Benchmark – Developing Enterprise Framework for a Security Program

  

COMPANY PROFILE: 

Mission Statement

The mission of Across the States Bank is to provide superior customer service and tools that enable citizens of the United States to manage their money domestically and abroad.

Vision Statement

Our vision is to become the premier banking services provider across all business segments through offering outstanding customer-centered service.

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and      checking accounts
  • Debit and credit      cards
  • Personal and      automobile loans
  • Home loans,      including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment      banking services
  • Wealth management      and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings      and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment      banking
  • Trust services
  • Shareowner      Services

Strategic Goals

  • Increase annual sales to $12 billion within the next 3 years.
  • Improve customer relations and customer service response times through the implementation of a state-of-the-art customer resource management system.
  • Increase services in the commercial sector by 15%.
  • Achieve      an average customer service satisfaction survey score of 95%

1. Select a fictitious company to use for the duration of this course and create an associated abbreviation (e.g., Across the States Bank (ASB), Lopes Manufacturing (LM), or Pike’s Peak Health Care (PPHC)).

2. For the company selected, research online or use Chapter 2 of the textbook and identify, at minimum, two laws or regulations that include a set of standards the organization must implement to achieve compliance (i.e., PCI DSS, HIPAAHITECH, ISO/IEC 27001:2013, or NISPOM 5220.22).

3. Use the “NIST 800-53r5 Framework – Appendix C,” the two identified laws, and the “ITT-430 Developing Enterprise Framework Template,” to map the various standards to the controls within the framework. Refer to the “ITT-430 Developing Enterprise Framework Example.”

4. Map a minimum of two NIST controls per law or regulation. NIST 800-53 controls may duplicate across standards as shown in the Developing Enterprise Framework Example (see SC-13).

5. Complete at least 25 mappings.

6. In the “Notes” column, briefly explain the purpose that the two laws or regulations and the associated controls are trying to achieve. For example, the first row in the example is establishing a policy on risk assessment and the identification and management of threats and vulnerabilities.

7. Research and create a security program framework outline for your fictitious company that aligns to the mission and vision of the company. Your outline should include a table of contents; list the topics your company would need to address in order to resolve the many issues of its business concerning confidentiality, integrity, and availability.

8. In 500–750 words, explain your security framework outline and how it is specific to your company. Explain why you chose to include your specific topics and how they will help to secure your companies interests as well as systems long term, differentiating between legal, regulatory, and framework compliance needs. Describe the major components, policies, and processes related to cyber defense, security controls, and network security.

9. Include at least two references outside of the required reading.

IR Plan Review

We will be focusing on reviewing an incident response plan. Some organizations treat these as sensitive and secret. Others post them online for anyone to read. In this exercise, you will be making use of a publicly posted one. Do some Internet searches to find a suitable incident response plan. Download it and submit it as part of your submission work.

For the next part of your work, you will be reviewing that plan and comparing it against the NIST 800-61 guidelines (Links to an external site.). Focus on section 2.3.2 Plan Elements. In your submission, compare your chosen plan against the elements in the NIST document. Document which sections are included, which are missing, and which are additional. State, in your opinion, whether the missing sections are impacting the effectiveness of the plan and whether the additional sections are adding value to the plan.  

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

Questions

 

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Complete your answers on a WORD Document

Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction

 

Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction.

 Project Description:

 

You work as a data analyst for Camino Marketing, a U.S.-based web marketing company. You have been asked to conduct an employee satisfaction survey. As part of the survey, you will collect sample data to help provide insight into employee salaries, productivity within the three national offices, and to predict the growth of the New York office’s client base by 2025. Start   Excel. Download and open the file named Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx. Grader has automatically added   your last name to the beginning of the filename. Ensure the Employee Satisfaction   worksheet is active, then use the FREQUENCY function to calculate the   frequency distribution of job satisfaction in column D. Place your results in   the range G5:G9. Enter a function in cell G12 to   calculate the standard deviation of column c. Enter a function in cell G13 to   calculate the variance between salaries.  Enter a function in cell G14 to   calculate the Covariance of the salaries and job satisfaction in the data   set. Note this is a sample of data not a population. Enter a function in cell F17 to   calculate the correlation coefficient between employee salary and job   satisfaction. Ensure the Data Analysis ToolPak   add-in is active. Use the Data Analysis ToolPak to create a histogram based   on the salaries in column C. Use the range I4:I9 as the Bin Range. Ensure   that Cumulative percentage, column labels, and chart output are included in   the results. Place the results in cell K4. Edit the result text in cell K4 to   display   Salary, if   necessary. Ensure the Office_Data worksheet   is active. Use the Data Analysis ToolPak to perform a single factor ANOVA on   the range C3:E35. Place the results starting in cell G3. Be sure to include   column labels. Resize columns G:M as needed. Create a Forecast Sheet that   depicts year over year growth in customer growth. Set the Forecast end year   as 2025 and place the results on a new worksheet named 2025Forecast. Ensure the Customers worksheet   is active then create a scatter plot chart that places the Years on the X   axis and the Clients on the Y axis. Add a linear trendline to the chart that   also shows the Equation and the R-square. Add the title Customer   Growth. Enter a function in cell E4 to   calculate the intercept of the linear trendline created in the prior step. Enter a function in cell F4 to   calculate the Slope of the linear trendline. Enter a function in cell G4 to   calculate the R-square of the linear trendline. Enter a function in cell H4 to   calculate the Standard Error.  Use the FORECAST.LINEAR function   in cell E7 to the total number of customers by the end of 2021.  Complete your analysis by added   formulas in the range F7:G7 to calculate the high and low thresholds of the   forecast. Save and close Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx.   Exit Excel. Submit the file as directed. 

PowerPoint Presentation (20-25 Slides)

PowerPoint Presentation of 2 Chapters 

***Total of 20-25 Slides

Chapter 11 – Payment Systems for Electronic Commerce

Include the following:

-Common Online Payment Methods 

-Payment Cards

-Digital Cash

-Digital Wallets

-Internet Technologies and the Banking Industry

-Payment System Threats: Phishing and Identity Theft

Chapter 12 – Managing Electronic Commerce Implementations

 Include the following:

-Identifying Benefits and Estimating Costs of Online Business Initiatives

-Strategies for Developing Electronic Commerce Web Sites

-Managing Electronic Commerce Implementations

———————-

Chapters are from the book Electronic Commerce by Gary Schneider 12th edition if possible use book if not possible then normal power presentation using the Chapter Titles and included terms. 

INT 1010 1

 

.  Please answer the question below and submit as a MS Word document.

Of  the five primary components of an information system (hardware,  software, data, people, process), which do you think is the most  important to the success of a business organization? Write a  one-paragraph answer (5 sentences but less than 8) in your own words to  this question that includes an example from your personal experience to  support your answer.

Final Research Project

 Research Project Topic: “Relationship Between Cloud Invoice and DOS Attacks”

It must consist of:

1. Five source annotated bibliography

2. Slide presentation with 12 or more slides(ppt)

3. Summary or Abstract containing at least 750 words.(word)

add references

Lab exercise

   

Payroll Lab

You will be taking in a file (payroll.txt) which details a number of departments (at least 1) and in each department are a set of employees (each department will have at least 1 employee or it would not appear on the payroll sheet). Your job is to read the file in separate out each employee and calculate the total values (hours, salary, number of employees) for each department and in each category (F1, F2, F3, F4). In your final submission please include the .cpp file which should work for any kind of payroll file I supply (which will naturally match the format of the examples below). Be sure to indicate in your submission text if you have attempted any of the bonus points .

   

An example file:

The IT Department
Bill 8 7 8 9 7 F1
Bob 205103 0.08 F3
Betty 8 8 7 8 8 F2
Brandon 10 10 9 6 9 F2
Brad 9 8 10 9 9 4 1 F4

The Sales Department
Kyle 88840 0.105 F3
Tyler 105203 0.085 F3
Konner 8 6 7 6 9 F2
Sam 309011 0.045 F3
Kent 9 8 9 9 9 0 0 F4
EOF

An additional example file:

The Sales Department
Mike 5 6 1 3 5 F1
Mark 98103 0.115 F3
Jill 8 8 8 8 8 F2

Frank 106101 0.095 F3

Mark 76881 0.091 F3

Department of Records
Konner 8 6 7 6 9 F2
Tammy 7 3 7 2 8 F1

Anika 8 8 8 8 8 F2

Marta 1 0 0 5 2 F1
Kent 9 8 9 9 9 0 0 F4
EOF

   

Last in the row after the hours comes the pay grade (F1, F2, F3, F4). The number of hours recorded is based on the pay grade of the employee. F1 and F2s will have 5 numbers for their hours. F3s are commission based where a sales amount and a commission percentage is given. F3s are also assumed to work 30 hours if their commission is 10% or below and 40 hours if their commission is above 10%. F4s will have 7 numbers (as they are on-call during the weekend). Each of the pay grades will also have different pay calculations which are as follows:

F1 = The total number of hours * 11.25
F2 = (The total number of hours – 35) * 18.95 + 400
F3 = The total sales amount * the commission rate
F4 = The first 5 hourly totals * 22.55 + Any weekend hourly totals (the last 2) * 48.75

Your output to the screen should start with the department name, followed by the total pay for all of the employees, then the total number of hours, and the total number of employees. After that you should have a breakdown of each category of employee: F1 total pay and total hours, F2 total pay and total hours…

Each department will have at least 1 employee and each department will contain the word “Department.”

The IT Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Bill, Bob, Betty, Brandon, Brad 

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

The Sales Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Kyle, Tyler, Konner, Sam, Kent

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

Before coding your solution, take the time to design the program. What are the possible things that the file can have that you need to anticipate? What are the actions that you need to take (read the file, add up hours…)? Are those actions things that could be placed in separate functions? What about the function – can you guess some of the things that will happen? Such as, using substring to pull out part of a line in the file maybe using stoi to convert a string to an integer to add it to the total or creating variables to hold the employee type you find before passing it to another function. Finally, how are these functions called, what is the order and what information is passed to and from? 

Scoring Breakdown

25% program compiles and runs
30% program reads in and calculates the figures for output
10% the program is appropriately commented
35% outputs the correct information in a clear format 

5% bonus to those who can output the F# responses in a columned output like that shown above.

5% order the employees in the roster according to their F status, F1’s first, then F2’s and so on.
5% bonus to those who do a chart comparing the data at the end to show the relation between the pay grades and the amount of salary spent in each (they style of chart is up to you and more points may be given for more difficult charts (like a line chart):

   

B Department
F1 – 00000000
F2 – 000000
F3 – 00000
F4 – 000000000000 

K Department
F1 – 0
F2 – 0000
F3 – 0000000000
F4 – 0000000 

  

Or event something like this instead:

0
0 0
0 0 0
0 0 0 0
0 0 0 0
F1 F2 F3 F4

Assignment on Linux 4

 Do the following assignment based on the attach document. use jeannese as first name then Evina as last name to execute the commands. Post a screenshot of all the work on a word document. All commands use to execute the process most be seen and should enable another person get the same results.