week 5

week 5. needs to be added to the attached white paper in paragraph form. week 3 needs revision also included in the white paper. 

Cyber project

  

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Assignment

1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm.

2. Exercise 14.3-6 (page 354). Use an example to demonstrate your augmented data structure and operations.

(14.3-6 Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q D f1; 5; 9; 15; 18; 22g, then MIN-GAP.Q/ returns 18 15 D 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times.). This is the exercise question 14.3-6 as mentioned above.

dis_dsdba13

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

HW

 CMST 100B WORD PROCESSING

 

PART 2: WEEK 1 DISCUSSION
WELCOME to the discussion for WEEK 1. Please respond in complete sentences for each question, unless directed to do otherwise, demonstrating in your reply that you have read the material in order to earn full credit. Please note that participating in this discussion counts toward your class participation grade.

DISCUSSION
Microsoft Word is a word processing program designed for everyday tasks. MS Word is the most popular word processing software used today.  Microsoft Word is used to create and edit professional-looking documents such as applications, forms, templates, business cards, letters, paper, reports, and booklets by using Microsoft Word.

This week, we will discuss Week 1’s reading assignments. Our discussion will focus on Managing Documents in MS. Word.  The topics we will be discussing are:

1. Navigating within documents.
2. Formatting documents.
3. Saving and sharing documents.
4. Inspecting document for issues.
5. Locating and correcting accessibility issues.

TOPICS
This week’s Read and Watch covers the following topics:

Create a New Blank Document

Create a Document based on a Template

Open Existing Documents

Open Documents in Protected View

Open and Edit PDF Files in Word

Display Different Views of Documents

Display and Edit File Properties

Manually Save Documents

Automatically Save Documents

Save Documents in Other Formats

Maintain Compatibility with Other Versions of Word 

Using Existing Styles

Create a New Style Based on Document Formatting

Add or Change the Background Color

Save Files to OneDrive

Types of Hidden Data and Personal Information

 Insert a Header of Footer

Find and remove hidden data and personal information with the Document Inspector

Change the Area of a Document Displayed in the Content Pane

Open Document in Protected View

YOUR RESPONSE

1. Item A: From the list of topics above, choose one topic or term discussed in the reading that stood out to you. 
2. Item B: Define or describe the topic, including citations from the Read & Watch material and ANY other additional source/sources.
3. Item C: Discuss the importance of the topic. Cite specific examples from the reading. Include personal experience with the topic if appropriate.
4. There are THREE items to each response: Item A (topic), Item B (definition and citation), Item C (discussion) unless specified otherwise. When you respond, they should be labeled accordingly.

Minimum Topic Response: Word Count = 70 (per topic question). Your response to each question is required to be AT LEAST 70 WORDS long.  If your reply to each question is less than 70 words, you will lose points. You can use Microsoft Word to count the words in your response to make sure you have met the requirement.
NOTE 2: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered.
NOTE 3: Please do not attach a file to the conference–enter your reply into the text area provided.
NOTE 4: After you post your response, please review it to make sure it is formatted correctly and is easy to read.

Reconnaissance and Scanning Plan

 

Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group’s systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook’s systems.

As you are developing the Scanning Plan, keep these questions in mind:

  • How would you detect active systems?
  • How would you determine the best attack vector you wish to exploit?
  • How would you prioritize different targets of opportunity?
  • What tools would you be using for scanning and enumeration of systems and vulnerabilities?

Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems.

wk3_531_A

1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

4. What are the most common metrics that make for analytics-ready data?

final project

 Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013. The description of the file is at the end of this file. The application should provide statistical results on the data including:  

Course Project

 

As a group, you will develop a fictitious company, make yourself officers, and create a privacy policy document for said company.

Your fictitious company must create a privacy policy document (5-7 pages). The document shall include an introductory section, such as an “Executive Summary,” a “Preamble,” or an “Introduction.”The document will include policy statements. The policies need to focus on governing your company and its employees. This is where the work comes in. Your team needs to give evidence in the policy section of your knowledge gained in this course. That document provided in this folder is not meant to be an exact template.  Rather, it is designed merely to reflect what a successful policy document might look like in any given workplace.  Do not restrict yourself  to this exact format, but do utilize a cohesive format  and create a document that is easy to follow. You will see in that document that I simply tried to explain more about what the Project should include by using a format that may help you understand how to organize your paper, and understand what features this governance document should include.The Course Paper is worth 100 points. I pay attention to the submission’s form and format. That includes its organization, page count, and grammar and spelling. The form and format is important because if a policy document is disorganized, contains typographical errors, or is hard to read otherwise, employees will not respect or even use it as the guidance it is meant to be. (You will also give a 15 minute presentation on  your privacy policy, which also goes to your project/paper grade. Please use powerpoint. There is no requirement on the number of slides, but at least 2 members need to plan to speak during the presentation. I would encourage all members to participate and present the portions they contributed.) 
Have fun. Collaborate. Put together a document that would be useful to a real organization. Good Luck!