defense in depth

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.

The specific course learning outcome associated with this assignment is:

Recommend best security practices to achieve business objectives based on risk assumptions.

Instruction:

Search the internet for a representation of a network figure with defense in depth in mind, that include all necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others), the interconnections between network devices, connections to end-user (client) devices (desktops, laptops) and connections from the Internet cloud to the network input.

Write a paper where you

Describe the flow of data through the network, citing specific, credible sources.

Assume data begins at the remote site.

Data flow may be monitored by an IDS.

Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.

Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Cite each source listed on your source page at least one time within your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper

 

Paper Submission Instructions: 

You are required to submit a six-page paper following the provided structure. The paper must be formatted in Times New Roman, size 12, with 1-inch margins on all sides, and single-spaced text.  Ensure that your writing is clear, well-organized, and properly cited  according to academic standards. Your research should be based on the  second feedback provided and must thoroughly address the assigned topic.

The research paper must include the following sections:

  1. Abstract  – Provide a concise summary of the research, including the problem  statement, methodology, key findings, and conclusion. This section  should give readers a quick overview of the study and its significance.
     
  2. Related Work  – Discuss previous studies relevant to the topic. Identify gaps in the  literature and explain how your research contributes to filling those  gaps.
     
  3. Threat Model with Diagram/Problem Statement – Define the potential security threats and vulnerabilities.
     
  4. Use Case with Diagram – Connect your problem with real-world scenarios, present with diagram.
     
  5. Countermeasures – Present strategies and best practices to mitigate performance issues and security risks.
     
  6. Conclusion and Future Work  – Summarize the key findings of the research and highlight the  implications of the results. Discuss limitations of the study and  suggest directions for future research.
     
  7. References  – Cite all sources in a proper academic format (e.g., IEEE, APA, or  another citation style as instructed). Ensure that all references are  credible and relevant to the topic.
     

Your final submission must be a  polished and well-researched document. Use formal academic writing,  avoid informal language, and ensure that your arguments are supported by  evidence. Figures and diagrams should be labeled appropriately and  referenced within the text. Plagiarism will not be tolerated, so make  sure to properly paraphrase and cite all sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cybersecurity

Review the following articles:

https://journalofethics.ama-assn.org/article/making-policy-augmented-intelligence-health-care/2019-02

PDF 1

PDF 2

Explain why certain employees and organizations have a deeper level of information assurance (IA) policy compliance.

Examine the factors that increased the individual’s level of propensity for compliance.

Determine the internal and external factors affecting IA policy compliance.

Explain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

Explain why factors related to IA and policy compliance are affected by government regulations.

Identify ways you can assess the cyber capability of an organization as a manager.

Use at least three quality (e.g., peer-reviewed journal articles, credible web resources, valid security policy documents) resources in this assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 10

You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered that the estranged husband of the CEO’s executive staff assistant had compromised her system’s account, which allowed him to access confidential documents including other employees’ personally identifiable information. You have completed your forensics investigation and documented the findings in an incident report, and continue to maintain and secure evidence in the pursuit of criminal and civil charges.

Instructions

With the information ascertained during your investigation, and utilizing knowledge of network architectures and standards relevant to network investigations, write a 3-5 page paper responding to the points listed below. You may utilize the resources from your study this week to analyze appropriate U.S. Supreme Court cases, federal laws, and federal statutes.

  1. Analyze at least three of the significant U.S. Supreme Court cases focusing on digital crime and evidence. To support your work, reference the federal laws that were violated and the basis for the case (that is, summarize the case).
  2. Analyze at least three federal statutes governing electronic surveillance in a communications network that can be applied to this case. To support your work, refer to the statutes listed in the Electronic Communications Privacy Act (ECPA).
  3. Summarize the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes.
  4. Describe at least three factors that have limited the efforts of local law enforcement to identify and investigate cybercrime.
  5. Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course outcome associated with this assignment is:

  • Evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Emerging Technologies in Cyber Securities

TASK 1

 Write your paper in Microsoft Word (.doc or .docx) unless another Microsoft product, or pdf, is specified in the task directions. Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc.  All supporting documentation, such as screenshots and proof of experience, should be collected in a pdf file and submitted separately from the main file. For more information, please see Computer System and Technology Requirements.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

A.  Describe the network topology you found when running Nmap. Include screenshots as evidence of running Nmap.

B.  Summarize the vulnerabilities on the network and their potential implications based on your Nmap results.

C.  Describe the anomalies you found when running Wireshark, on the network capture file, and include evidence of the range of packets associated with each  anomaly.

D.  Summarize the potential implications of not addressing each  of the anomalies found when running Wireshark.

E.  Recommend solutions for eliminating or minimizing all identified vulnerabilities or anomalies from Wireshark and Nmap. Use current, industry-respected, reliable research and sources to support your recommendations for each vulnerability or anomaly.

F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G.  Demonstrate professional communication in the content and presentation of your submission.

TASK 2

 Write your paper in Microsoft Word (.doc or .docx) unless another Microsoft product, or pdf, is specified in the task directions. Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc.  All supporting documentation, such as screenshots and proof of experience, should be collected in a pdf file and submitted separately from the main file. For more information, please see Computer System and Technology Requirements.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

A.  Describe two WLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.

B.  Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.

C.  Summarize the steps for mitigating each  identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation.

D.  Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.

E.  Recommend a solution for the company’s BYOD approach, including research to justify your recommendation.

F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

G.  Demonstrate professional communication in the content and presentation of your submission

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

network engineering

In this assignment, you will design a secure network infrastructure.

The specific course learning outcome associated with this assignment is:

Plan a deployment of software and/or hardware, including implementation and testing considerations.

   Search the web for network infrastructure diagram including Web server, FTP server, VPN server, Authentication server, Anti-virus server (client-based and server-based), Edge firewall, Firewall, Vulnerability scanner, Intrusion detection system (IDS), Web proxy, Edge router, Core router, Switch, Distribution router.    

Then write a paper where you: Determine the specific devices you will use in the network, including the following information for each device:

Make or vendor’s name (for example, Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com).

Model (for example, Windows 7, ASA 5500, Cisco 3500, Squid).

IP address assigned to all devices.

Determine the basic configuration of each network device, citing specific, credible sources that support the configuration.

Research each of the devices you chose and provide a basic configuration you would use in your network.

Use IP addresses to describe your configuration.

Identify the operating system.

Highlight at least five security features and the administrative controls incorporated into each device, including devices in the network diagram.

Explain the impact that each of your configurations has on the security of the entire network.

Explain the elements that must be addressed for planning and testing a network, citing specific, credible sources that support your assertions and conclusions.

Organizational requirements and expectations.

Budget.

Modularity for security and testing.

Naming conventions that facilitate layering and growth.

Determination of required network speed and data capacity.

Vendor support.

Determination of risk and redundancy.

Uptime requirements.

Continuous data monitoring for fault, failure, or security-induced changes.

Load balancing.

Testing for latency.

Bandwidth.

Throughput.

Specific software and tools.

Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Secure network

In this assignment, you will apply the various concepts you have learned throughout this course to the design of the single most secure network possible, capable of supporting three IT services: e-mail, file transfer (centralized), and VPN. Use the network diagram and the 3 data flow diagrams provided to   Write a paper where you  Explain the function and configuration of at least four-fifths of all required network devices, citing specific, credible sources.

Authentication server (Microsoft Active Directory).

Routers, switches, and/or hubs.

Local and remote users.

Workstations.

File share (CIFS).

Mail server.

Web servers (both internal and external).

Firewalls.

Internet cloud.

Web proxy.

E-mail proxy.

FTP server (for internal-to-external transport).

Explain how the overall network design protects the organization from both inside and outside attacks, addressing all required network design features and considerations and citing specific, credible sources that support your assertions and conclusions. Address:

Physical and virtual access.

Logging requirements.

Security policy.

Firewalls.

Proxy servers.

The VPN tunnel.

DMZ isolation.

User authentication.

Distribution of layer routers and switches.

Explain how your layered design compensates for possible device failures or breaches in network security, addressing all key design features and considerations and citing specific, credible sources that support your assertions and conclusions. Include:

Load balancing.

Swappable devices.

Standby backup devices.

QoS prioritization.

Vendor support for core and services.

Explain how to make the file transfer process more secure, fully addressing FTP security risks and how specific FTP replacement devices add protection, clearly delineating the features of each device, and citing specific, credible sources that support one’s assertions and conclusions.

Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ch7 Mini-Case III: EUREKA Discussion (7.2; 7.3, 7.4) 200 words and 100 words respond

 please i need this in 6 hours 

Chapter 7 Wired and Wireless LAN   

Purpose

To provide you the opportunity to research and illustrate the best practice recommendations for LAN design.

Directions

  1. Read the following scenario and answer the questions that follow in the discussion board area of class. Provide a thoughtful and informative response to the questions; you should be able to support your recommendations. Be sure to support your ideas with evidence gathered from reading the text or other outside sources. Be sure to give credit to the sources where you find evidence. Use an attribution like “According to the text,” or “According to Computer Weekly website” in your response. Your response should be a minimum of 200 words.
  2. Respond to at least one of your classmates’ posting. Your response should at a minimum of 100 words. A response like “I agree” or “Yes, you are correct” does not contribute to a robust discussion. Explain why you agree or disagree; share our own personal experience or knowledge gained from your readings.
  3. Submit this assignment in the Discussion Board. 

Scenario
Eureka is a telephone and Internet-based concierge services that specializes in obtaining things that are hard to find (e.g. Super Bowl tickets, first  edition books from the 1500s, Faberge eggs). It currently employs 60 staff members who collectively provide 24-hour coverage (over three shifts). They answer the phones and respond to requests entered on the Eureka! Web site. Much of their work is spent on the phone and on computers searching on the Internet. The company has just leased a new office building and is about to wire it. They have bids from different companies to install 

(1) 100-Base T network 

(2) Wi-Fi network What would you recommend? Why? In your proposal, include a diagram of our wired or wireless network.

Grading

This assignment is worth 50 points. I will grade your responses based on accuracy and completeness. Your initial posting should be at least 200 words and your response to at least one classmate should be at least 100 words. 

i have attached a picture and its the post you will be responding too with 100 words or you can see below to respond.

In the situation of the Mini-case III, the telephone and Internet-based concierge services named Eureka, needs to wire a new office. The company has the choice between a 100Base-T network and a Wi-Fi network. According to me, I would recommend the company to install a 100Base-T network. During this study, I will explain my choice.

First of all, my choice of this type of network is related to two main reasons. The first reason is the connection speed. According to the book in Chapter 7 p.188, the 100Base-T network supports data transfer rates up to 100 Mbps. According to Webopedia website, the 100Base-T network is 10 times faster than Ethernet and often referred to as “Fast Ethernet”. It’s important to mention that because Eureka is an internet-based company which employs 60 staff members who work a lot. The employees will need a fast connection to perform their work. However, it could be challenging to use a Wi-Fi network. Even though the wireless network is faster than the wired network, the 100Base-T network will be a better choice in this case because the Wi-Fi network would be overloaded due to the amount of work in the company.

Secondly, apart from the connection speed, I chose the 100Base-T network instead of the Wi-Fi network, because of security. We all know that security is very important for telephone and internet-based companies since they have customers’ personal information on file. If Eureka installs a wired network, all personal data will be stored and only the workers will have access to that. However, the Wi-Fi network is less secured. According to Lifewire website, signals from most wireless local area networks pass through exterior walls and into nearby streets or parking lots. In the Eureka situation, insecurity of the connection will be a constraint for the company.

  Definitely, installing a 100Base-T network instead of a Wi-Fi network will be advantageous for Eureka. Every employee will be reassured to do his job safely and efficiently. The company will not receive complaints from customers because workers will do their work on time.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Support Queue Case Study

 Instructions

For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.

As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.

CompTIA 6-Step Troubleshooting Process:

  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Evaluate the theory to determine the actual cause.
  4. Establish a plan of action to resolve the problem and implement the solution.
  5. Verify full system functionality and if applicable implement preventative measures.
  6. Document findings, actions, and outcomes.

How Will My Work Be Evaluated?

As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.

But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.

Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 12.7.2: Explain the process of analyzing IT incidents.
  • 13.1.1: Create documentation appropriate to the stakeholder.

Your deliverable for the project is an annotated PowerPoint Presentation covering the following:

  • List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
  • One to two slides for each ticket, in which you:
    • State the problem.
    • Describe the steps taken to troubleshoot/analyze the problem.
    • Propose a brief resolution.
  • One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
  • One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.

If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.

Delete the instructional text from the template before you submit.  

When you are finished, click “add a file” to upload your work, then click the Submit button.

Due DateJul 6, 2021 11:59 PM 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

just answer 1 question

choose 1 question and answer it. (200 words)

use the pdf file chapter 1 to answer

  

1. What is encompassed in the question “why computer ethics?” In other words, what more specific questions are included in the broad question?

     – What is computer ethics? What does it mean?

     – Why do we have to learn ethics?

     – Is computer ethics important or not?

     – Is it connected to our course?

     – Is computer ethics helpful? 

2. Give a concise summary of Moor’s standard account of computer ethics.

     – Moor’s standard account of computer ethics is saying that when IT comes up a new possibilities for people’s action that is because Ethical issues arises around IT.

3. What is a policy vacuum? Give an example, and explain it using the standard account.

     – Policy vacuum means “no policy”. For example, A Benildean girl went to her school wearing slippers. At that time, the school accepts slippers then suddenly made a school policy of dress code. She wore slippers because there were no rules of not wearing slippers. She can be excused if her feet/s were injured.

     Using it in the standard account, the policy vacuum are filled when there are questions or conceptual muddle that needs to be solved or answered. 

4. What is a conceptual muddle, and how do they get in the way of filling policy vacuums? Illustrate with an example.

     By the word itself, muddle means mix-up, confusing, or jumble. Conceptual muddle gets in the way of filling policy vacuums because conceptual muddles are the questions that to be answered and be solved so they are like making the created policy change. For example, A man asked the IT department if he could access his email account to read his personal emails. The IT says “no” but with reconsiderations and depending on his request he can access his email account with a desired time and if it is business related. 

5. What is wrong with the standard account of computer ethics? Identify at least two criticisms, and explain.

     The problem with the standard account of computer ethics is the “newness”. In the book, “newness” may skew the kind of analysis that is done. 

6. What are the two tenets of the view referred to as “technological determinism”? What is the STS critique of each tenet?

     – “technology develops in isolation and according to its own logic – should be rejected outright” 

          = It does not follow a predetermined or “natural” order of development.

     – “technologies are adopted by societies or particular social groups, the adoption brings about – determines – social arrangements and patterns of social behavior”

          = When we say that technology determines society, we are forgetting that the technology has been socially shaped; social factors and forces have influenced the development and design of the technology. 

7. What is wrong with thinking of technology as merely material objects?

     In the statement “thinking of technology as merely material objects”, it sounds normal but it doesn’t look at the main idea why technologies are invented. 

     In the chapter 1 of Computer Ethics, about “Sociotechnical”, one of the lessons of STS, is not to think of technology as material objects. As sited in this chapter, that “Facebook users think of the site not just as a material object or piece of software, but as a “social” networking site”. 

8. What is a sociotechnical system?

     For me, sociotechnical system is a system that people should might know. It helps in our decision making and critical thinking. It helps us stretch our mind, ask questions that obviously want decent answers.    

     Written in the book of Computer Ethics, “sociotechnical systems perspective provides a richer account of situations in which ethical decisions are made, one that may help in articulating moral concerns as well as revealing additional avenues for addressing ethical questions and issues”.

9. Choose a familiar technology and describe its values?

     – Internet

          = helps users to reconnect with other people

          = to gather informations

          = to send files from other people

10. What is the difference between micro-level ethical issues and macro-level ethical issues?

         Micro-level ethical issues are for the individuals’choices and their behavior. 

         Macro-level ethical issues are for big groups that everyone can be affected.

11. Why is the study of ethics and technology needed? Why is the study of ethics, and IT in particular, needed?

     The study of ethics and technology is needed because:

          = Ethics -> In ethics, ethics gives us to explore our mind or to widen our mind, ask questions to the unknown, ask questions to the unjust, and etc.  It helps us to think more of cases that are somehow wrong and right. 

          = Technology -> We need technology. As we our world continues to grow on technologies, we began to be attached to the technologies we created. We are so attached that people can’t live without it. That is why Ethics is needed because Ethics is like the one stopping the evil deeds of an evil person using technology. 

     The study of ethics and IT in particular is needed because these IT people are mostly creating ethics. Reading some of the recent cases can actually relate some of your problems that can be solved under some of the circumstances.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now