Capstone Assignment 1

 

Describe, compare and contrast amongst Traditional warfare, Guerrilla Warfare and Cyberwarfare 

Describe and explain methods used by attackers and their similarities and differences from traditional combat

Writing Requirements

  • 3–4 pages in length (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

HW

 Identify the most important Supreme Court cases and executive actions and their impact on law and on our society. 

Vulnerability Scanner

You will be using your virtual machine from last week and installing, configuring, and then running a vulnerability scanner to scan your virtual machine.  

You will be using a free open-source scanner named Vuls. To help you get it installed and running, you can follow these instructions, which recommend that you use an account named “Sammy.” I did these instructions using my root account and ignored the Sammy parts. (Admittedly, this is poor practice, but for a virtual machine we are deleting at the end of the course, we can bend the rules of best practices a bit.) Follow steps 1 through 6. 

In our instructions for the week, we need to edit a couple commands along the way. This is due to the author of the utilities changing the way that certain command arguments are processed. The functionality still works but the commands will differ. Please make sure you use these modifications in order to not have errors. Again, copy/paste will be the easiest way to capture the changes so you don’t miss a dash or space.

ORIGINAL: for i in `seq 2002 $(date +”%Y”)`; do sudo go-cve-dictionary fetchnvd -dbpath /usr/share/vuls-data/cve.sqlite3 -years $i; done

CHANGE: sudo go-cve-dictionary fetch nvd –dbpath /usr/share/vuls-data/cve.sqlite3

ORIGINAL: sudo goval-dictionary fetch-ubuntu -dbpath=/usr/share/vuls-data/oval.sqlite3 18

CHANGE: sudo goval-dictionary fetch ubuntu –dbpath=/usr/share/vuls-data/oval.sqlite3 18

At the conclusion of Step 6, you will have run the scanner against your virtual machine. There will be vulnerabilities, many of which will be unpatchable. Attach a screenshot to your submission of your results screen. Pick one of the vulnerabilities and answer the following questions: 

  • What is the CVE number of your chosen vulnerability?
  • What year was this CVE discovered? (Hint: this is part of the CVE number!)
  • What software programs are affected?  
  • In your own words, what is the summary of this vulnerability?  
  • Perform an analysis of the likelihood of this vulnerability being exploited. In other words, would this program’s vulnerability be easily exposed to an attacker or would it require a complex scenario to make this exposed?
  • In your opinion, given the CVE criticality and the likelihood, do you feel comfortable with this vulnerable software on your system? 

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

6 different papers —- Easy Own Words, APA format and citations. Please take care of Plegerism

1)   Please read this information on IT sourcing strategies: 

2) 

  • Read the Starbucks case study (Links to an external site.). This  case study uses Porter’s Value Chain and Five Forces models and a SWOT  (strengths-weaknesses-opportunities) analysis to develop strategic  recommendations (review videos posted in week 1). 
  • On page 7 of the Starbucks  case study there are 10 recommendations. Choose 3 of the  recommendations and identify how IT could be used as part of the  implementation of that recommendation.
  • Research in the library how other companies have done something similar for each of your 3 recommendations.
  • Your paper should be at least 3 pages, not counting the title and  reference pages. The paper must include at least 3 references from  peer-reviewed articles in academic journals or authoritative sources  (include an author and publish date).
  • Make sure you have in-text citations and a reference page. You can include additional references from websites and books. 
  • Quotes should be used minimally and support the view you are presenting in the assignment.

3)

 

  • Review the SWOT (strengths, weaknesses, opportunities, threats) analyses for all six cases here (Links to an external site.)
  • Pick one of the six cases and read the complete business plan.
  • Then, create a professional presentation in Kaltura  suggesting how IT could be used to enhance the company’s strengths,  lessen the company’s weaknesses, take advantage of the company’s  opportunities, and / or mitigate the company’s threats. The same IT  solution(s) might accomplish more than one objective in the business  plan.
  • In your presentation, please copy the SWOT analysis from the case and paste that on one of the slides.
  • The presentation should include 2-4 slides to explain the case  including an analysis of the characteristics of the institution in the  case study. Please explain specifically how IT solves a problem and / or  enables new options for the company.
  • The total presentation should be about 8-10 slides, not including  the title and reference slides. The reference slide should be in APA v7  format. Internet references, as well as peer-reviewed journal articles,  are fine. Look for more authoritative sources such as ones with an  author and publish date. The references should include examples of other  companies that have done something similar to support your  recommendations.
  • In-text citations are not required for this presentation and links  to sources should be added to the notes section of the PowerPoint
  • Your presentation should include a voice-over to explain your slides. Please submit your Kaltura video via the assignment link and also include a link to it on the discussion board. 

4) 

  • After watching the videos below and reading about the Balanced  Scorecard in Chapter 12 (Chapter 12.4 starting on page 374), compare and  contrast the Balanced Scorecard to one of the IT frameworks below  (COBIT, ITIL, TOGAF, CMMI-Dev).
  • Describe the context in which the Balanced Scorecard and the IT framework would be used.
  • The paper should 3-4 pages in APA format, not counting the title and reference pages.
  • Make sure you include in-text citations. Your paper should cite at least 3 peer-reviewed articles on IT governance frameworks. 
  • Direct quotes should be used minimally and thoughtfully  

The Balanced Scorecard – Simplest explanation ever – YouTube (Links to an external site.)  

What is a Balanced Scorecard: A Simple Explanation For Anyone – YouTube (Links to an external site.)  

What is IT governance? – YouTube (Links to an external site.)  

What is TOGAF 9.1? | Scott Duffy – YouTube (Links to an external site.)  

5)

 Can Chasing Small Customers Lead to Larger Profits.pdf 

 

Write a summary of the case study that is about one page. Research and describe at least 3 technologies that could be used to support or enhance the business in the case study. Your  paper should include at least 3 references from peer-reviewed journals  associated or authoritative sources (author and publish date) with how  other companies are using the 3 technologies you are recommending. Your  paper should be in APA v7 format and at least 3 pages, not counting the  title page and reference pages. Make sure you have in-text citations  and a reference page.

  • You will use this paper as  part of your IS strategy for week 7. The technologies you choose will be  part of the return on investment analysis for this week’s discussion  board.

Make sure on your references page you include a reference with the  URL to the case study you chose, in addition to at least 3 references  from peer-reviewed journals (APA v7 format)

Please watch Creating Winning IT Strategies video, (Links to an external site.)  which describes how to create an IT strategy. Because the PowerPoint slides in the video are a little hard to read, a copy of the slides is attached here: Gartner-IT Strategy.pptx And you must also reference at least 3 peer-reviewed articles/authoritative source. 

6)

 Using the IS alignment  work and the financial analysis from above question-5, submit a complete IS  strategic plan. Your paper should include at least 5 references from  peer-reviewed journals or authoritative sources (have an author and  publish date) associated with how other companies are using the  technologies you are recommending. The strategy should include the  technologies you plan to implement, your plan for sourcing the IS work,  and the governance model you plan to use to sustain the IS operation  over the long term. You should include specific projects with a timeline  for implementation in your strategy. Make sure you also include the  financial analysis. Your IT strategy should also specify some key  performance indicators (KPIs) to measure the effectiveness of IT. The website below can help you identify the KPIs for your strategy.  

Your total paper should be 5-7 pages of text in APA v7 format, not  counting the title and reference pages, and not counting any tables or  figures. Make sure you include in-text citations. Please use the  template attached above. In developing your IT strategy, please refer to  the resources from previous weeks. You can reference these resources in  your paper, but you must also reference at least 5 peer-reviewed  articles or authoritative sources in APA v7 format.

ITS-834: Emerging Threats & Countermeasures. Discussion, Final Research Project.

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources: 

 M. Ioannou, E. Stavrou and M. Bada, “Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination,” 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.  https://ieeexplore.ieee.org/document/8885240

J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, “Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments,” 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.  https://ieeexplore.ieee.org/document/8914069

M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, “A Study on Security Awareness in Mobile Devices,” 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.   https://ieeexplore.ieee.org/document/8965476

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Web Server Auditing

Word count: 300+ words

Chapters 17, and 18 in the course textbook  

 Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices. 

– Make sure to back up your statements with scholarly support.· 

– Please cite properly in APA 7· 

– At least one scholarly source should be used. · 

– Use proper citations and references in your post.

Final Research Project:

Number of pages: 6+ 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

2. Introduction

3. Roles and Responsibilities

4. Incident Response

5. Plan Activation

6. Document History

7. Procedures

Your poject should meet the following requirements:· 

– 6+ pages in length, not including the required cover page and reference page.· 

– Follow APA 7 guidelines. 

Your paper should include an introduction, a body with fully developed content, and a conclusion.· 

Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

– Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrsThis post has 2 individual assignments (discussion, and Final research project).

Please provide answers in separate documents.  

Chapter 2

1 page 

Search the United States Computer Emergency Readiness Team (US-CERT) website at http://www.us-cert.gov/ for information about buffer overflow attacks. How many programs or operating systems can you identify that are vulnerable to this type of attack?