Lab2

 Please complete the full lab and answer all the highlighted questions from the Module 2 document. Including lab steps.  Also please review the APA document before starting the lab.

research paper

Write a scholarly research report on a topic related to Cyber Security based on one of the

following topics:

Step 1: Select ONE Topic:

The Research Report, select one of the following research areas:

i) Biometrics

ii) Organizational Management during times of crisis.

iii) Failures of Knowledge Management Systems.

iv) Successes of Knowledge Management Systems.

v) Social networking in the 21th Century.

vi) Web sports

vii) Search Engine Optimization

viii) Robotics

with 10 pages without including reference page

Cybersecurity

Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and determine which security model it uses. Next, outline the steps it would take to move it to the next highest level. Estimate how much it would cost and how much time it would take to increase the level. Finally, estimate how long it would take you to replace all the data on your computer if it was corrupted by an attacker, and what you might lose. Would this be motivation to increase your current wireless security model? Write a one-page paper on your work.

.

identify five tasks that can use applications in Microsoft Office 2016 Suites and discuss the benefits for each task in relation to your work.

SECURE CLOUD ARCHITECTURE

Pink Sky  Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.   

Here are the current databases under Pink Sky   Datacenter  (on-premises).

Databases for customers to reach 

Database 1: Movie Soundtracks

Database 2: Videos

Database 3: Pictures

Databases for Employees (workforce members) to reach 

Database 4: HR

Database 5: Payroll

Database 6: Heath insurance 

Please address the Pink Sky   Entertainment Company manager’s expectations and requirements.

Question 1: Pink Sky Entertainment products  ( Databases  1, 2, and 3) will be moved to the cloud:  How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud?  The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.

Question 2: Pink Sky   Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and  Pictures)  by having only one account. Pink Sky   Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files.  They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?

Question 3: Pink Sky  Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky   Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?

RFP part 5

 

Module 05 Content

  1. Module 05 Course Project – RFP Part V
    Working off the same Request for Proposal.docx, continue to use your imagination and the fictional website hosting service provider you previously created to complete the following sections of the RFP Response Template.docx that you were developing in the previous week.

    Request for Proposal.docx

    RFP Response Template.docxWith this fictional business in mind complete the following sections of RFP Response Template:

    • Section 4.5.1: Include the services needed as a response to this RFP, then add in service offerings for Credit Card transaction services.
    • Section 4.5.2: Include bulk service discounts for the cloud-service provider of your choosing. Be sure to address web application development and credit card transaction services.
    • Section 4.5.3: Include information about how your fictional organization is consistently growing and as such, the price points for services do change year over year. Draft a paragraph including how these cost savings are evaluated quarterly, and any cost savings are passed to the customers as a credit for services annually.

Final Project proposal

Please choose a topic from the attachment

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list below to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth Library research databases  

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in essay format, not in bulleted, numbered, or another list format. 

organizer of your choice, create a basic

   using a graphic organizer of your choice, create a basic outline of a social studies theme that could be taught over the course of a month or longer.
Choose a topic that would include two or three units that flow in an orderly sequence. Display the unit titles in the graphic organizer with lesson titles and topics. Full lesson plans are not required.
Create a rationale statement as well as a student-friendly title for the entire theme.
Include sections on your graphic organizer for culminating activity ideas, field trips, guest speakers, and other resources, including literature.
Design at least two authentic assessments that address your topic: one formative and one summative.
While APA format is not required for this assignment, solid academic writing is expected and in-text citations and references should be presented using APA documentation guidelines

 

Risk Assessment Plan

After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan.For this part of the project:

  1. Research risk assessment approaches.
  2. Create an outline for a basic qualitative risk assessment plan.
  3. Write an introduction to the plan explaining its purpose and importance.
  4. Define the scope and boundaries for the risk assessment.
  5. Identify data center assets and activities to be assessed.
  6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
  7. Identify relevant types of controls to be assessed.
  8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
  9. Develop a proposed schedule for the risk assessment process.
  10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.

1000 words

APA format with references needed.