Project Paper (2.5 pages)

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§  Understand and document the purpose of each access control change request

§  Know what access controls were in place before any changes

§  Get an approval of change by management

§  Understand the scope of the change, both with respect to users, computers, and objects

§  Have evaluated the expected impact of the change

§  Know how to evaluate whether the change meets the goals

§  Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§  Status or setting prior to any change

§  Reason for the change

§  Change to implement

§  Scope of the change

§  Impact of the change

§  Status or setting after the change

§  Process to evaluate the change

Required Resources

§  Internet access

§  Course textbook

Submission Requirements

§  Format: Microsoft Word (or compatible)

§  Font: Times New Roman, size 12, double-space

§  Citation Style: APA

§  Length: 2 to 4 pages

Self-Assessment Checklist

§  I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§  I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

§  I followed the submission guidelines.

Discussion 4 – 1

This week we focus on establishing your editorial thinking.  What does the author mean by editorial thinking?  Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic. In response to peers, add to their thoughts on the video and their topic.

Practical Connection Assignment Malware Analysis &‌ Mitigation (MSDF-631-M50)

Malware Analysis &‌ Mitigation (MSDF-631-M50)
Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
  • I am a student, so, please work accordingly.

Need Help

1) Discussion – InfoTech_Mobile_application 

2) Research Paper – Emerging Threats and countermeasure

3) Project_InfoTech_Mobile_Application

Research Paper

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Journal

 

 Pick one of the following terms for your research: code of ethics, conscious capitalism, corporate social responsibility (CSR), culture, ethical dilemma, external adaptation, mission culture, social capital, values-based leadership, or whistle-blowing. 

–  The paper should have a ‘Definition, Summary and Discussion’ headings ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with a 0% similarity index

Discussion and Case Study

-Customer Portals

In two to three paragraphs briefly describe what a customer portal (also called a private store) is and describe the key features you would expect to find in one.

Save in Word Document

———————————————————————-

Case Study

  • Using your favorite search engine locate and read Adobe’s privacy statement on its Web site..
  • Read the  privacy statement and respond to the following prompt in a word document and then submit/upload your document. Document format is listed below.

Prompt: In approximately one and a half to two pages total,  evaluate how easy it is to find the company’s policies on cookies, how clearly it presents the options and how well you think the company protects the privacy of those who own computers on which the company has placed cookies. Be sure to discuss the range of options that Adobe provides and comment on whether you found them to be clearly stated and easy to use.

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1 inch margins all sides
  • References  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

Read the following case study:

C1. Adobe AnalyticsAdobe Analytics offers a number of software products and tools that companies can use to generate detailed reports for online business managers about the amount and nature of their Web site traffic. This software can tell Web site owners not only how many unique computers logged on to their sites, but can provide detailed information about which pages they viewed, how long and in what order they viewed those pages, from which Web site they arrived, and to which Web site they went when they left. Many online businesses find the information in Adobe Analytics reports to be valuable and they subscribe to one of the company’s services, which include not only the reports but also various levels of consultation with their marketing and Web operations managers.Adobe Analytics software can also generate a list of sites a visitor has viewed in the past. The software accomplishes this by placing cookies on client computers and by having their clients include Web bugs (the company calls them “Web beacons”) in the pages their Web servers deliver to site visitors’ browsers and in marketing e-mail messages they send. This information is extremely valuable to Adobe Analytics clients because it can tell them if visitors to their site have, for example, looked at several different sites that offer similar products before entering their Web site.Individuals can examine the cookies stored by their Web browsers to learn more about which companies have placed cookies on their computers. Cookies shown as having been placed by either the 2o7.net or omtrdc.net domains are Adobe Analytics cookies (these are the domains where its cookie-placing servers are located) and the company uses information about previous visits to individual Web sites to make its reports to and consultations with clients even more valuable. The cookies that Adobe Analytics places generally do not expire for several years.Adobe Analytics offers consumers a way to avoid having 2o7.net or omtrdc.net cookies placed on their computers. To do so, persons must find the right page on the company’s Web site and then must elect to have a specific opt out cookie installed on their computers. This cookie will instruct Adobe Analytics servers not to place any more cookies on their computers. (Schneider 468)Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.

risk management

 Risk management is the process of understanding, analyzing, and addressing potential risks to ensure organizational objectives are achieved. will help you convey to organizations why risk management is important and what can be done in an organization to mitigate risk. Instructions: and the Readings and Resources, discuss: • Why risk management needs to be considered in an organization? • How risk management can be used to alleviate or mitigate risk in today’s technology driven environment.  • Provide justification and at least two examples on how the risk can be  successfully managed. Requirements: • Submit a Word document in APA format. • One page in length, excluding the Title and Reference. • At least two resources, including your textbook. 

Write an algorithm for

  

Write an algorithm for the add method that will add at the end of the list instead of the beginning. What is the time complexity of this algorithm? 

Need to write a console program

  

Need to write a console program that accepts input from the user, removes spaces, numbers, and punctuation marks, then sorts the characters of the input in a reverse, case-insensitive manner, and finally prints the result. For example, user input of “I Love Java!” would output “vvoLJIeaa”