Discuss the importance of guidelines and procedures for access control.
It must be at least 450 words and have references.
No plagiarism and no grammar mistakes and need APA format.
properly cite the references.
Discuss the importance of guidelines and procedures for access control.
It must be at least 450 words and have references.
No plagiarism and no grammar mistakes and need APA format.
properly cite the references.
Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally. What are some advantages and disadvantages to this approach? Is there another approach that might work better?
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
My topic is scam and phishing in the internet. I need you to do the 10 page research report and the PowerPoint presentation. Please make sure the PowerPoint is long because i need to do a presentation for 15 minutes. Please read the files i attached carefully.
1 page in APA 6th Format on performance management with at least one scholarly (peer-reviewed) resource and NO PLAGIARISM.
Discuss the differences as well as the advantages and disadvantages of IaaS, SaaS, and PaaS. Otherwise, you may include an implementation of each such as Salesforce or AWS with details on their services.
You must post at least twice during the week on at least two different days to get full credit. Your posts should add to the conversation with relevant information. Just agreeing with you classmates or similar responses will not receive any credit.
I am not looking for long posts. Eight or so sentences for each post of ORIGNAL writing will suffice. I do not want see paragraph after paragraph of copied material. Your post will be checked by SafAssign for similarity.
If you use references they MUST include in text citations where the information is used. If the information is a direct quote from a source it MUST be in parentheses. Otherwise you are at risk of plagiarism. However, you do not have to use the APA Edition 6 format (template with fonts, heading, etc.) in the discussions.
Ignorance of APA Edition 6 citing and referencing is not acceptable in graduate level work. If you do not use it you may be accused of plagiarism. If you have not done so please familiarize yourself with it now. There are numerous sources under the “Start Here” tab.
Please DO NOT submit your posts as attachments in the discussion area. All writing need to be in the discussion area.
7 pages
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Acme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc.
Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO.
Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:
1. Perimeter Security
2. Network Security
3. Endpoint Security
4. Application Security
5. Data Security
6. Operations
7. Policy Management
Deliverables
You company has been allocated an unlimited budget to move to a virtualization infrastructure. The current IT infrastructure exists on bare metal with no virtualization implemented at all.
The current infrastructure contains the following components:
2 x Windows 2008 R2 Domain Controllers
2 x Exchange 2013 Servers
1 x SQL 2012 Server
1 x Red Hat 7.0 Apache Server
2 x Windows 2008 R2 Servers as File Servers
Your task is to do the following:
1) Provide a cost and description of the new hardware you will be implementing
2) Develop a migration plan to move all current infrastructure to virtualization (this also means 0 downtime)
3) Identify and Upgrade the old operating systems and software in the current infrastructure
4) Expand the current infrastructure to include new technologies (eg. An MDM solution)
Please create a detailed report on the tasks above.
I have a research paper that I would like to hire you to help me out.
It is on Dynamic Threat Modeling.
I want you to do a systematic literature review on Threat Modeling on smart city. First and foremost, I want all the threat modeling techniques and methodology analysed.
The advantages and disadvantages of the various techniques should be analysed.
I want to differenciate the static threat modeling techniques from the ones that could be employed as a dynamic Threat modeling technique and used to model likely threats in a smart city.
Scenarios should be given on an attack in a Smart environment to get the risk score and how the chosen dynamic technique would be better suited to model in such scenario.
For example, there are various nodes such as computers, smart printers, switches, routers in a Smart environment. Normally, the organisation would be doing all they can to protect these devices and systems because they are always subject to attacks. Normally, a risk assessment would be performed on these nodes to get their risk score (which is to show the level of risk) to show how to protect these assets.
Most times, the level of risk of one asset is higher than others because organisations value some assets than others. For example, organisation could put more value on a Web server than an email server. Others could value their systems to people, while another organisation would place more value on their data to protect their customers information.
Now, when a risk assessment is conducted, different values are placed on the various assets in an organisation or smart environment. For example, the risk score on a Web server is 5 out of 10 while that of the payroll is 2 out of 10.
When an attack happens on the organisation and the web server is targeted, there could be a chance that it might be penetrated. If it was successfully attacked, the organisation might be informed due to the kind of security system in place that gives them signal when something have been attacked. When this happens, the risk score would be raised from 2 to 8. Now, this can only be assessed again by the risk analyst by conducting another risk assessment. This is a static way of modelling the threat level of an entity. This method is not always encouraged because one have to manually risk assess the whole system again and could take time. This is where dynamic modelling comes in.
I want you to categorise all the threat modeling techniques such as STRIDE, OCTAVE for example. There are many many others.
I want them to be analysed critically. How they work, their advantages and disadvantages.
Analyse which of them are static, dynamic or can be used as both to model threats.
Analyse why static is not really ideal because we need the risk score to dynamically change as soon as a threat occurs and not having to manually wait for the risk officer to conduct another risk assessment.
Discuss the likely best framework/technique for my threat modeling. This will be used to compare other techniques in the literature. Also explain why (with referencing) a certain methodology would be best suited to be used to dynamically model threats in a Smart city domain.
Analyse and categorise if the static threat modeling techniques and dynamic modeling techniques (Is it quantitative or qualitative) could work for the scenerio. For example, does this meet my scenerio. Using OCTAVE as an example, we could say, it works for this scenario while STRIDE does not meet this scenario because this and that.
This paper should contain academic references
Note, this is on smart city. Conducting the analysis for threat modeling for a Smart city