week 9

 

In this assignment, you assess security testing types and application tools that are appropriate for your chosen business application.

Preparation

  • Research the following:
    • Pen testing, vulnerability scans, and performance testing as they relate to the application you chose in the first assignment. Choose which you believe would be the most important for testing your software. Consider what your criteria are.
    • Two software applications that perform the type of test you have chosen.

Instructions

Consider your research and do the following:

  • Justify what you believe to be the most appropriate testing method by evaluating each type of test against at least 4 relevant criteria of your choosing.
  • Describe 4 criteria that are appropriate for selecting commercial software for the selected test type.
  • Justify your choice of testing software by comparing two commercially available solutions against each of your stated criteria.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcomes associated with this assignment are:

  • Evaluate application technologies and the security issues associated with them.
  • Define processes for ensuring web application security.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Assignment – Fundamentals of Data Science

Part 1: Understanding Data and Measurement (15 points) 

  • Data and Information Hierarchy (5 points): Describe the difference between data, information, knowledge, and wisdom, explaining the hierarchical relationship among them. Provide a specific, real-world example to illustrate each level of the hierarchy.
  • Variables and Measurement Scales (10 points): Explain the different types of variables (nominal, ordinal, interval, and ratio), and describe the associated scales of measurement. Provide a specific example of each type of variable and explain why it is classified as such. 

Part 2: Descriptive Statistics and Bivariate Analysis (30 points) 

  • Frequency Distribution and Summary Measures (15 points): Select a dataset (this could be publicly available data or a dataset from your workplace). Create a frequency distribution for a chosen variable, calculate common summary measures (mean, median, mode, range, variance, and standard deviation), and provide a short interpretation of these measures.
  • Bivariate Analysis (15 points): With the same dataset or a different one, conduct a bivariate analysis that includes both an association between two qualitative variables and a correlation between two quantitative variables. Interpret your findings. 

Part 3: Probability and Distributions (30 points) 

  • Probability (10 points): Discuss the basic rules of probability, conditional probability, and Bayes’ theorem. Illustrate your discussion with unique examples.
  • Random Variables and Probability Distributions (20 points): Define discrete and continuous random variables. Give a real-world example of each and describe the associated probability distribution for each variable.

Part 4: Sampling Techniques (20 points)

  • Sampling (20 points): Define and differentiate random and non-random sampling. Discuss how to determine an appropriate sample size for a given study. Include an illustrative example from a real or hypothetical research study.

Submission Format: 

  • The assignment should be approximately 2,000 words. The focus should be on the quality and depth of your responses, rather than meeting a strict word count. 
  • Cite your sources in-text and on the reference page in APA format. 
  • Ensure APA scholary writing for clarity of assignment w/ minimum of (3) APA scholarly in-text Citations w/ corresponding References for Initial Post and each Peer Review Response Post.  Lable figures appropriately (see APA Manual – Figures).
  • Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion

Before you begin this discussion, read this module’s resource about global digital privacy. In your initial post, address the following points:

  • Choose a country from the report.
  • Describe the country’s privacy laws.
  • Discuss the country’s position on protecting private data by moving it out of a country’s jurisdiction.

In your response posts, compare your thoughts with those of your peers.

To complete this assignment, review the Discussion Rubric.

RESPONSE ONE

Hey everyone,

For my report, I chose Canada to examine their privacy framework. In Canada, there are two major laws at the federal level, as well as supplemental regulations at the state level, or provincial level in the case of Canada. The Privacy Act (1985) regulates how the federal government collects, uses, and discloses personal data, ensuring citizens’ information is handled responsibly. The Personal Information Protection and Electronic Documents Act (PIPEDA, 2022) applies to private-sector organizations engaged in commercial activities. PIPEDA requires businesses to obtain informed consent for data collection, grants individuals access to their personal data, and allows them to request its deletion once it has served its purpose. However, businesses can retain anonymized data and, in some cases, disclose information without consent for investigative purposes. Provincial governments enforce additional privacy protections, sometimes overriding PIPEDA when data remains within the province, creating a fragmented regulatory landscape. 

As far as information flowing in and out of Canada’s jurisdiction, they take a relatively relaxed approach as PIPEDA does not impose strict data localization requirements on private businesses. The general rule of thumb essentially for Canada’s privacy framework outside its geographical bounds, is that it relies on the good faith of foreign organizations to have the necessary precautions and safeguards in place to responsibly handle sensitive information and data in general. 

RESPONSE TWO

China’s Personal Information Protection Law (PIPL), passed in 2021, is often compared to the GDPR, but it reflects China’s state-centric approach to data privacy. While PIPL gives individuals rights similar to GDPR- such as the right to know, update, and delete their data- it does not limit the state’s ability to access personal information. The government maintains full control over citizen data and can collect it from companies at any time. The law mainly focuses on regulating how companies handle personal data, rather than restricting state access.

PIPL also enforces strict data security measures. Companies must implement strong technical protections, and in the case of a data breach, the data collector is held liable. If a company processes a large amount of data (as determined by the state), it must appoint a data protection officer. Encryption and pseudonymization are encouraged but not strictly defined. However, if data is fully anonymized, PIPL no longer applies.

One of the most significant aspects of PIPL is its strict data localization requirements. Data collected within China must remain in China unless the government explicitly approves its transfer. Foreign companies operating in China must appoint local staff to handle Chinese data within the country. This differs from GDPR, which allows cross-border data transfers under certain conditions. The strict localization rules could impact multinational businesses, as companies that violate PIPL risk being banned from operating in China.

China’s approach to digital privacy highlights the lack of true public privacy. While individuals have some control over how companies use their data, they have no privacy from the government. The state’s broad authority over citizen data raises concerns about mass surveillance and potential misuse, as there are no legal barriers preventing government access. This state-first approach differs from privacy laws in democratic countries, where laws aim to balance national security with individual rights.

China’s privacy laws highlight its emphasis on state control and national security, ensuring that personal data stays within its jurisdiction while still holding businesses accountable for data protection- though at the cost of true personal privacy form government oversight.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security

This assignment consists of cataloging your security policies. For the catalog, navigate to the https://www.instantsecuritypolicy.com/  custom security policies website to get started with building your catalog.

Scenario

An information security team’s designated role is to implement an information security policy, standards, baselines, procedures, and guidelines. The Chief Information Security Officer (CISO) decided that your team must develop a security policy catalog to cover all the hospital policies and procedures to keep the networks secure, maintain secure data transmission, and protect patients’ confidential records. Take into consideration the following information about the hospital infrastructure:

  • The hospital headquarters is home to 750 staff members with offices in Washington, DC; San Antonio, Texas; and New York City, New York. The hospital in Washington DC, will also maintain networking to their local satellite office.
  • The headquarters store the primary data and the main internet backbone to include LAN services, wireless LAN, wide area network (WAN), and virtual private network (VPN) tunnels.
  • The San Antonio hospital and the New York hospital host about 200 staff at each facility and half of these employees are traveling more than 80% of the time. The New York office focuses on Computed Axial Tomography Scans (CAT) and maintains media and web servers.
  • The satellite office has approximately 100 staff and is connected to the main WAN with a wireless point-to-point bridge to the Washington, DC headquarters data center.
  • The hospital allows doctors to do telehealth telecommunications. Remote and mobile staff are provided access to the hospital VPN client. The VPN client required staff to access reliable internet services to communicate across teams and patients effectively. The Information Technology team manages all hospital-owned laptops.

As the lead for your IT Security Team, prepare a security catalog related to protecting personal hospital devices, securing confidential data, managing passwords, data transfer policy, managing remote access, email policy, backup policy, VPN policy, acceptable use policy, incident response policy, physical security, periodical review of security standards, and disciplinary actions against employees for breaching security standards. As part of the catalog, you will include a policy statement. You will also select a security policy testing methodology to facilitate the assessment for technical errors.

Note: You may create or make all the necessary assumptions needed for the completion of this assignment.

Submission Requirements

Write a paper in Word in which you:

  • Create a security policy catalog comprising a set of security policies for a hospital organization.
  • Explain each security policy in detail with supporting justification for the policy.
  • Explain the proposed cybersecurity policy statement and reasons why the policy statement may be controversial.
  • Provide a justification for the determined security testing methodology you would use to facilitate the assessment of technical errors.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security policies

In this assignment, you will develop corporate policies for system security monitoring, patch management, and updates that cover both wired and wireless components. A web search will provide multiple examples of policy documents. The following resources may also be helpful as you draft your policy documents:

  • SANS. No date. https://www.sans.org/blog/cis-controls-v8/?msc=main-nav . https://www.sans.org/critical-security-controls/?msc=main-nav
    • This resource provides a list of case studies highlighting how security professionals have made improvements in their security controls.
  • SANS. No date. Security Policy TemplatesLinks to an external site.. https://www.sans.org/information-security-policy/
    • This resource provides a number of security policy templates that might be helpful in drafting your policy documents.

The specific course learning outcome associated with this assignment is:

  • Recommend best practices for monitoring, updating, and patching systems.

Instructions

Write a paper in which you:

  • Establish a system security monitoring policy addressing the need for monitoring, policy scope, and exceptions and supported by specific, credible sources.
    • Justify the need for monitoring.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Establish a system security patch management and updates policy addressing the need for patch management and updates, policy scope, and exceptions and supported by specific, credible sources.
    • Justify the need for patch management and updates, aligned with ISO/IEC 27002.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Assignment & Discussion

Assignment  – 4 pages

Discussion – 1 page

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CWUD Case Project: Develop a Survey

 

  1. Create a short multiple choice survey of 25 questions or less to determine an ACME employee’s level of knowledge regarding security awareness.
  2. The survey should address items from your  CWUD Case Project Research Security Awareness Programs.docx  , and include things like password security, proper handling of sensitive information, data confidentiality, email security, social media security, secure communications, authentication, non-repudiation, and enforcing the organization information security policies.
  3. The survey should require no more than 10 minutes for an ACME employee to complete.
  4. The survey should gauge the security awareness of the employee and be able to be objectively scored.
  5. Upload the survey in electronic form.

Example Survey Item:

1.     You receive an e-mail that looks like an official e-mail from your IT department.  The email says that there has been some suspicious activity with your username and are asking you to verify your username and password through a clickable link in the e-mail.  What do you do?

  1. Comply by clicking the link and putting in your username and password
  2. Ignore it and delete the e-mail
  3. Report the e-mail to your supervisor
  4. Contact your IT department and ask if the e-mail is legitimate
     

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Journal and 2 discussions

Discussion 1 – 200 Words

Discussion 2 – 200 Words

Journal – 4 pages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

w2290sql

 

  • What is the purpose of the mysql_install_db script?
  • What are some of the problems that can occur while running the mysql_install_db script?
  • Why are usernames considered just as important as passwords?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Awareness Poster

 National Cyber Security Awareness Month (NCSAM) is observed in October in the United States of America.  Started by the National Cyber Security Division within the Department of Homeland Security and the nonprofit National Cyber Security Alliance, the month raises awareness about the importance of cybersecurity. ACME Corp is sponsoring a Cyber Security Awareness Month Program this October and they would like for you to create an awareness poster to be displayed throughout the company. 

This is the link we are using to create the awareness poster. Do not create it any other way besides what the video says to do.

All requirements are in the Screenshots below, along with the example image. Thank you.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now