INFORMATION SYS SEC

  

Prepare a short “talking points” paper in which you answer the question: What best practices should Sifers-Grayson follow when establishing a SOCC?

In your talking points, you should address how your selected best practices support the phases of the incident response process (i.e. Incident Detection, Containment, Eradication, & Recovery) and discuss the role of that a Security Operations Center will play in making sure that incidents are handled and reported in an effective and efficient manner.

Your “talking points” should be 3 to 5 paragraphs long (15 – 25 specific bullet points).

Your audience is a group of Sifers-Grayson executives who are reviewing the plans for establishing an internal SOCC. (Outsourcing the SOCC was considered and that option was rejected.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

Then

Nofsinger Consulting has recommended that Sifers-Grayson invest in an Enterprise Architecture tool to help it document the assets, processes, and network infrastructure that comprise its information enterprise. Based upon past experience with such recommendations, the Nofsinger team knows that it must be prepared for debate amongst the client’s managers and executives as to the relative merits of such tools.

To help your team prepare for the expected debate, you have been asked to write a 3 to 5 paragraph response to the question “Why does Sifers-Grayson need an Enterprise Architecture tool?”

You should focus on the benefits of having a tool that can help guide the creation of an enterprise architecture.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Then

You are approaching the end of your time supporting Sifers-Grayson. Your team leader has asked you to prepare a 2 page research and analysis brief (“briefing paper”) for the company’s executives in which you identify the five most important technologies which the company should adopt in order to improve its security posture.

Provide specific details as to why each technology is required (what is the vulnerability or weakness that the technology will address). Then, make a recommendation for how the company should implement that technology. You must provide specific, actionable information. Your recommendations must also be based upon recognized best practices. Include the following steps in your research and analysis as you select and evaluate technologies, products, and services that will help improve the company’s security posture:

·  

o Identify Candidate Technologies

o Research Products and Services which implement the technologies

o Identify Vendors

o Evaluate Products & Services (use existing market research)

Cite the sources of information used in your research and analysis (document where you obtained your information from). Use a professional citation format and provide a reference list at the end of your briefing paper.

Case Study 1 – Deutsche Bank

 

Please read The Deutsche Bank case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What is blockchain technology, and how can it be used in organizations and industries to create value?2. Is blockchain technlogy a disruptive platform?3. How did the Deutsche Bank managers lay the foundations for commercializing blockchain?4. How should Deutsche Bank move ahead to start crating value from blockchain? Which key issues should it consider?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

Cross-Site Scripting

  • Cross-Site Scripting attack
  • XSS worm and self-propagation
  • Session cookies
  • HTTP GET and POST requests
  • JavaScript and Ajax

Note: Since May 5 2019, the Firefox Add-on “HTTP Header Live” has been disabled by Firefox. Mozilla verifies and signs add-ons that follow a set of security guidelines. The version of HTTP Header Live (v 0.6 – Last Updated April 9, 2018) installed on the VM does not comply with this security guideline, so it was automatically disabled. The issue can be easily resolved by installing the latest version of HTTP Header Live.

Video to help:

https://www.youtube.com/watch?v=sFSq6dsDGzA&feature=youtu.be

COMPUTER

 

Complete the assignment below using Microsoft Excel.

You have been hired by an engineering firm needing a senior level data analyst. Upon accepting this position, your supervisor has a variety of data analysis task for you to complete using PMT and What-IF-Analysis functions. In this process, your supervisor wants you to complete all steps below:

  1. Open a new Microsoft Excel workbook and rename any sheet tab of choice to “My Car” or “My Truck.”
  2. Use the illustration and further steps below to set up and format your worksheet.

  1. Merge and center cells A1 and I1 and then enter a title “My Car” or “My Truck.”
  2. Using a color of choice, fill in cells C3 through I10 and in this colored region, include any picture of choice to represent a car or truck of choice. Nicely format and place this picture within this area.
  3. Then from cell A4 through A10, enter the following labels:
    1. Purchase Price
    2. Down Payment
    3. Trade-in
    4. Amount Financed
    5. Term of loan (in years)
    6. Annual Interest Rate
    7. Monthly Payment
  4. Then from cell B4 through B6, enter a purchase price, down payment, and trade-in value of choice. Then create a formula to calculate amount financed in cell B7. For example, a formula to use in this case would be “=B4-(B5+B6)”.
  5. Then from cell B8 through B9, enter the term of loan in years and an interest rate of choice. Then use a PMT function to determine the monthly payment in cell B10. For example, a formula to use in this case for cell B10 would be “=-PMT(B9/12,B8*12,B7)”.
  6. The illustration below will offer more support on input of all required formulas along with sample data input:

  1. Once all data and calculations are working, do any other housekeeping to include professional format of choice to enhance presentation of data.
  2. Repeat steps 4 through 12 creating another similar model for a house of choice and place this loan analysis model in the same workbook but in a new worksheet naming the worksheet “My Home.”
  3. Once both PMT_Models are complete, go back to My Car or My Truck worksheet and use the illustration below and further enhance the loan analysis using What-IF-Analysis.

  1. In cell A12, type the label Annual Interest Rate. Then merge and center cells B12 through I12 and enter the label Term of Loan (in years).
  2. In cell A13, equal this to cell reference B10. Fill this cell with a color of choice and use the same color for the text color to hide this value.
  3. Starting with cell A14 and ending with A35, enter some interest rates. Make sure data is centered and formatted as a percentage.
  4. Starting with cell B13 through I13, enter some additional term of loan options in years and make sure data is centered.
  5. Using your mouse, select all cells in the range from A13 through I35. Then select the data tab and then the What-If-Analysis tool. From the What-If-Analysis options select Data Table. At this point, a small dialog window will appear asking for Row and Column input cells. For the Row Input, select the value associated with years in the loan which would be an absolute reference as $B$8. For the Column Input, select the value associated with interest rate which would be an absolute reference as $B$9. 
  6. To get a better understanding of the purpose and uses of the What-If-Analysis, be sure to explore www.youtube.com and the keywords “Microsoft Excel What-If-Analysis” to see additional demonstrations.
  7. Once all data and calculations are working, do any other housekeeping to include professional format of choice to enhance presentation of data. Below is an illustration of what your My Car or My Truck worksheet will look similar too:

  1. Repeat steps 11 through 18 creating another similar What-IF-Analysis model for the My House worksheet.
  2. Save and be sure the name of the Microsoft Excel Workbook is “M7_YourLastName”.

Assignment Expectations

Structure and Format: Follow all 20 steps using ideally Microsoft Excel.

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.xlsx”)

Block Chain Technologies and Business

The theme of this research paper is Block Chain technologies. For this assignment, you must

research the theme with a focus on potential business applications of it (including yet beyond

Fintech). You must research current trends and summarize your research as a report. The

general structure of the report is as follows:

1. An introductory section about the current hype surrounding block chain technologies,

providing context for your report;

2. A description of select applications of Blockchain to business (minimum 3). Choose 1

particularly business areas (of your interest) in mind (e.g., HR, Marketing and Sales,

or  Operations) and provide three applications of Block Chain int those business areas. You must also describe and analyze these technologies based on

their potential to be game changers;

3. The challenges for such applications to become widespread and beneficial to

companies;

4. A conclusion section (with your takeaway from the discussion).

requirements

Your report must adhere to APA formatting;

2. You must research at least 5 recent (i.e., less than 5 years) peer-reviewed articles.

Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,

Accenture, Deloitte, Capgemini) will be accepted;

3. Other than APA formatting, the structure for the paper is not fixed, as long as there is

a logical flow of ideas. The length of the paper is 5-6 pages

Homework Discussion

If your boss asked you to create a database that integrated logical design best practices, what are the three most important features you would integrate in your end solution? Remember to not only just state them, but explain why and show examples. Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

IT Management Executive Brief

 

Assignment Content

  1. Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.

    Write a 2- to 4-page executive brief in which you:

    • Discuss how the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance.
    • Discuss how IT policies, standards, and procedures can be used to determine if the enterprise is in compliance and support the IT strategy.
    • Discuss how Quality Management Systems (QMS) are important to ensure quality processes are in place.
    • Discuss how IT management and monitoring of controls can be used to assess IT performance.
    • Format your assignment according to APA guidelines.

      Submit your assignment.