ERM Road Map

Overview

The following material may be useful for the completion of this assignment. You may refer to the documents Embracing Enterprise Risk Management: Practical Approaches for Getting Started and Developing Key Risk Indicators to Strengthen Enterprise Risk Management at the Committee of Sponsoring Organizations of the Treadway Commissionwebsite.Imagine you are an information technology manager employed by a business that needs you to develop a plan for an effective enterprise risk management (ERM) program. ERM has not been a priority for the organization, but failed corporate security audits, data breaches, and recent news stories have convinced the board of directors that they must address these weaknesses. As a result, the CEO has asked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program to address this area.

Instructions

Write a 3–4 page paper in which you:

  1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
  2. Recommend the approach management should take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
  3. Analyze the methods for establishing key risk indicators (KRIs).
  4. Suggest the approach that the organization should take to link the KRIs with the organization’s strategic initiatives.
  5. Use at least three quality resources in this assignment (in addition to—and which support—the documents from the COSO website referenced in this assignment). Note:Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Propose a risk management program based on the COSO framework.

CMPUTER NETWORKING3

Please provide an elaborate answer to each of the following questions:

1. Name the advantages of optical fiber over twisted-pair and coaxial cable. Please elaborate on your answer.

2. What are the Basic Types of Topologies? What capabilities and limitations do they have?

3. Explain routing concept?

4. Explain switching concept?

5. Explain routing algorithms?

6. What are the four generic architectural components of a public communications network? Define and elaborate on each of term.

7. Explain and elaborate on the impact that communication network applications have had on business and everyday life.

8. Why are standards important for protocols? Please elaborate.

Word Count: 5000 words (maximum)

Your work needs to be well written and have quality information. Your work must be clear and must be able to educate someone with no prior knowledge in the field of operating systems.

Assignment Evaluation Rules:

• Overall presentation 10%

• Structure 10%

• Introduction 10%

• Main body

o Critical analysis/evaluation 50%

o Recommendations 10%

o Conclusion 10%

Quiz

1. What does the Encarta versus Wikipedia story tell you?

2. What did we learn from the Lepper and Green study of children at play?  (Hint:  expected, not expected, no reward.)

3. What was the learning point from the Dan Ariely’s study in Madurai, India?  Hint: (Respondents played several gamesearning the sum of four, 40, or 400 rupees.

4. Some argue that companies that spend the most time concentrating on quarterly earnings deliver significantly lower long-term profits?  Do you agree?  Defend your answer?

5. What was the author’s belief about contingent (do this and get this) rewards?

Ethical Hacking – Penetration Test, Web Application analysis

1.Document the setup of the environment as you are preparing to conduct a penetration test for a customer. As described in class, do a complete recon and come up with a potential attack plan. Describe your efforts and plan in a 2-page APA6-style report (MS-Word document only) of the tools and methods that you will be using to conduct the test.

2. 
Setup and configure the system to run 3 types of Web servers on 3 different systems:  

  1. Ubuntu – Web server of your choice (i.e., Apache) – 10.10.1.11
  2. Metasploitable – already running Web services – 10.10.1.12
  3. Windows – IIS Web server. – 10.10.1.13

Use the Kali system to perform a vulnerability scan of the different Web servers to identify possible exploits.  Document up to 3 vulnerabilities for each environment.  Provide screenshots of the Oracle Virtual Machines to demonstrate the configuration.Some tips:- You don’t have to run all four systems at once, pair Kali-Ubuntu, complete tasks, shutdown Ubuntu, then Kali-Metasploitable, etc.- Make sure you don’t run out of CPU, memory, storage by overprovisioning VMs; usually 2GB and 1 or 2 cores each is enough. The suggested computer setup is 4 core CPU (8 with hyperthreading) and 16 GB RAM.- Take screenshots of Kali and target systems and include them in your submittal, along with narration of your steps and the thought process.
 

Discussion 300 words

 What is the weakest link in the security of an IT infrastructure?  What are some of the strategies for reducing the risks? 

Dark Web

Need below questions in a word document in APA format with no less than 500 words along with 2 references & citations

  1. In your own words, describe the Dark Web.
  2. What type of content is generally found on the Darknet?
  3. What kind of information can be found using the hidden wiki?

cloud service model

 

i want to select a type of cloud service model(s) that i  will use for a case study project.

 Describe the patterns of implementation of the project infrastructure in your report.

 at least 2 pages r APA format. Cite any outside sources used in an APA-style reference page.

computer science

 

The NSA has identified what they call the First Principles of cybersecurity. The following List three of these:

PrincipleLast Name Starts WithInformation Hiding    A through HLeast PrivilegeI through QModularizationR through Z
 

assembly language assignment

Algorithm Workbench page 202

Write answers and submit pdf file with your answers. Complete program nor output NOT
needed.

1. Write sequence of instructions that will use ONLY PUSH and POP instructions to
exchange values in EAX and EBX.

2. Suppose you wanted a subroutine to return to an address that is 3 bytes higher than the
return address currently on stack. Write a sequence of instructions that will be inserted
just before the RET statement to accomplish this task.

Submit one pdf file that has all your work.