Week 2 Discussion – Telecom

Create a discussion thread and answer the following question:

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

ITSD325U21P

 

Assignment Details

Organizations must manage and administer an e-commerce site with attention to vulnerabilities to both organizational assets and client data. E-commerce creates potential vulnerabilities for the loss of personal information. Click the following article, which explores this topic:

Does E-Commerce Have a Digital Privacy Problem?

Search for and examine a case of an e-commerce site that has been compromised within the last 6 years. In your own words, summarize (2–3 paragraphs) what happened, addressing the following information in detail:

  • How many customers were affected and what kind of data was lost? If the organization was not sure (or did not say) what was lost, state this in your post and discuss any potential consequences for customers.
  • What steps did the organization take to address concerns? Alternatively, what lessons does this example offer?

Provide a reference (with link) for your case example.

When replying to fellow students, look for opportunities to connect their responses to other topics in the current unit, including points that you may have made in your own posts. You may also spot an opportunity to connect the discussion to an article or news story that you have read about, which you can link in your reply. In addition, you can share how your experience with the course content has shaped your opinions and ideas about e-commerce requirements and how participating in this discussion has done so.

Grammar, spelling, punctuation, and format should be correct and professional. Begin contributing to the discussion by Friday.

Reference

McKnight, P. (2019, July 12). Does e-commerce have a digital privacy problem? American Bar Association. https://www.americanbar.org/groups/business_law/publications/committee_newsletters/cyberspace/2019/201907/privacy/

Initial Coin Offering

For this assignment, you’ll create a lightweight white paper for a fictitious Initial Coin Offering (ICO). You will use your imagination to create a brand new, hopefully unique, ICO, and develop a lightweight white paper that presents your ICO to prospective investors. A full white paper takes considerable time and effort to create. For this assignment, you’ll only be asked to provide the most essential elements. 

The goal is for you to be creative in your application of blockchain technology, and the explain your ideas. 

To start, read the following article: How to Write a Good White Paper for Your ICO

–  https://applicature.com/blog/token-offerings/write-good-white-paper-ico

Then, explore new and existing blockchain projects in any domain that interests you. You can start with an Internet search for “blockchain use cases” and “current blockchain projects.” Identify a few that you find interesting and learn about each one. Then, think of a new idea how you could apply blockchain in a new and useful way. 

Once you have your idea, create your white paper. Your 6-9 pages paper should be in APA format, and have the following sections:

1) Title – a headline that will catch your reader’s imagination

2) Abstract – Summary of what your whitepaper contains

3) Introduction – Introduce readers to the problem you will solve, the motivation to solve it, and how you’ll present your solution.

4) Problem/Market consideration – Explain the current situation (expand the problem from the introduction).

5) Solution – Describe your solution.

6) Summary – Close the sale.

7) Reference Lists

Risk Assessment Tools Response

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

1. What software applications or “tools” would you use? 

The first tool in my kit would be Cacti. Cacti is a very well know network monitoring software. After searching the web this product was found in most articles concerning network monitoring. Monitoring the network is half the battle. The second half is interpreting and visualizing the information. Cacti provides the user to present that information on charts and graphs they can customize to their personal preference. To help mitigate risk I would also add Avast for online protection. This antivirus is excellent in protecting from viruses and malware. It also disperses information to users when new fixes for threats and vulnerabilities are found.

Windows would be the incorporated platform. Windows is the most universally used OS in the private and commercial sectors. Familiarity with the OS leads to less chance of human error, the toughest element to mitigate in a risk assessment plan.  

I would use AirMagnet for wireless network monitoring. It is a more proactive tool to use, which helps with identifying and combating threats. Total AV is a good antivirus I would user for the assessment. This product actively monitors and and some cases remove threats.

-ANDREW

RESPONSE 2:

What software applications or “toolkit” would you use?

Right off the bat I would start to look for the best vulnerability scanner. I chose this because before I start to do any deep digging I want to know where I should start. This will also help me determine the scope of my assessment. The software I would choose for this would be Network Configuration manager due since it automatically finds issues across your network.

What platform (Operating System) would you use?

As far as the operating system I would probably go with windows. Although I could probably do just fine on a Mac I think windows would work best for me. 

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment? You can list other types of related assessments if you know how you might adjust for the given scenario.

For an application assessment I would tailor my tools more toward applications and the rights they access within the computer. With a network assessment I would focus more on security of the network. 

-WINFRED

Week 11 Assignment

Assignment 1

This a research project and on this week, Choose any one topic and should stick to the same topic for coming weeks. Write a short paragraph (250 words) describing your project and how you intend to research it.

· Cloud Computing

· Computer Forensics

· Data Center Security

· Disaster Recovery

Assignment 2

Do a bit of research on penetration testing techniques. Investigate and document the following:

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration testing

Note: Please write between 250 words with intext citations and 2 references needed.

Software Development Life Cycle

You are attending a meeting regarding project development using the SDLC. Your manager is giving a high-level overview of the SDLC process, but your colleagues look confused about some of the points. As a result, your manager asks you to schedule a meeting to present the four phases and the importance of each to your colleagues. In your own words, how would you explain each of the phases to your colleagues during the meeting? Provide specific examples that will help them understand each of the phases and their importance.