BMIS 664 – Final Project

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources

Informal Report

You are to prepare an informal report on the topic of “How workplace culture is changing”. Use the information you have gathered for Assignment #4, the outline within a business letter and now can use as the basis for this report. The report should be 5-8 pages including the References page.

Audience for the report: New managers at McDuff Enterprises

Purpose: Create an awareness of change for managers new to the workplace

Create a Database

Please look at the attached file as it provides step by step guide on how to complete the assignment. Make sure to follow guidelines and use ERDPLUS.

Step 1: write a macro that can create one file for

  

Step 1: write a macro that can create one file for each tab located in workbook “Budget Request Form.xls”. First file would be named “Budget Request Form – Drama.xls”, second file “Budget Request Form – English.xls” etc (I want flexibility if adding tabs or changing tab names, the macro should be able to create one file for each of the tabs located in the main workbook.Step2: after the different files are created, I would like to collect information from these files (let’ say “Budget Request Form – Drama.xls” and “Budget Request Form – English.xls”) into workbook “Submissions – Final.xls”. The data collected is currently in GREEN. One line will be added for each source file in this case we have 2 here. All source files will be located in the same folder. the folder’s name is “Budget – Submissions”. 

31/s4

  • What are the differences in protecting data globally versus protecting employee data nationally?
  • Why is protecting employee data essential?
  • What are the effects of improper employee data protection?

Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle

 

Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle

PowerPoint Chapter 1 Capstone – Franchise 

Exp19 PowerPoint Ch01 Cap Want to Waffle

Project Description:

Want to Waffle is a successful mobile food business. The company was  started by two culinary students and their families to finance the  students’ college education. A year later they own three food trucks  that sell breakfast waffles, waffle sandwiches, and dessert waffles.  Street-food lovers line up around the block when the food trucks park in  their neighborhood. The truck locations are advertised via Twitter and  on Facebook, so waffle lovers can follow the trucks from place to place.  The business has increased its revenue and profits, and the owners are  looking to expand their operation by offering franchises. They need to  prepare a presentation for an important meeting with financiers.

Start   PowerPoint. Download and open the file named Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Grader has automatically added   your last name to the beginning of the filename. 

Change the theme variant to the   last one (orange variant).

Change the theme color to Red   Orange and the theme font to Candara.

Create a new slide after Slide 1   using the Panoramic Picture with Caption layout. Type Interested in   Bringing Waffle Love to Your Town? in the middle placeholder. Type The   opportunity can be yours! in the bottom placeholder.

Select the text Waffle Love in the middle placeholder,   change the font size to 32 pt, apply Shadow, and change the font color to   Gold, Accent 2.
   Note, Mac users, to apply the shadow, on the Shape Format tab, click WordArt   Styles, and then click Shadow.

Click Slide 2. Use the Reuse   Slides option to insert all of the slides from Waffles.pptx  into the open presentation. Ensure the Use source   formatting or Keep  source formatting check box is not selected so that the   inserted  slides take on the design and formatting of the open presentation.

Type the following speaker note   on Slide 1: We have a great opportunity for you to join our waffle   family. (Include   the period). 

Delete Slide 3. Move Slide 5 (92% increase in sales) so that it   becomes Slide 4.

Create a Notes and Handouts   footer with the following: Franchise Information. Apply to all.

Click Slide 1. Insert the WaffleTexture.jpg image file. Crop  the   image by dragging the middle bottom sizing handle up until it is  at 0″   on the vertical ruler. (HINT: Shape Height will be 3.75″ at this  point).   Change the width of the cropped image to 13.33“. 

Apply the Drop Shadow Rectangle   Picture Style. Set the horizontal  position of the image to 0″ and the   vertical position to 0″. 

Click Slide 2 and insert the DessertWaffle.jpg image file. Apply   the Simple Frame, White Picture Style.

On Slide 8, insert the Waffle.jpg image file. Change the   width of the image to 7.3″.

Apply the Simple Frame, White   Picture Style. Set the horizontal  position of the image to 5.4″ and the vertical position to 1.6″.

On Slide 7 convert the list to   the Step Up Process SmartArt graphic.
 

  Note, Mac users, convert the list to the Basic Process SmartArt graphic.

On Slide 3, select the text Why We’re HOT in the title  placeholder   and apply the Fill: Red, Accent color 1; Shadow WordArt  Style to the text.   Increase the font size of the WordArt to 60 pt.

Check the presentation for   spelling errors. Make corrections as needed on the slides.

Save and close Exp19_PPT_Ch01_Cap_WantToWaffle.pptx.   Submit the file as directed.

question1

Alternative Processing Site Proposal

R&D Media, LLC has asked you to develop a proposal for an Alternative Processing Site.

Conduct research on the latest technologies for Alternative Processing Sites (feel free to use your

assignment).

Determine who the company’s stakeholders are.

Using the results of your research, develop the request for proposal that best meets the stakehold

innovative technologies.

Within your proposal you must also consider cost and what R&D Media, LLC can afford.

Develop and document the requirements for R&D Media, LLC’s alternate processing site.

Identify the mission critical services and indicate services that are not provided at the alternate sit

security issues.

Create and document the design and do walkthroughs for building the alternate site to ensure tha

Document the activation process for the alternate processing site.

Document the hand-back process.

The information you need about R&D Media, LLC is as follows:

Consider the LAN for a small 100-person business, R&D Media, LLC Inc. The business occupies one

has a computer on his or her desk, and there are servers for the web, file and print sharing, email, dat

rack of 20 quad processor Xeon® servers running Red Hat® Linux that generates the actual high-reso

Media, LLC produces for its clients. The desktop systems consist of Apple® Mac® Pro desktops runni

the creative staff, and the latest version of Windows on computers for general use. The servers are ru

Server running Microsoft Exchange®, web server, and file and print service.

The network is gigabit

Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, bu

R&D Media, LLC’s office with laptop computers in order to collaborate on projects. The laptops will obt

DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a

Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits ema

destined for specifically hardened servers.

R&D Media, LLC produces short animation movies for advertiser clients

These clients are located worldwide and need to communicate securely with R&D Media, LLC as they

shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of mov

general Internet web connectivity.

The network has the following additional specifications:

The network is all TCP/IP based.

The network is based on Cisco routers and switches.

All desktop computers include email, web, database access, and office productivity software.

Creative users also have multimedia authoring software installed.

All server and critical network equipment are in a secure server room.

Printers are located around the office area.

The multimedia department uses high-end workstations for video rendering and animation.

A load-balancing dual firewall connects the network to the Internet.

Security Policy:

All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted.

All network resources and equipment must be password protected.

Company equipment may not be used for personal business.

All Windows-based PCs must run approved anti-virus and antispyware programs.

All servers and desktops should run host-based intrusion detection software.

Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no c

able to view the files of any other client.

The mail server must be configured not to forward email that originated on the Internet.

Password aging must be enforced on all servers and desktops.

All server configurations must be readily available to rebuild a failed system.

Offsite backup is required, with 24/7 access to that location.

All employees will demonstrate they understand the security policy.

There will be a security officer who reports directly to the CEO of R&D Media, LLC.

Be sure that you capture the following information in your report:

List of mission critical applications, list of non-critical applications dropped

New technologies for Alternative Processing Sites are utilized

The needs of R&D Media, LLC’s stakeholders are considered within the plan

A Plan for updating alternate processing site software during normal operation

Documentation showing a simple rack diagram and a network diagram

Network configuration info (IP, DNS, MX)

Power consumption estimates

Bandwidth estimates

Information security architecture (firewalls, VPNs)

Plan for cutting over to the alternate plan

Plan for cutting back to the main site (a.k.a. hand back)

Assignment Requirements

Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abs

document your content with proper APA in text citations that match your reference list.

Research

 TopicRelated to access control, authentication, or Public Key Infrastructure. Some examples:

  • Access control or authentication in the cloud.
  • Access control models
  • How to implement PKI
  • PKI standards
  • Tool demo

Requirement (Paper)

  • Research the topic (selection Must be approved)
  • Review (in detail) your selected project 
  • History, Background, and Security Importance
    • IMPORTANT: 
      • Document the project research (minimum of 5 references)
      • Justify why the issue applies to Cybersecurity
      • Justify why this is an important Cybersecurity issue
      • List all assumptions
  • Use the APA paper template
    • Minimum: 15 pages, Maximum: 20 pages.
    • Including the following:
      • Font: New Times Roman, 12 pts, full-page illustrations are not counted as a page. I’ll check: subject matter, contents, linkage, exhibits, etc…
      • Page 1, Title page: subject title, your name, my name, course number and title.
      • Page 2, Abstract
      • Page 3, Table of contents page (Not an APA requirement MY Requirement).
      • Page 4 to 19, Body pages: double spaced, 15 text pages max.
      • Page 20, Reference page. References and quotes will be verified.

Pig programming

PROBLEM 1
Select frequent words (whose count is equal or greater than 50,000). 
Display the frequent words in descending order. 
PROBLEM 2
Get groups of words by their length (Hint: use the built-in function SIZE) and count each group.
For example,
(2,1096049) means that there are 1096049 occurrence of words that have two characters.
Problem 3 is based on dataset nyc_taxi_data_2014.csv.gz
PROBLEM 3
Find the effect of passenger_count on trip_distance, fare_amount, and tip_rate.
a) Create a new data set records2 that has passenger_count, trip_distance, fare_amount, 
tip_rate (tip_amount/total_amount)
b) Filter records2 by passenger_count (0 < passenger_count < 10) and name the data set as 
records3
c) Group records3 by passenger_count. 
d) Display the average trip_distance, average fare_amount, and average tip_rate per each 
group of passenger_count.