Need in 3 hours
Discussion
After reading chapter 1, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organization’s security posture. You are also required to post a response to a minimum of two other students in the class by the end of the week. You must use at least one scholarly resource.
Every discussion posting must be properly APA formatted.
Your initial response is due by Thursday of each week of the course and you must respond to a minimum of two other learners during the week.
Wk 4 – Apply: Controls, Protocols, and Threats
Assignment Content
- Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.
Create an 8- to 10-slide multimedia-rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:
- What do they protect against?
- What is their purpose?
- Write a 2- to 3-page analysis of your findings answering the following questions:
- How are controls or protocols implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and protocols would you find in a security policy?
- WARNING – There are two assignment in one for this week, the presentation and written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.
Presentation checklist:
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Consistent fonts and font sizes throughout the presentation
- Use colors and background. No black and white presentations.
- Include at least one references that are properly cited
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
- Include speaker notes for every slide except title and reference pages.
- Did the use slides to convey ideas and handouts to communicate details?
- Did the slides follow the golden rule of one idea per slide?.
- Did the slide titles convey the key message of each slide?
- Did the visual diagrams to convey the concepts in a simple, clear, and memorable way?
- Can the charts be understood in less than 5 seconds?
- Did the pictures add clarity to the message the slides
- Did the presentation build curiosity in the audience by revealing information in stages?
- Did the presentation repeat the agenda slide as a guidepost to review your points periodically?
- Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?
- Are the slides clearly readable from the last row in the room?
- Consistent fonts and font sizes throughout the presentation?
In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.
Assignment checklist:
- The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count)
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Include at least one references that are properly cited
- Any images must have a caption and referenced in the paper.
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
Assignment
Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets. A policy is an administrative control.
If no policy exist in the IT department, research shows that employees will default to a defacto policy. A defacto policy means a policy that is in effect ,but not formally recognize. To stop this for happening, It is important for students to understand how to take the cloud best practices discussed throughout this course and use them to create a cloud security policy. Cloud security fundamentals and mechanisms is a huge part of the cloud security policy.
For this assignment, read the attached article: “Our Journey to the Cloud”. Use the SANS email policy template to create a policy for the cloud and third party risk management (TPRM). Please note, the SANS policy is a template you can use to structure your policy. If you are having trouble with the links above, these supporting documents can be found in the Cloud Policy Assignment Documents folder.
week5
1. Prepare a one page paper on Principal Component Analysis from chapter 7 of the textbook. You may use the internet for more information. Please double space your paper and cite your sources.
2.
Please view the following video, then prepare a one page paper on eigenvalues. You may research the internet for more information.
Introduction to Eigenvalues and Eigenvectors – Part 1 (Links to an external site.)
Please double space your paper and cite your sources.
Here is another video to help you understand the concepts:
Eigenvectors and eigenvalues | Essence of linear algebra, chapter 14 (Links to an external site.)
two page paper double space.
3. Prepare a one page (minimum) paper on some of the uses of Neural Networks from chapter 8. You may research the Internet for more information on some of the uses of AI (artificial intelligence). Please double space your paper and cite your sources.
4. Prepare a one page (minimum) paper on cluster analysis. You may research the internet for more information. Please double space your paper and cite your sources.
textbook.
https://online.vitalsource.com/#/books/9780470979280/cfi/6/32!/4/2/6/4/84/4/2/2/2/2@0:0
username: [email protected]
password: Welcome1
Cloud computing
Define and describe business continuity.
Define and describe disaster recovery.
Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both
2-3 pages at least and no plagiarism.
Web Development Browser Compatibility Issues and Mobile Device Development one page paragraph
You should be REPORTING EVIDENCE and EXAMPLES from what you read. Find, Read, and Share – THREE related sources of information
Report – Three things about the topic that you want to remember forever
- Identify the topic for this week.
- Find three high-quality sources of related information on the Internet.
- Read your chosen high-quality sources of related information.
- state your three sources of information.
- DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
- SUMMARIZE with three things about the topic that you want to remember forever.
Prepare answers according to the questions given in this week's
See attachment below.
article
Using search engines, find one (1) recent PEER REVIEWED ACADEMIC ARTICLE involving the use of databases in business. Describe the role of “databases” in the text using your own words. Here is an example of an article citation as I would expect to see it in your write up. The writeup for your citation should be at least one paragraph long (7-9 sentences).
Source Example:
Ekren, G., & Erkollar, A. (2020). The Potential and Capabilities of NoSQL Databases for ERP Systems. In Advanced MIS and Digital Transformation for Increased Creativity and Innovation in Business (pp. 147-168). IGI Global.
- Your entry on Blackboard should equal about 1-2 pages in length, double spaced, 12 point font Times New Roman.
- Your paper must contain a UNIQUE topic (see example above).
- Your paper must contain a MINIMUM of three unique academic journal articles and research sources. Blogs, Wikis, and Online News Sources will NOT be accepted.
- You must cite all references using APA and apply APA Style throughout the entire paper. 10% of your grade is based on APA Style.
- You must spell check / grammar check your paper. 10% of your grade is based on following this criteria.
Scanning
Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.