Computer Networking

The topology of network infrastructure is critical to the operation of a computer system. Explore and discuss the following: 

  1. What is the history of the network models? 
  2. What are the four layers of the TCP/IP Model and how are they used? 
  3. How does the networking protocol work? Give at least one example based on literature 

Make sure you support it with 3 peer-reviewed academic articles

Initial Post : 400 words

2 Responses : each 200 words

Discussion 2 _ E commerse

250 words+

What is the difference between the personal contact model of communicating on the Web and the mass media approach?

$5: Research and list the top 5 online retailers in US and in the World and list their latest available revenues.

ITAS 465

 

During this week’s LabSim modules you learned how to apply scanning techniques to perform an internal scan, external scan using Zenmap and scan with Nmap Scripts. Compare and contrast results. Perform Enumeration with NMAP and Metasploit and compare and contrast results and apply enumerations countermeasures to prevent zone transfer.

For the Unit 3 individual project submit a 3 page MS Word document that will include screen shots of your LabSim course outline showing completion of all of the nodes in the following modules and provide a 300-500 word summary of your lessons learned from completing these modules.

Cataloging Threats and Vulnerabilities

You have been hired as an information security analyst at a small company called Astounding Appliances. The company sells appliances online. Astounding Appliances owns and hosts all of its IT assets and forward-facing web applications on site. The assets are about 5 years old. The company is seeking to expand its operations in the next 5 years. 

Your manager asks you to help her document the threats and vulnerabilities to the company’s IT operations. In addition to what you already know about the company, you learn the following during your interviews and inspections for this project.

The Astounding Appliances company and all of its IT operations are located in New Orleans, Louisiana. The data center is located on the ground floor of the company’s building. There is no basement. No one can come into the data center without a smart card scan. However, there is a physical key system that can override the smart card scanner and access. There is no inventory of who has keys to the data center, although the company’s vice president for operations doesn’t think that too many people have keys.

Because New Orleans is vulnerable to hurricanes, all of the equipment in the data center is stored in elevated racks that sit on a raised floor. Pumps have also been installed to remove water. The pumps are attached to a generator, which has not been inspected in several years. You learn that it has not been inspected in a timely manner because making sure the generator is functional is not on the organization’s disaster recovery checklist.

From the director of human resources, you learn that any Astounding Appliances employee with a valid smart card can enter the data center; access is not granted based on a need to enter the data center. You also learn that smart card access is not always terminated promptly when employees leave Astounding Appliances. The director of human resources tries to audit smart card validity regularly, but this is a low-priority task for her. You also learn that it is not part of the regular employment process for new employees to complete information security training or to sign the company’s IT acceptable use policy.

Answer below:

1. Identify 6-10 vulnerabilities to Astounding Appliances information systems and data. Be sure to include the asset that is affected by the vulnerability.

2. For each vulnerability that you have already identified, document potential threats associated with it. Be sure to list the relevant information security concern (i.e., confidentiality, integrity, or availability) for the vulnerability-threat pair.

3. For each vulnerability-threat pair, identify the relevant information security concern(s) (i.e., confidentiality, integrity, or availability).

4. For each vulnerability-threat pair, identify the vulnerability category.

5. For each vulnerability-threat pair, identify the threat category.

500 words

Discussion 13

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post at least 500 to 600 words. Please add APA 7 format and intext citations and mention all the references used in the paper with indent hanging format.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Database Normalization

 

Improving Database Design through Normalization

Continue improving the database (tables) you designed in SLP 2. Here are your tasks:

  1. Discuss whether the tables you designed in SLP 2 (in the previous module) have satisfied 1NF, 2NF, and 3NF. Explain why or why not.
  2. Make changes if the tables do not meet the requirement of the 3NF.
  3. Write Oracle SQL statements to create the tables you have designed, and populate the tables with data.

Note: Use the materials in the background reading for your assignment:

  1. Wang, W. (2017). Introduction to SQL (DDL).
    Note: voice-over presentation covering the set of Oracle commands used to create and modify the structure of tables. (Remember that narrated presentations take a little longer to download.)
  2. Wang, W. (2017). Introduction to SQL (DML).
    Using data manipulation language (DML) to work with data.
    Note: Oracle commands that “ask” database questions.
  3. Wang, W. (2017). Add primary key and foreign key to tables using Oracle SQL.
    Note: how to add primary and foreign keys.
  4. Wang, W. (2017). Writing a query using one or more tables.
    Note: techniques used when requesting information from a single table, as well as tables connected to one another.

Please note that since you are the designer of this database, you need to create data to fill in the tables. No need to create a lot of data; 5-10 records of data in each table are sufficient.

SLP Assignment Expectations

Fulfill the following requirements in this assignment:

  • Discuss the requirement for the first, second, and third normal form.
  • Present reasons why or why not the tables in the database you designed have satisfied the three levels of normal form.
  • Discuss what you are going to change so that all your tables satisfy at least the third normal form standard.
  • Write SQL statements to create the structure of the tables, specify primary and foreign keys, and populate the data.

business cont

 

A disaster recovery plan describes scenarios for resuming work  quickly and reducing interruptions in the aftermath of a disaster. It is  an important part of the business continuity plan and it allows for  sufficient IT recovery and the prevention of data loss.

  1. Write a 1-page paper describing the difference between Business Continuity and Disaster Recovery. Your paper should also: 
    • Identify why it is important for an organization to have a BCDR plan.
    • Describe the advantages and disadvantages of using a cloud provider  for disaster recovery computing, as opposed to maintaining your own  failover systems.
  2. Remember to use proper APA formatting, including citations and references for all resources used.

Statement of Purpose

 

Overview: 

In completing this assignment, you will gain a better understanding of an Information Security Plan.

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 1: Develop your Statement of Purpose for your Information Security Plan (ISP)

In this week’s Lab you will develop your Statement of Purpose which will include:

·  The Introduction should introduce the policy and name the organization.

·  The Purpose should state the main reason for the policy and any legal or compliance issues required to uphold.

·  The Scope provides a statement of the boundaries of the policy, information systems, the cyber architecture and the personnel to which the policy applies.

·  Roles and Responsibilities list the major roles in the organization and their responsibilities in reference to this policy. These should include at a minimum:

·  Chief Information Officer

·  Information Security Officer

·  Information Security Architect

·  Information Security Coordinator

·  Data Proprietor (Administrative official)

·  Data Custodian (Technical staff)