discussion 1 wk 5

  Respond to the following in a minimum of 175 words: 

NIST SP 800-30 and ISO 27005, which you read about this week, both offer versions of a risk assessment model. 

Describe the process a CISO would use to help the company decide which risk assessment model to use considering the February 2013 Executive Order 13636, Improving Critical Infrastructure Cybersecurity.

Discussion-8

 In the final discussion posting please describe what components of cryptography impacted you the most.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?

 Please write 350 words essay. 

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

cis 500 week 4

Please respond to the following:

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad blockers that block this type of communication.

  • What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.
  • How might your feelings toward the technology be affected if you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue?

Wk 5 – Apply: Backup Policies

Assignment Content

  1. Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.

    In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.

    Include the following in your outline:

    • A list of tools used for backup purposes
    • An explanation of the following:
    • Where employees should work from that day
    • How employees can get to their data
    • The communication methods about updates
    • A step-by-step guide to recover your databases and telecommunications
    • A step-by-step guide to recover and provide any additional company assets
    • A description of policies for backup media storage
    • A description of policies for encryption of backup data
    • Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

      Cite at least two resources within the assignment in APA format.

research paper – Info-tech import in strategy Planning

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

please answer this in word document.

no plagiarism .  please follow above instructions

EH week12 Lab

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

you were introduced to Wireshark and GlassWire, two free network monitor & security tools. Compare and contrast these two tools. explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.

https://www.glasswire.com/

https://www.wireshark.org/

300 words needed

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism