Exp19_Excel_Ch12_HOEAssessment_To_Do_List

Exp19_Excel_Ch12_HOEAssessment_To_Do_List

  

Project Description:

You have been named the new social director of your schools student government association. As part of your position, you organize, meetings, study sessions, and social gatherings. To help manage planning, you have decided to create an Excel template that can be reused each month. To complete this task you will download and edit a template from the template gallery. Automate the portions of the worksheet using the macro recorder and VBA, as well as inspect the document for compatibility and accessibility issues.

     

Start   Excel. Download and open the file named Exp19_Excel_CH12_HOEAssessment_ToDoList.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Select the range B2:I7. Click   the Data tab, click Data Validation, and click the Input Message tab. Click   Clear All to remove all data validation comments added by the template   creator. Click OK.

 

Delete column C.

 

Click cell B3, click the Review   tab, and click New Comment. Type the comment Enter Task. Using the previous method, add   the following comments to the corresponding cells.
 

  C3 – Enter   Status
  D3 – Enter   Start Date
  E3 – Enter   Due Date
  F3 – Enter   % Complete

 

Ensure the Developer tab is   enabled. Click cell B4. Click the Developer tab and click Use Relative   References in the Code group. Use the macro recorder to record a macro named DateStamp that inserts the current date   in the active cell. (Note, Mac users, Use Relative References is not   available on Mac).
  Hint: to insert the current date, press CTRL + :

 

Open the VBA Editor and insert a new module. Enter the following code   to create the reset procedure. Once the code is entered, run the macro, and   exit the VBA Editor.
  Note: To exit the VBA Editor, click File and select Save and return to Excel.   Alternatively on PC, press ALT+F11 or ALT+Q.
 

Sub Reset()
‘Resets To Do List
Range(“B4:H7”) =   “”
End Sub

 

 

Insert a Form control button   with the caption Date Stamp spanning the cell C9 and assign the DateStamp   macro. Ensure that the button remains within the borders of cells C9.

 

Insert a Form control button   with the caption Reset spanning the Cell D9 and assign the Reset macro. Click cell B4   and press the Date Stamp button to insert the current date. Then click the   Reset button to test the functionality of the newly created form control   button. 

 

Use the Accessibility Checker to check and identify accessibility   issues. Use the Accessibility checker pane to unmerge the range B2:H2 and   change the Table style to White Table Style Medium 1.

 

Select the range B2:H2, and   remove all borders. Select the range C2:H2, and apply the cell style Heading   1.

 

Select cell B2 and apply the   cell style Heading 2.

 

Insert a new worksheet named Code.

 

Open the VBA Editor, Module1,   and copy the code. Paste the code in the Code worksheet starting in cell A1.

 

Open the VBA Editor, open   Module2, and copy the code. Paste the code in the Code worksheet starting in   cell A10.

 

Save and close Exp19_Excel_CH12_HOEAssessment_ToDoList.xlsx   as a macro-free workbook (.xlsx).   Exit Excel. Submit the file as directed.

Discussion Reply!!! About 50 words

 

  • What suggestions do you have for your classmates on their network cabling? 
  • Are there any other suggestions for what they should consider for their equipment setup? 

 

  • Where are you moving to for your new work-from-home position? Which  ISPs are available at this location? Which do you pick and why?

    I  chose Dallas Texas as the city the work from home job is in. This city  has quite a few ISPs. The ISPs range from at&t to T-Mobile to  spectrum, but the ISP I chose is called Earthlink Internet. The reason I  chose this provider is they have decent reviews and seem to be very  reliable along with the high speeds for the internet of up to 5000 mbps  download and upload with there most expensive option and even though it  is very pricy with prices reaching up to $190 one of the cheaper options  at $90 is the same price as the internet i am currently paying for and  provides 1000 mbps download and upload. 

  • What equipment do you need for your work-from-home position? What  does your ISP provide? What does your employer provide? What do you need  to provide?

    Earthlink does not provide any hardware so I would  need both a modem to have access to the internet an a router to send a  WIFI signal out. Some companies usually provide what is need for the job  itself but if this company does not I would likely need to get a  computer equipped for the job and a phone. 

  • What types of network cabling will you be using and with which devices?

    The ISP I chose uses fiber optic cables foe the modem so that is what I would be using.

  • How do you determine the IP addresses on your devices?

    You can usually determine the IP address on devices through the WIFI settings on your devices.

  • How will you set up equipment in your office in your new home? Will  you be using wireless or hard wire for your network connection? What  else should be considered?

    Everything will be set up neatly in  one of the rooms it will be the same room as the modem and router for  optimum internet connection. I will have to get a desk for the setup and  a VPN for all of my devices.

References

Work From Home Technical Requirements, 2022, https://tbcdn.talentbrew.com/company/430/v2_0_US/pdfs/WFH-Tech-Requirement.pdfLinks to an external site.

Earthlink Internet, 2022, https://inmycity.earthlink.com/

Assignment

 Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources. 

Case Studies

D 2.1

From the lecture and from chapter 2 of the book, What are the types of hackers and what defines them? A hacker’s skills can range from the novice to the very experienced.  What differentiates a novice hacker versus a very experienced hacker?  What are the ways that a hacker can “perfect” their skills?  

CS 2.1

Conduct research on one of the following attacks (DAPT, Stuxnet, Duqu, or the Iran Certificate Attack.  In a 3 to 4 page paper (not including title and reference pages) provide a brief synopsis of the attack.  Use what you’ve learned in the first 3 chapters of the course.  Some information that should be included in your paper is, the type of attack, why the attack occurred, and who conducted the attack.    Be sure to cite your sources and follow APA formatting.  Some sources for the attacks can be found on page 50 of your online textbook. 

Book Review Chapter 2

Chapter two, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on one of the topics  based on the web sites found on page 50 of the book

Enterprise Key Management

  

Enterprise Key Management

As a security architect and cryptography specialist for Superior Health Care, you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted.

You’re also expected to understand health care regulations and guidelines because you’re responsible for advising the chief information security officer, or CISO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.

You also have a team of security engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives.

This week, the CISO calls you into his office to let you know about the company’s latest initiative.

“We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration,” he says.

The CISO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.

The plan will help create an enterprise key management system.

The SEs would be responsible for the implementation, operation, and maintenance of the plan and system.

The CISO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.

The new web-based system needs to be running in a month. So, you’ll have a week to put together your enterprise key management plan and the accompanying policy.

Close

Project 1: Enterprise Key Management
Start Here

Transcript

In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

The following are the deliverables for this project:

Deliverables

  1. Enterprise      Key Management Plan: An eight- to 10-page double-spaced Word      document with citations in APA format. The page count does not include      figures, diagrams, tables, or citations.
  2. Enterprise      Key Management Policy: A two- to three-page double-spaced Word      document.
  3. Lab      Report: A Word document sharing your lab experience along with      screenshots.

There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”

Project 1: Enterprise Key Management
Step 1: Identify Components of Key Management

Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handlingand identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Step 2: Learn Key Management Capabilities

You have successfully examined the major components of an enterprise key management system for Superior Health Care. Enter Workspace and complete the “Enterprise Key Management” exercise. Conduct independent research on public key infrastructure as it applies to your organization.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC      Virtual Labs Support
  • Customer Type: Student      (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber      (CST/DFC/CBR/CYB)
  • SubType Detail: Pick      the category that best fits the issue you are experiencing
  • Email: The      email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

In the next step, you will identify the key management gaps, risks, solutions, and challenges found in corporations.

Professionals in the Field

Being able to interact with a variety of stakeholders is a skill set on which you will want to evaluate yourself and improve where necessary so that you can present that skill on paper and in person. 

As an example, consider the range of stakeholders in a health care setting: medical techs, doctors, data entry clerks, office and hospital administrators. Now consider the three technical domains that are interlinked in this setting: cybersecurity needs, the practice of medicine, and the legal requirements of HIPAA. 

Hypothetically, which of these audiences might you need to talk to before, during, and after your team of SEs implements your p

Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges

In a previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

In the next step, you will provide additional ideas for the chief information security officer (CISO) to consider.

Step 4: Provide Additional Considerations for the CISO

You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.

1. Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using triple DES or other encryption technologies. To complete this task, review the following resources:

a. uses of encryption

b. types of encryption

c. hash functions

2. Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity. Review these resources on authentication to further your understanding. Focus on resources pertaining to message authentication.

3. Review the resources related to cryptanalysis. Explain the use of cryptography and cryptanalysis in data confidentiality. Cryptanalysts are a very technical and specialized workforce. Your organization already has a workforce of security engineers (SEs). Cryptanalysts could be added to support part of the operation and maintenance functions of the enterprise key management system. Conduct research on the need, cost, and benefits of adding cryptanalysts to the organization’s workforce. Determine if it will be more effective to develop the SEs to perform these tasks. Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house.

4. Research and explain the concepts and practices commonly used for data confidentiality: the private and public key protocol for authentication, public key infrastructure (PKI), the X.509 cryptography standard, and PKI security. Read about the following cryptography and identity management concepts: public key infrastructure and the X.509 cryptography standard.

Keep in mind that sometimes it takes considerable evidence and research for organizational leaders to buy in and provide resources.

Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Step 5: Analyze Cryptographic Systems

In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring.

Independently research commercially available enterprise key management system products, discuss at least two systems, and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness, and its efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

  • security      index rating
  • level      of complexity
  • availability      or utilization of system resources

Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

The following exercise, Introduction to Cryptographic Tools, is to introduce you to or help you better understand some basic cryptographic concepts and tools for both encryption and decryption processes.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case      Type: UMGC Virtual Labs Support
  • Customer      Type: Student (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber      (CST/DFC/CBR/CYB)
  • SubType      Detail: Pick the category that best fits the issue you are      experiencing
  • Email: The      email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

Step 6: Develop the Enterprise Key Management Plan

In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.

A possible outline could be:

  • Introduction
  • Purpose
  • Key      Components
  • Implementation
  • Operation
  • Maintenance
  • Benefits      and Risks
  • Summary/Conclusion

The following are the deliverables for this segment of the project:

Deliverables

· Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

· Lab Report: A Word document sharing your lab experience along with screenshots.

Submit your deliverables to the Assignments folder in the final step of the project.

Step 7: Develop the Enterprise Key Management Policy

The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.

Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.

Review and discuss the following within the policy:

Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.

Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

The following is the deliverable for this segment of the project:

Deliverables

· Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.

· 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.

· 1.4: Tailor communications to the audience.

· 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

· 2.2: Locate and access sufficient information to investigate the issue or problem.

· 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

· 2.4: Consider and analyze information in context to the issue or problem.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

· 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.

· 7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost

Information Security Framework

Recognize the importance of the CIA security model.
Understand the intent of the ISO/IEC 27000-series of information security standards.

It should follow APA citation rules. Please be sure to proofread, spell and grammar check your paper prior to submission. This SyncSession paper should be 2-3 pages long, not including the title page and reference page. Please use Times New Roman, 12 point font. Please double-space your paper.

HTML LAB assignment easy

 

  1. Put your code in a word document.
  2. Add screenshots to the results when you run the code into your word document as a prove you are able to run the code.

Database Management

1. For parallel database, if “Different queries” run in parallel, how to handle possible conflicts?

2. What is the application of Hash partitioning and its advantages?

3. Since there are different data warehouse system available such as AWS, Snowflake,…etc.

If you want to retrieve some information/data/special topics from different warehouse system, what will you do? Such as what kind of steps needed to take and why shall we take those steps, or directly using keyword, etc. Note: you may need to concern about both of the efficiency and effectiveness (precision) performance.

4. What is data pipeline? List some advantages as using data pipeline.

5. Why is NoSQL become another important approaching for database and occupied a lot of marketing?

*****A simple explanation is required. Each question should be one paragraph. And one paragraph should be 5-8 sentence.

You may use this link in the picture to create a policy and processes document to provide the structure necessary for your forensics lab environment or search the internet for your own resources.

 You have just been hired to perform digital investigations and forensics analysis for a company.  You find that no policies, processes, or procedures are currently in place.  As a digital forensics professional you know that policies are short statements on how a business should conduct services, procedures are basically the “how-to’s” on how to do the operations, step-by-step.  You may use this link https://joshmoulin.com/digital-forensics-incident-response-forms-policies-and-procedures/ (Links to an external site.)  with Josh Moulin’s work from his Senior Thesis in his Master’s program, as a guideline/template to create a policy and processes document to provide the structure necessary for your forensics lab environment or search the internet for your own resources.  DO NOT PLAGIARIZE information from the provided link(s), use it as a reference only. You can use additional internet sources if needed just be sure to document your sources in MLA or APA style. Your policies and procedures document should be 500 words and written in MLA or APA style. 

Multipost

Part 1: The rising importance of big-data computing stems from advances in many different technologies.  Some of these include:

  • Sensors
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities

How does these technologies play a role in global computing and big data?

Min 275 words. 2 references. APA Format.

Part2: Discuss the benefits of virtualization software, as described in the  text. Do you agree/disagree with these benefits, or can you think of  additional benefits not already presented?  Also discuss the security  concerns highlighted by server sprawl and how you would propose to solve  those in your (real or hypothetical) organization.
Min 275 words 2 references. APA Format.

Attach each part as separate file