ETCM Practical-Connection-1

Assume you are a software engineer and write how the Emerging Threats & Counter measures subject will help in your job duties.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.  

No need of references for this assignment. Just write everything assuming you are software engineer in a company and write how Emerging Threats & Counter measures subject will help in your job duties.

PFA., for the text book for this course and look at the chapters and write how those chapters will help in your job.

Due Date: Thursday US time 10/01/2020

Discussion

 If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface? 

Internet Security

Write a fully developed paper in which you:

on Internet Security 

  1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic.
  2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
  3. Evaluate the current ethical and legal concerns surrounding your topic.
  4. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale.
  5. Analyze the improvements over the last two years to your communication technology topic, and suggest an improvement based on its current usage.
  6. Predict the future role of the communication technology you’ve selected for both personal and commercial use.
  7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note:The graphically depicted solution is not included in the required page length.
  8. Use at least eight quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Cs 008 Lab abour resume

There has two website: Learn Cs 008 (https://learncs8.com/index.php)and the other one called AWS. Follow instructions with LearnCs008 Lab 3 resume and do it on AWs. 

IOT security

Some security practitioners suggest that key IoT security steps include: 

1. Make people aware that there is a threat to security; 

2. Design a technical solution to reduce security vulnerabilities; 

3. Align the legal and regulatory frameworks; and

4. Develop a workforce with the skills to handle IoT security. 

Write 700 words in word document about following

1) Address each of the FOUR IoT security steps listed above in terms of IoT devices. 

2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Click for more options

discussion

 

Discuss the relationship between the Waterfall model, work breakdown structure (WBS), RACI chart, scheduling and cost, when a decision has been made to migrate to the Cloud.  Please be sure to explain why.  Do not forget to follow the discussion forum guidelines. Click for more options

ITM Capstone – Discussion 1

Question: 

How can one distinguish between an organizational weakness and a threat to the organization? 

Post should be 250 words. Add at least one reference in APA format.

Development Status-Security Design and Architecture/ 600 words/ 2 pages/ APA format

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures. 
  • The SANS Institute hosted three “What Works in Security Architecture” Summits. 
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet. 
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book. 
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development.