History of Computer Architecture: Write a one page summary report that highlights the history of computer architecture and the main events. Use the APA style that includes a cover page and a reference page. Use the APA template document in this folder to help you write your report.
Ethical Issues
The (ISC)2 Code of Ethics was developed to provide the basis for CISSP behavior.
Using your course materials and the (ISC)2 website, write a minimum 1-page paper on the following:
- Summarize the four canons of the (ISC)2Code of Ethics.
- Identify one ethical issue and explain the (ISC)2perspective on that particular ethical issue.
Citation with APA format.
PS Week 8
Topic: Perform a LOPA (Layers of Protection Analysis) of your local living area or work location. Remember to get permission from security.
Instructions: Please download the Assignment 7 Layers of Protection Analysis (LOPA) template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_7_LOPA_Assessment.docx and submit to the appropriate assignment folder.
2 Discussions and 1 Case Study
Discussion 3.1
Why is it so difficult to protect children on the Internet? What are some of the challenges faced by law enforcement? You can also list some of the challenges faced by parents.
Discussion 3.2
Why is health care information protected? Find a case where health confidentiality was violated and share it with the class.
Case Study 3.1
Choose either Children’s Online Privacy Protection Act (COPPA), the Children’s Internet Protection Act (CIPA), the Family Educational Rights and Privacy Act (FERPA), or the Health Insurance Portability and Accountability Act. In a 3 to 4 page paper (Not including title and reference pages) describe the Act you chose. Provide details behind why the Act was created and any legal cases that either led to the Act being created or that used the Act for prosecution or defense in a case. Use 2 to 3 separate sources and make sure you cite those sources according to APA format.
Writing Requirements
- 3–4 pages in length (excluding cover page, abstract, and reference list)
- Include at least 2-3 peer reviewed sources that are properly cited
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.
- Please use the Case Study Guide as a reference point for writing your case study.
LAB 4 Creating a Security Policy Framework
Part 1: Research Separation of Duties Policies (0/1 completed)
Note: In this part of the lab, you will review scholarly research on separation of duties policies in order to form a basis for their purpose and usage. Understanding the reason behind a SoD policy is key to understanding the component policies and procedures. Please take time to review the research thoroughly and think through the concepts of the policy itself.
1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing separation of duties policies.
Lu, J., Li, R., Lu, Z., & Jin, Y. (2009, December 31). Dynamic Enforcement of Separation-of-Duty Policies. Paper presented at the International Conference on Multimedia Information Networking and Security. http://dx.doi.org/10.1109/MINES.2009.102
2. Write a brief summary of the article. In your summary, focus on the need for a Separation of Duties policy and its key elements.
Part 2: Create a Separation of Duties Policy (0/6 completed)Note: In Part 1 of this lab, you learned about the motivating factors that inform a separation of duties policy. In this part of the lab, you will create your own separation of duties policy for a given scenario. As you prepare your policy, remember that no one individual or team should have too much authority or power to perform a function in a business or organization and that understanding where responsibilities begin and end is critical to effective separation of duties. However, just because one individual or team has decidedly too much authority or power does not necessarily mean that management should apply separation of duties to mitigate the risk given that truly separated duties often means additional labor and/or costs. Instead, management might decide to accept the risk or address the risk by other means.
1. Review the following scenario for the fictional Bankwise Credit Union:
- The organization is a local credit union that has multiple branches and locations throughout the region.
- Online banking and use of the internet are the bank’s strengths, given its limited human resources.
- The customer service department is the organization’s most critical business function.
- The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
- The organization wants to monitor and control use of the Internet by implementing content filtering.
- The organization wants to eliminate personal use of organization-owned IT assets and systems.
- The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
- The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
- The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems security.
2. Create a security management policy with defined separation of duties for the Bankwise Credit Union.
Bankwise Credit Union
Separation of Duties Policy
Policy Statement
(Define your policy verbiage.)
Purpose/Objectives
(Define the policy’s purpose as well as its objectives.)
Scope
(Define whom this policy covers and its scope. What elements, IT assets, or organization-owned assets are within this policy’s scope?)
Standards
(Does the policy statement point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards.)
Procedures
(Explain how you intend to implement this policy for the entire organization.)
Guidelines
(Explain any roadblocks or implementation issues that you must overcome in this section and how you will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of duties responsibility may need to be addressed in this section.)
Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
For this portion of the lab, you will complete additional research of a case study in separation of duties and provide your own overview of the problem and solution.
Locate and read the following research article:
Ballesteros, S., Pan, L., Batten, L., & Li, G. (2015). Segregation-of-Duties Conflicts in the Insider Threat Landscape: An Overview and Case Study. Paper presented at the Second International Conference on Education Reform and Modern Management. https://doi.org/10.2991/ermm-15.2015.96
Discuss how a separation of duties policy would help to resolve the issues at Bankwise Credit Union, as discussed in this case study. Assume your audience is the CEO and Board of Bankwise Credit Union.
java programing
Write a complete java programming implementation for classes
Module 3
Adding More Event Handlers to Your Controls and Writing Utility Methods
This week we will add more event handlers and functions to the course project. View the videos provided in the Project Video Links for instructions and details to help guide you through your efforts. Links to other files you need are listed below.
Access Control Management
1.Explain access control fundamentals.
2.Apply the concepts of default deny, need-to-know, and least privilege.
3.Understand secure authentication.
it should follow APA citation rules. Please be sure to proofread, spell and grammar check your paper prior to submission. This SyncSession paper should be 2-3 pages long, not including the title page and reference page. Please use Times New Roman, 12 point font. Please double-space your paper.
Mobile Forensics
Reading article:
Nnoli, H. Lindskog, D, Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam, 734-741.
After reading the required articles this week, please write a research paper that answers the following questions:
- What are mobile forensics and do you believe that they are different from computer forensics?
- What is the percentage of attacks on networks that come from mobile devices?
- What are challenges to mobile forensics?
- What are some mobile forensic tools?
- Should the analysis be different on iOS vs Android?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Firewalls
Prepare a comparison study among various firewall simulation tools that are available in security research. You are required to describe tools first (features, functionalities, supported application/platform, cost, etc.) and then prepare a comparison table based on various metrics. You are required to provide references at the end of the answer to all the tools that you found. You are required to provide URL (reference) regarding how to access that tool.
You are required to compare at least three firewall rules visualization and/or simulation tools( One tool can be the software that we used in the security lab). You need to clearly mention the comparing criteria among these mentioned tools (and why you choose them) and then show the table.