CAR202- Characteristics of an expert in my field

Instructions

Each field or industry will have its own aspects and skills that will define an expert in the field.  For this assignment, you should: 

  • Find a source (journal article, book, web blog, etc.) that addresses the specific skills and characteristics needed to be an expert and successful in that field.  Briefly (one paragraph) identify the main findings from this source, specifically the characteristics needed. 
  • Identify the experience and expertise you have that allow you to meet each suggested characteristic needed.  Frame your response as you would in an interview if you were seeking to frame yourself as an expert. 

Instructions: 

  • Your assignment should be approximately500 words in length (typically, two double-spaced pages), not counting cover page, reference list page, appendices, figures, or tables.  
  • Your assignment should include a title page and a reference list page, and be completed in Times New Roman 12-point font, double-spaced, with appropriate header, page numbers, one-inch margins, and meet all other requirements of APA Stylebook.  
  • Please use at least one appropriate scholarly reference for the basis of your paper, formatted in the most current APA format.  
  • Please refer to the rubric associated with this assignment for detailed guidance about expectations and grading.   
  • Please submit this assignment through in D2L by 11:59PM Central Time on Sunday. 

Threat modeling

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

 Course Textbook: Chapter 8

Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. http://10.1109/WCNCW.2018.8369033

Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.

  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic.

 

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic. Your final project will consist of a 12 minutes, 12 slide powerpoint presentation that you will present at residency and a 1 page single spaced summary and an annotated reference list as described below all of which will be submitted in Week 15. 

You must also respond to two of your peers’ proposals. Help them make a better, more focused, and more interesting presentation. 

Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source.

Research paper

 

Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets.  A policy is an administrative control. 

If no policy exist in the IT department, research shows that employees will default to a defacto policy.  A defacto policy means a policy that is in effect ,but not formally recognize.  To stop this for happening, It is important for students to understand how to take the cloud best practices discussed throughout this course and use them to create a cloud security policy.  Cloud security fundamentals and mechanisms is a huge part of the cloud security policy.  

For this assignment, read the attached article: “Our Journey to the Cloud”.  Use the  SANS email policy template SANS email policy template – Alternative Formats

  to create a policy for the cloud.  Please note, the SANS policy is a template you can use to structure your policy.  If you are having trouble with the links above, these supporting documents can be found in the Cloud Policy Assignment Documents folder.   

Asymmetric cryptography – Component of cryptography

In the final discussion posting please describe what components of cryptography impacted you the most.

I would prefer about asymmetric cryptography and the math underlying it.  Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 30-35  lines should be good enough.