Week 8 Assignment – System Security Monitoring, Patch Management, and Update Policies

 

Week 8 Assignment – System Security Monitoring, Patch Management, and Update Policies

Introduction

In this assignment, you will develop  corporate policies for system security monitoring, patch management, and  updates that cover both wired and wireless components. A web search  will provide multiple examples of policy documents. The following  resources may also be helpful as you draft your policy documents: 

  • SANS. No date. CIS Critical Security Controls. https://www.sans.org/critical-security-controls/?msc=main-nav     
    • This resource provides a list of case studies highlighting how  security professionals have made improvements in their security  controls.
  • SANS. No date. Security Policy Templates. https://www.sans.org/information-security-policy/     
    • This resource provides a number of security policy templates that might be helpful in drafting your policy documents.

The specific course learning outcome associated with this assignment is: 

  • Recommend best practices for monitoring, updating, and patching systems.

Instructions

Write a 6–10 page paper in which you: 

  • Establish a system security monitoring policy addressing the need  for monitoring, policy scope, and exceptions and supported by specific,  credible sources.     
    • Justify the need for monitoring.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Establish a system security patch management and updates policy  addressing the need for patch management and updates, policy scope, and  exceptions and supported by specific, credible sources.     
    • Justify the need for patch management and updates, aligned with ISO/IEC 27002.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.

Question 7

  

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

1. Provide a high-level overview/ summary of the case study

2. Note how constructive intentionality impacts innovation implementations

3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 4 pages in length (not including title page or references)

· APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

C++

I studied class, iterator, Pointers, Vector, List, and Operator in this course. This is homework about the recursion star battle puzzle. I can’t use getline() in this homework. The output of the program should be exactly the same as the example output file I uploaded. For example, if the example output file name is “out_twonot2_3_one_slow.txt”. There will take “twonot2.txt” as input file and 3 stars. “one” is the output mode mentioned in the hw.pdf. More detail in hw.pdf.

Asymmetric and symmetric encryption

Analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted 

500 words needed

A Paper Summarizing All about Data Science

Introduction of Data Science as Research field

Main Research areas

A survey of the particular research area

A Critique of research work conducted by the research group

3000 words, Bibliography, and References. Any major Journal style.

Project Part 3: Risk Mitigation Plan

 Project Part 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

#Exp19 Access Ch06 Capstone – Northwind Traders Sales Analysis 1.0

 Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

Project Description:

Northwind Traders is a small international gourmet foods wholesaler.  You will update the company’s database by increasing the price of all of  the meat and poultry products. You will make a table for archiving  older order information. You will also summarize quantities sold by  category and identify customers who have no orders.

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Northwind.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Using a select query, you will identify   all of the products with a  category of meat or poultry, and then use an   update query to increase  the prices of the products.
 

  Create a select query that includes the CategoryID from the  Categories table   and the UnitPrice and ProductName fields from the  Products table (in that   order). Run the query and note the CategoryID  for Meat/Poultry.

Add the appropriate CategoryID   criterion to limit the query output  to only Meat/Poultry. Convert the query   to an update query. Update the  UnitPrice for Meat/Poultry only by increasing   it by 6 percent.

View   the query in Datasheet view prior to running it to make sure  you are updating   the correct (four) records. Return to Design view and  run the query. Save the   query as Update Meat/Poultry   Prices.   Close the query.

You will identify orders shipped   during the first half of the year  and create a new table in which to store   them. You will then delete  the orders from the current orders table.
 

  Create a select query that identifies all of the orders shipped Between 1/1/2020 and   3/31/2020. Include all fields from the Orders   table.

Convert   the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive Table. Close the query.

Make   a copy of the Make Orders Archive   Table query and save it as Append Orders Archive   Table.   Open the Append Orders Archive Table query   in Design view. Convert the make table query to an append query. The query   will append to the Orders Archive table.

Modify   the criteria to append orders shipped Between 4/1/2020   and 6/30/2020. Run the query, save it, and then   close it.

Open   the Orders Archive table in Design   view and set OrderID as the   primary key field. Switch to Datasheet view, then save and close the table.

Make a copy of the Append Orders Archive Table query and   save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append   query to a delete query.

Modify the criteria to delete all   archived orders from the Orders table (six records). Run, save, and then   close the query.

You   want to determine how sales are performing with respect to each  product   category. You will create a crosstab query that displays  quantities by   category and salesperson.
 

  Open the Profit query in Design view and add the LastName field from the Employees table to the last column of the   design grid. Run, save, and close the query.

Use the query wizard to create a   crosstab query based on the Profit   query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept   the query name as Profit_Crosstab.

Modify the query to display CategoryName as the row heading field   and LastName as the column heading   field. Run, save, and close the query.

You will create a query to determine   which customers have no  matching orders. The customers will be contacted to   determine if they  would like to place an order.
 

  Create a query to find out if any of the customers have no current  order   details. Add all of the fields from the Customers table to the  results. Save   the query as Customers With No Orders. Run the query and close it.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Design of Experiments

 Start by completing your weekly assigned readings for this module (See “Reading for M9 discussion” file).

For your initial reaction post, think of what makes an experiment a good experiment and why. Also about how do people measure what they need to.

Do include some of the learning from the mandatory reading part and connect with one or more of the articles listed.  Make sure you include references/sources in your posts.

In addition, please reply to at least two different classmates outside of your own initial post thread

http://discovery.ucl.ac.uk/14774/1/14774.pdf 

http://discovery.ucl.ac.uk/14774/1/14774.pdf

https://pdfs.semanticscholar.org/304a/a1a94c9e3920fd125c7408166e7cfe1c3249.pdf

https://www.billbuxton.com/usabilityHarmful.pdf