Mid-Term

Your midterm project was to provide a security assessment for [X], an online software company that specializes in selling ad spaces in their parent company’s magazine.  [X] manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because [X] ‘s database needs to connect to the parent company’s database, the parent company has requested that [X] system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide [X] with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

(Note: [X] can be any company and any line of business)

1. Cover Page (i.e. APA title page)  

2. Background (provide a synopsis of your midterm security assessment on Vestige)  

3. For each security need identified (or needs to be identified) from your Midterm Assignment, Find the products that will deliver the needed capabilities for the right price and tell why you chose that product.

This assignment should be about security needs only.  Do NOT discuss how the client can achieve more business (That is not your job).

Answer the questions with an APA-formatted paper (Title page, body, and references only).  Your response should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstracts are not required.

A minimum of two references is required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes the author’s name, year of publication, and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  The resulting score should not exceed 35%.

NOTE: Please find related content in Chapter 12 from textbook Securing Systems: Applied Security Architecture and Threat Models.

NOTE: I have attached the Mid Term project for reference.

Write a function called

  

Write a function called strcmp373, which compares two strings in precisely the same way that strcmp does in the C library . This time, please use “pointer syntax” in writing this function. That is, the [ ] operator should not be used at all when referring to particular characters in string1 and string2; instead, all parameters and local variables should be declared as pointers (using the * symbol). You may not use any of the built-in C string library functions to complete this code. Here is the prototype of this function:
int strcmp373(char *string1, char *string2);

30/p2

  • What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
  • What actions must be taken in response to a security incident?
  • What is computer forensics, and what role does it play in responding to a computer incident?

Paper Work

  

Final Project Options:

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

List of DoD policies

Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.

NE : Database

 

D6

 Write an essay of at least 450 words discussing the use of encryption to protect data at rest, in motion, and in use.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

D7

Discuss in 450 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a fingerprint?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.