Module 01 Content

 

Module 01 Content

  1. For the first part of your project, you have been given a partial audit, performed by a NASA Blue Team. This audit was part of their Certification and Authorization (C&A) process to ensure Country Roads Space Systems (CRSS) has authorization to operate as a 3rd party entity to NASA and allowed to work with NASA assets. The C&A process includes a line-by-line review of all security controls identified within NIST 800-53b documentation, and their sub-sections. During the initial review process, NASA reviewed the existing security controls employed by CRSS and evaluated their compliance to the identified security controls. All items that were found to be non-compliant are documented for review, and a Plan of Action & Milestones (POAM) document was generated as a guideline to correct or evaluate any exemptions found in the initial C&A audit.

    CRSS_InitialPOAM.xlsx

    You will be responsible for reviewing the POAM and familiarizing yourself with the findings. However, you will only be responsible for auditing two security controls that are found to be non-compliant for the audit that you will perform during this course. Please be aware that once you choose your two specific security controls in this Module, you will continue to build on your analysis of these two controls throughout this course. Therefore, you should be take time to consider which controls you choose. In addition, for your two choices, you must choose:

    • One security control from the group of IA-2, IA-3 or IA-5. (NOTE: IA-5 is a common control that often requires remediation in actual security settings. Student who choose IA-5 will be presented with a challenge, but will also find greater documentation when researching remediation.)
    • One other security control from the group of AC-5, PE-13, RA-5.
    • For your Module One Project, start by taking the time to familiarize yourself with the POAM and understand how various systems are evaluated against a common set of compliance frameworks. Study the controls in the POAM and review them against NIST and COBIT frameworks for similar type of controls. In addition, review these security controls against the standards in ISO 27000.Take note on how security controls can be met in diverse ways and still meet overall compliance. With your review of these controls and standards complete, you should feel confident in picking two security control identified in the POAM listed as being compliant. As part you audit, you should also review the company’s network. Please review the CRSS Network Diagram.

      CRSS Network Diagram.pptx

      NOTE: The various frameworks are usually very similar, though differences exist relevant to their industry focus. ISO 27000 and COBIT are meant to focus on private sector compliance, while NIST is focused on public sector.

      You can review each framework at:
      NIST
      COBIT
      ISO 2700

      For this week, you will use the IA security control you chose and in a brief report address the following:

    • Explain the significance of this control and, in your own words, how it protects CRSS and NASA assets. Do you agree with the assessment of the vulnerability described in Column E “Weakness Description”?
    • Next, look up your IA security control in NIST and summarize the NIST standard for one of your controls.
    • Now find the similar standards in ISO27000 and COBIT. Once you find references to security controls that that are closest to the security controls you chose in ISO27000 and COBIT, write a brief explaining the similarities and/or differences between the three standards with regard to one of your security controls.
    • Highlight if you think NIST is the most appropriate set of regulations for CRSS, when compared to the other standards. Which do you this is the most appropriate standard?
    • Do you agree with how the control is remediated in Column K “Overall Remediation Plan”? If so, explain why. If not, please provide an alternative to the Overall Remediation Plan.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Exp22_Excel_Ch09_CumulativeAssessment_Variation_Tips

Exp22_Excel_Ch09_CumulativeAssessment_Variation_Tips

Exp22 Excel Ch09 CumulativeAssessment Variation Tips

Excel Chapter 9 Cumulative Assessment – Variation Tips

  

Project Description:

Your friend Julia is a server at a restaurant. She downloaded data for her customers’ food and beverage purchases for the week. You will complete the workbook by applying consistent formatting across the worksheets and finalizing the weekly summary. The restaurant requires tip sharing, so you will calculate how much he will share with the beverage worker and the assistant 

     

Start Excel. Download and open   the file named Exp22_Excel_Ch09_CumulativeAssessment_Variation_Tips.xlsx.   Grader has automatically added your last name to the beginning of the   filename.
 

  The Excel workbook contains circular references. When you open the file, an   error message displays. This error will be resolved as part of the project.

 

The Tip Left column in the   Friday worksheet contains a fill color and number formatting. You want to   fill these formats to the other daily worksheets.
 

  Group the Friday through Monday worksheets, starting with the Friday   worksheet. Fill the format only for the range E5:E24.
 

  Hint: The Home tab contains the Fill option.

 

Now you want to insert column   totals for the five worksheets simultaneously.
 

  With the worksheets still grouped, insert SUM functions in the range B25:E25   and apply the Total cell style. Ungroup the worksheets.
 

  Hint: The Home tab contains Cell Styles.

 

The Week worksheet is designed   to be a summary sheet. You want to insert a hyperlink to the Total heading in   the Monday worksheet.
 

  On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the   Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to ensure   it works correctly.
 

  Hint: The Insert tab contains the option to insert a hyperlink.

 

In cell A6 on the Week   worksheet, insert a hyperlink to cell A25 in the Tuesday worksheet with the   ScreenTip text Tuesday’s Totals. Test the hyperlink to ensure it works correctly.

 

In cell A7, insert a hyperlink   to cell A25 in the Wednesday worksheet with the ScreenTip text Wednesday’s   Totals. Test   the hyperlink to ensure it works correctly.

 

In cell A8, insert a hyperlink to   cell A25 in the Thursday worksheet with the ScreenTip text Thursday’s   Totals. Test   the hyperlink to ensure it works correctly.

 

In cell A9, insert a hyperlink   to cell A25 in the Friday worksheet with the ScreenTip text Friday’s   Totals. Test   the hyperlink to ensure it works correctly.

 

Now, you are ready to insert   references to cells in the individual worksheets. First, you will insert a   reference to Monday’s Food Total.
 

  In cell B5 on the Week worksheet, insert a formula with a 3-D reference to   cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

 

The next formula will display   the totals for Tuesday.
 

  In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday   worksheet. Copy the formula to the range C6:E6.

 

In cell B7, insert a formula   with a 3-D reference to cell B25 in the Wednesday worksheet. Copy the formula   to the range C7:E7.

 

In cell B8, insert a formula   with a 3-D reference to cell B25 in the Thursday worksheet. Copy the formula   to the range C8:E8.

 

In cell B9, insert a formula   with a 3-D reference to cell B25 in the Friday worksheet. Copy the formula to   the range C9:E9.

 

Now you want to use a function   with a 3-D reference to calculate the totals.
 

  In cell B10 on the Week worksheet, insert the SUM function with a 3-D   reference to calculate the total Food purchases (cell B25) for the five days.   Copy the function to the range C10:E10.

 

The servers are required to   share a portion of their tips with the Beverage Worker and Assistants. The   rates are stored in another file.
 

  Open the Exp22_Excel_Ch09_CumulativeAssessment_Variation_Rates.xlsx   workbook. Go back to the Exp22_Excel_Ch09_CumulativeAssessment_Variation_Tips.xlsx   workbook. In cell F5 of the Week worksheet, insert a link to the Beverage   Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the   Monday Drinks (cell C5). Copy the formula, select the range F6:F9, and then   use Paste Formulas.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

 

Next, you will calculate the   tips for the assistant.
 

  In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate   (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal   (cell D5). Copy the formula, select the range G6:G9, and then use Paste   Formulas. Close the Rates workbook.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

 

You noticed a circular error   when you first opened the Tips workbook. Now you will find and correct it.
 

  On the Week worksheet, check for errors and correct the formula with the   circular reference.
 

  Hint: The Formulas tab contains an option to find circular references.

 

You want to consolidate the   daily averages on the Week worksheet.
 

  On the Week worksheet, select cell J4. Use the Consolidate tool to   consolidate data from the daily worksheets. Select and add the range H4:I8 in   each of the daily worksheets. Use the top row and left column labels when   consolidating data. After consolidating the data, use Cut and Insert Cut   Cells to cut the weekday column labels and data to arrange them in order,   starting with Monday.
 

  Hint: Consolidate is on the Data tab.

 

You want to format the headings   in the consolidated area.
 

  Select the range K4:O4 and apply bold. Change the width of column M to 11.

 

You want to create a validation   rule to prevent the user from accidentally entering a negative value. For   now, you will create a validation in the Friday worksheet.
 

  Select the range E5:E24 in the Friday worksheet, create a validation rule to   allow a decimal value greater than or equal to zero. Enter the input message   title Tip   and the input   message Enter the amount of tip. (including the period). Use the Stop alert with   the error alert title Invalid Number and the error alert message The tip must   be zero or more.   (including the period). Test the data validation by attempting to enter -20 in cell E5 and then cancel the   change.

 

Now you will copy the validation   settings to the other daily worksheets.
 

  Copy the range E5:E24 in the Friday worksheet. Group the Monday through   Thursday worksheets, select the range E5:E24, and use Paste Special   Validation to copy the validation settings.
 

  Hint: The Paste Special dialog box contains the Validation option.

 

You want to unlock data-entry   cells so that the user can change the tips in the daily worksheets.
 

  Group the Monday through Friday worksheets. Select the ranges E5:E24 and   unlock these cells.
  Hint: The Home tab contains the option to unlock cells.

 

Now that you unlocked data-entry   cells, you are ready to protect the worksheets to prevent users from changing   data in other cells. Individually, protect each daily sheet using the default   allowances without a password.
 

  Hint: The shortcut menu from the worksheet tab contains the option to protect   the sheet.

 

The Template worksheet displays   #DIV/0! for cells containing the AVERAGE function. You want to prevent the   error from displaying if no data is entered.
 

  Display the Template worksheet. In each cell in the range I5:I8, nest the   existing AVERAGE function within an IFERROR function. Type 0 in the Value_if_error argument.

 

Hide the Template worksheet.

 

Mark the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.
 

  Hint: The File tab contains the option to mark the workbook as final.

 

Close Exp22_Excel_Ch09_CumulativeAssessment_Variation_Tips.xlsx. Exit   Excel. Submit the file as directed.

Security Architecture and Design – Final project

Final Project 

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. The assignment must be at least 1500 words. Include a cover sheet with a title, your name, class ID, and date at minimum. 

Your work over the next 8 weeks will lead up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses:

  • Financial (Bank, brokerage, Insurer, etc.)
  • Hospital/Medical Services
  • Pharmaceutical/Chemical
  • Social Media Company
  • Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
  • Manufacturer (Automobile, Computer, Consumer Electronics, etc.)

Respond to the following: 

  • Identify the business type you have selected for your paper.
  • Provide a brief overview of the business
  • Provide the goals and approach to the project
  • Architectural diagrams and annotations

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. Check your work and correct any spelling or grammatical errors. Include at least two APA most recent references. 

Graphical user interfaces available for the Linux platform (cybersecurity)

 

There are several different graphical user interfaces available for the Linux platform. Search the Internet and locate the website for a graphical user interface, other than KDE. Familiarize yourself with its capabilities and summarize them in a posting to the Week 7 Discussion forum. Make your initial posting early in the week to give others time to respond to your posting. Remember to cite your sources.

Offer your personal and professional comments, suggestions, reflections, opinions. If the topics in the discussions for the week are new to you, then feel free to offer user-friendly places for students to find additional information about the topic. In other words, contribute to our discussions as we move toward a better understanding of the topics.

stems Engineering

Ielations, etc. Please do not use Course hero or Chegg for any answers. Also if it involves a graph or data sets do not cut off. Thanks! This is Due Wednesday night at 11:30 pm 3/10/21. 

Research Paper

Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning. (2) Questions to consider when implementing scenario planning. (3) The common types of scenario planning.Your paper should meet these requirements:  

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Policy Framework

  • Vision Statement: Develop a vision statement for the policy and IT ethics outlining its purpose and strategic goals.
  • Key Terms: Define key terms, acronyms and abbreviations used in the policy and in IT ethics.
  • Roles and Responsibilities: Define roles and responsibilities in developing, approving and maintaining the policies and IT ethics.
  • Process: Define the process used in developing and maintaining IT policies and ethics.
  • Scope: Define the policy and ethics and their scope.
  • Risks and Mitigators: Develop a list of ranks, ordered risks, and mitigators for those risks.
  • Relevance to Goals and Policies: Analyze and document how the policies and ethics fit the company’s goals and policies.
  • Change Management Plan: Develop a change management plan for maintenance of the policies and ethics, including roles responsibilities and signoff procedures.
  • Implementation Plan: Develop a roll out timeframe and implementation strategy.
  • Approvals: Sign off blocks for each level of management for the document.

Create a professional business document template, table of contents and appendices (if needed).

The framework should be a detailed outline of topics that will potentially be in the final product. You may want to include multiple approaches for critique that can be reviewed by the CEO. Think of this as building a template that you will fill in with details after continuous critique.

C++ programming

Implement stack using STL by extending Bag Interface class. Also use exception handling (for error handling) and file handling (to read in the inputs)

ISO 27001

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.