Physical security

 Using the example of Five Oaks in Dayton, Ohio, research how to initiate and present a plan to build defensible space into a mini-neighborhood. 

Security Semir

 

As an information security professional, you will often be called deal with security threats that impact the organization on an ongoing basis, and to provide guidance to multiple organizational units on ways to recognize, cope with, and avoid these threats.  In this assignment, you will research in detail an attack type or threat assigned by your instructor (command injection).  As a project group you will develop a mini-training course on your assigned topic and deliver that training to the class.

Deliverables for this assignment include (but aren’t limited to):

  • A white paper on command injection.  The paper will provide:
    1. A description of the threat/attack method, including the types of attacks performed (DoS, Access, etc).  There are multiple versions of many attacks, so you should go over the major forms/groupings.
    2. A description of how the attack is performed. (What elements in the network are being attacked, tools used, vulnerability being exploited)
    3. Attack signature for inclusion in an organizational Incident Response Plan (How would we recognize the attack on our systems?)
    4. Faulty practices (programming, design, training, etc.) that enable the threat/attack
    5. Industry Best Practices for avoiding or mitigating the risk of this threat or attack form
    6. References for further study (Technical and Cases)
  • 5 multiple choice and 1 essay question with grading rubric for use as part of the unit exam

 

The white paper must: use APA format, use 12 point Courier or New-Courier font, be a minimum of 15 double spaced pages (excluding bibliography and graphics).  Papers should use at least 10 references.

The Quick Analysis button is near cell F17

Homework Assignmet

 

As a staff member at Blue Lake Sports Company, you are expected to prepare the monthly sales worksheet. You edit and format data, complete calculations, and prepare the workbook for distribution. You also copy the sheet for next month’s data.

[Student Learning Outcomes 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.8]

File Needed: BlueLakeSports-01.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-BlueLakeSports-01.xlsx

Skills Covered in This Project

  • Open and save a workbook.
  • Choose a workbook theme.
  • Edit and format data.
  • Center labels across a selection.
  • Use SUM and the Fill Handle.
  • Adjust column width and row height.
  • Insert a header and a footer.
  • Adjust page layout options.
  • Copy and rename a worksheet.
  1. Open the start file BlueLakeSports-01.xlsx workbook. The start file will be renamed automatically to include your name. Change the file name if directed to do so by your instructor and save it.
  2. If the document opens in Protected View, click the Enable Editing button in the Message Bar at the top of the document so you can modify it.
  3. Apply the Slice theme to the worksheet.
  4. Edit worksheet data.
    1. Edit the title in cell A2 to display Monthly Sales by Department.
    2. Edit cell D6 to 1950.
  5. Select cells A1:F2 and click the Alignment launcher [Home tab]. Click the Horizontal arrow, choose Center Across Selection, and click OK.
  6. Select and delete row 8.
  7. Use the Fill Handle to complete a series.
    1. Select cell B3.
    2. Use the Fill Handle to complete the series to Week 4 in column E.
    3. AutoFit columns C:E to display the complete label.
  8. Use SUM and the Fill Handle to calculate totals.
    1. Use the AutoSum button to build a SUM function in cell F4.
    2. Use the Fill Handle to copy the formula in cell F4 to cells F5:F16.
    3. Delete the contents of cell F17 if you copied the formula to that cell.
    4. Select cells B17:F17 and click the AutoSum button. The SUM formula is inserted, and a Quick Analysis options button appears (Figure 1-98).The Quick Analysis button is near cell F17Figure 1-98 AutoSum complete with Quick Analysis button
    5. Press Esc to ignore the Quick Analysis options.
  9. Format labels and values.
    1. Select cells A1:A2 and increase the font size to 18.
    2. Increase the row height of rows 1:2 to 24 (32 pixels).
    3. Format cells A3:F3 as Bold and increase the row height to 18 (24 pixels).
    4. Center the data in cells B3:F3.
    5. Format cells B4:F16 with Comma Style and decrease the decimal two times.
    6. Select cells B17:F17 and apply the Accounting Number Format with no decimal places.
    7. Apply the All Borders format to cells A3:F17.
    8. AutoFit columns B:F.
  10. Finalize the worksheet.
    1. Click the Insert tab and click the Header & Footer button [Text group].
    2. In the right header section, insert the Sheet Name field.
    3. Go to the footer and click the right section.
    4. Type [your first and last name] (Figure 1-99).Your name is in the Right sectionFigure 1-99 Add a footer in Page Layout view
    5. Click a cell in the worksheet and then return to Normal view.
    6. Center the worksheet horizontally on the page.
  11. Copy and rename a worksheet.
    1. Right-click the January sheet tab and choose Move or Copy.
    2. Make a copy of the sheet at the end.
    3. Rename the copied sheet February.
    4. Format the February sheet tab color to Dark Blue, Accent 1 (fifth column).
    5. Delete the values in cells B4:E16 and press Ctrl+Home.
    6. Return to the January sheet and press Ctrl+Home.
  12. Preview the January sheet.
  13. Save and close the workbook (Figure 1-100).Excel 1-4 completedFigure 1-100 Excel 1-4 completed
  14. Upload and save your project file.
  15. Submit project for grading.

Would You Pay the Ransom

 Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund 

Week 1 Assignment

Week 1 Assignment 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)

Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15) Question 4 is not a group assignment.  It is an individual assignment.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 1

Discussion question 1

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources.

Exercise 15

Find information about IBM Watson’s activities in the healthcare field. Write a report.

Chapter 2

Discussion question 1

Discuss the difficulties in measuring the intelligence of machines.

Exercise 4

In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

Exercise 5

Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Exercise 15

Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.

6/1 Devotional

The Scriptures encourage we live in honesty, in truth. This applies to work as well as our interactions with friends and family. We should always be practitioners of honesty and ethical behavior. One of our guiding principles should be that we are concerned with the truth. How do we know the truth? Psalm 1:2 says, “But his delight is in the law of the Lord, and on his law he meditates day and night” (ESV). “His delight is in the law of the Lord” refers to our constant, vigilant effort to maintain our integrity.

  1. Review the material in the Getting Started section, including the specific Bible passage.
  2. Be sure to address to the following prompts in your paper:
    1. How might this verse impact your work as an IT professional?
    2. How would you apply the principles of this verse to your personal life as well as professional?
  3. Your paper should be at least 250 words in length.

Discussion8-2

200 words+

In your opinion what is/are the most security threats that organizations will have to be prepared for 2020-2021 ?

Please list your reference/s

Week 10 Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

feedback DUE 5/1/23

AFTER READING THIS POST RESPOND BY COMING UP WITH FOUR QUESTIONS OR YOUR OPINION TO THE POST……

 

Point-to-point topology directly links two nodes together. Point-to-point is east to implement. It has higher speeds when compared to other topologies because only two nodes are using the link. However, if the link fails, the network goes down. A bus topology has all of the devices on a network on a single cable running in one direction from one end of the network to the other. Bus topologies are a cost-effective choice for smaller networks since all of the devices are connected by a single cable. If the cable experiences a failure, then the whole network goes down. A ring topology links each node with another node to form a closed network. Data moves from one node to another in this topology. Ring topology’s circular flow of data minimizes packet collisions and can it can also handle a large number of nodes and heavy traffic. A single failure of a cable in a ring topology can disrupt the overall network operations. In a star topology, all nodes are connected to a central hub using a communication link. Every node needs a separate wire to establish a connection with the hub. Since each node has its own cable, network maintenance and management are easier. It is easier to add new devices in a star topology. If the central hub fails, it brings down the entire network. In a mesh topology, all of the nodes are interconnected and can send and receive their data from other nodes. Mesh topologies are redundant because if there are any failures in the nodes or links, it only affects a minimum number of endpoints. Mesh topologies are costly to implement and the installation and maintenance can be time-consuming. 

At the healthcare agency I worked at, they used a star topology. I think this worked best for that office because it was a small office. There weren’t too many people that worked there. There was one day where the central hub failed and no one in the office could use their computers. Even though nobody could work that day, I believe that a star topology was the right choice. This was in the middle of hurricane season in Florida and it had been raining for a few days straight.