Security Design Principles

Compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organization’s security posture.

You must use at least one scholarly resource 

500 words APA format with references needed.

Discussion: Regulatory and Laws and Research Paper: Contingency Planning ITS-834: Emerging Threats & Countermeasures

Discussion: Regulatory and Laws

Word count: 300+ words

Chapter 4 Laws, Regulations, and Compliance

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

Make sure to back up your statements with scholarly support.

  • Please cite properly in APA 7
  • At least one scholarly source should be used. 
  • Use proper citations and references in your post.

Research Paper: Contingency Planning

Number of pages: 4

Contingency planning is a risk mitigation process for developing backup plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. 

In a well-formatted, highly-detailed research paper, address the need for contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning. 

Your paper should meet the following requirements:

  • Four in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents.

NEW AUTHENTICATION PROPOSAL A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link: Secure Quick Reliable Login (Links to an external site.)Links to an external site. Briefly summarize ho

 

NEW AUTHENTICATION PROPOSAL

A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link:

Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication. Provide the benefits and identify any possible security issues with SQRL.

Your well-written paper should meet the following requirements:

  • Paper length: 2-3 pages
  • Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
  • Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
  • Format according to APA guidelines

Discussion: ITS-833: Information Governance – Privacy and Security Considerations for Information Governance

Discussion: Privacy and Security Considerations for Information Governance

Word count: 300+ words

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach that compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend being in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Share an applicable personal experience

  • Provide an outside source that applies to the topic, along with additional information about the topic (please cite properly in APA).
  • At least one scholarly source should be used in the discussion. Be sure to use information from your readings. 
  • Use proper citations and references in your post

Textbook: 

For this assignment, please read chapters 11 and 12 from the below textbook.

Chapter 11 – Information Governance and Privacy and Security Functions
Chapter 12 – Information Governance for E-Mail and Instant MessagingManagement 

Title: Information Governance, ISBN: 9781118421017 Authors: Robert F. Smallwood Publisher: John Wiley & Sons Publication Date: 2014-03-28

Note: plagiarism check required, APA7 format, include References, within 8hrs

Cloud Technology

 In this project, you will make narrated presentation to convince the BallotOnline management of the value of migrating the organization’s existing IT infrastructure and services to a public cloud. You will learn about cloud computing technology and services and how organizations can take advantage of this trend.Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate Ballot Online future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.   Question: you will prepare your presentation for the Ballot Online executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.  Your presentation will include an executive summary along with the following steps: 

  • Overview of cloud computing
  • summary of service and deployment models
  • summary of cloud compute and storage infrastructure components
  • advantages and disadvantages
  • economic analysis
  • IT business requirements (provide a concise description of what each bullet should ensure)
  • SWOT analysis

Modify the Week Two Java application

  

Modify the Week Two Java™ application using Java™ NetBeans™ IDE to meet
* these additional and changed business requirements:
*
* • The company has recently changed its total annual compensation policy
* to improve sales.
* • A salesperson will continue to earn a fixed salary of $50000.
* The current sales target for every salesperson is $500,000
* • The sales incentive will only start when 80% of the sales target is met.
* The current commission is 5% of total sales.
* • If a salesperson exceeds the sales target, the commission will increase
* based on an acceleration factor. The acceleration factor is 7.5%
* • The application should ask the user to enter annual sales, and it should
* display the total annual compensation.
* • The application should also display a table of potential total annual
* compensation that the salesperson could have earned, in $5000 increments
* above the salesperson’s annual sales, until it reaches 50% above the
* salesperson’s annual sales.
*
* Sample Table: Assuming a total annual sales of $100,000, the table would look
* like this:
*
* Total Sales Total Compensation
* 100,000 <>
* 150,000 <>
* 200,000 <>
* 250,000 <>
* 300,000 <>
* 350,000 <>
* 400,000 <>
* 450,000 <>
* 500,000 <>
* ….. …
* 950,000 <>
* 1,000,000 <>
*
* The Java™ application should also meet these technical requirements:
*
* • The application should have at least one class, in addition to the
* application’s controlling class.
* • The source code must demonstrate the use of conditional and looping
* structures.
* • There should be proper documentation in the source code.

u1

Discuss the need for standards and overseeing organizations in data communications. Are there similar rules and governing bodies in other industries? What would be the implications if there were no standards in data communications?

LIT101 week 7 A

Discussion 7A: Types of Poetry

No unread replies.No replies.

This week, we are discussing different types of poetry, and you will try your hand at a short poem about yourself. First, review the following readings about the different types of poetry:

A Beginners Guide to Different Types of Poems: https://bookriot.com/2018/05/08/different-types-of-poems/ (Links to an external site.)

Poetry Forms: Definitions and Examples: https://www.familyfriendpoems.com/poems/other/ (Links to an external site.)

12 Essential Types of Poetry: https://www.dictionary.com/e/s/poetry/#sonnet (Links to an external site.)

Initial Response

For the main part of this assignment, you are going to write your own poem. You should choose a shorter type of poem such as a Sonnet, Limerick, Haiku, or Acrostic. Although we would enjoy a longer poem from you like Chaucer’s Canterbury Tales, we likely would not have time to write that much!

Choose a type of poem that you find interesting. Describe that type of poem in terms of structure, length, etc. You can use the definition from one of the resources above, but make sure to cite it.

Then, write a poem of that type that reflects something about you. It can, for example, be a career interest, a personal hobby, or a social issue that is important to you. Remember, to consider using some of the literary devices such as similes, alliteration, or onomatopoeia in your poem. Those literary devices were defined in Module 1 and 2 of the course.

Give it a try! It will be fun, and I will give you until Sunday to complete rather than the earlier Wednesday due date.  I will write one myself as well.

Responses to Others

Respond to two other person’s  poems, describing what you liked about the poem and what literary devices were used.