurance week 2

 

According to Gregory (2020), policies, processes, procedures are the real thing that defines IT organizational behavior, including how it uses technology (p.28).

After reading Chapter 2, explain information security policy, including fundamental principles and activities.

The length of the paper for this assignment should be 1-2 pages double spaced, not inclusive of the title or reference pages, and include all completed Tables and graphs as appendices. Prepare your assignment in Word format and upload it in canvas. The citations and the reference list in all your papers for this course should be formatted following APA 7th edition guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information assurance week 3

 

Gregory (2020) explains that good strategic planning answers the question of what to do (p.26). It reinforces why the IT Steering Committee, a body of senior managers or executives, meets regularly to discuss high-level, long-term issues in the organization.

  1. Discuss the importance of strategic planning and explain the role of the IT steering committee

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information assurance week 4

 

Explain the difficulties of auditing the services provided by a third party?

2. What is Outsourcing, and how can the organization remediate the Outsourcing Risk
After reading Chapter 2, explain information security policy, including fundamental principles and activities.

The length of the paper for this assignment should be 1-2 pages double spaced, not inclusive of the title or reference pages, and include all completed Tables and graphs as appendices. Prepare your assignment in Word format and upload it in canvas. The citations and the reference list in all your papers for this course should be formatted following APA 7th edition guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information assurance week 6

 

According to Gregory (2020), policies, procedures, mechanisms, systems, and other measures are designed to reduce risk and assure desired outcomes. It is called “Controls.”

For this assignment, discuss control classification, classes of controls and prepare a list of controls and their objectives. Explain why the COBIT Controls framework is essential.

The length of the paper for this assignment should be 1-2 pages double spaced, not inclusive of the title or reference pages, and include all completed Tables and graphs as appendices. Prepare your assignment in Word format and upload it in canvas. The citations and the reference list in all your papers for this course should be formatted following APA 7th edition guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

information assurance week 9

 

The systems development life cycle illustrates the end-to-end process for developing and maintaining software. Gregory (2020) discussed SDLC from the waterfall model perspective. 

  1. Discuss each phase of the waterfall model of SDLC. 
  2. Identify other models similar to a waterfall.
  3. Which is the most important phase of SDLC, and what are common problems that you can face in the process of SDLC?

The length of the paper for this assignment should be 3-4 pages double spaced, not inclusive of the title or reference pages, and include all completed Tables and graphs as appendices. Prepare your assignment in Word format and upload it in canvas. The citations and the reference list in all your papers for this course should be formatted following APA 7th edition guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

business ethics

  

4th question

Summary:

Pick one of the following terms for your research: Stakeholder, corporate citizenship, reputation, corporate governance, or executive compensation.

Journal article I need two copys

Plz follow this instructions

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. REFERENCES: All references must be listed at the bottom of the submission–in APA format.

5th question

Summary:

Read Wells Fargo Banking Scandal and complete the questions at the end of the case study.

Plz click the link you got questions 

““““““““““————————————————————–

6th question 

Summary:

Pick one of the following terms for your research: Integrity, ethical dilemma, conflict of interest, bribery, or fraud.

Journal article I need two copys

Plz follow this instructions

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. REFERENCES: All references must be listed at the bottom of the submission–in APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now