How you would improve security for this system.

Given the following, describe how you would improve security for this system.

There is a system containing unencrypted sensitive information (Social Security numbers, driver’s license numbers, first names, last names, and credit card numbers). The system, running a Windows 2008 server, is used only by employees but is on the public Internet, as employees need to access the system from home. Authentication is provided by NTLM, using username and password. The machine is currently directly plugged into its own dedicated cable modem.

Can you recommend five ways we can improve the security of this system, given a $10,000 budget? We should make sure to recommend solutions for software, hardware, and network security improvements. The data is used by 15 users and is secured using a powerful system with decent authentication.

Make sure to provide costs for all features.

Parameters:

  • 12-point font
  • Double-spaced
  • 2 pages

Criteria

Discuss how the software can be improved.

Discuss how the hardware can be improved.

Discuss how the network can be improved.

Web page design

See attachment 

you need to make some changes in that zip file index. html page and change some style. i will then uplode it on bitbucket with a link of my name which will opens up the site 

Security Architecture and Design Individual Assignment 6

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. Report due by Saturday.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

security plan

The information security strategic plan and security policies are strongly interrelated within an organization’s information security program. The security plan and security policies will drive the foundation and selection of security controls to be implemented within the organization.

Part 1

Write a 1- to 2-page summary of the comparison chart of strategic plans and security policies you completed in this week’s Learning Team assignment.

Part 2

Review the control families described in this week’s reading, NIST SP 800-53a Revision 4, Assessing Security and Privacy Controls for Federal Information Systems and Organizations.

Review the controls from this week’s reading, CIS Controls V7.1.

Develop a 2- to 3-page matrix using Aligning Security Controls to NIST Security Controls Matrix Template that accurately maps CIS controls to NIST security control families. Note that some CIS controls may map to multiple NIST control families.

Cite all sources using APA guidelines.

Exp19_Word_Ch02_CapAssessment_PersonalFinance.docx

Exp19_Word_Ch02_CapAssessment_PersonalFinance.docx

 

Start Word. Download and open the file named Exp19_Word_Ch02_CapAssessment_PersonalFinance.docx. Grader has automatically added your last name to the beginning of the filename. Ensure that nonprinting characters are displayed.

Change the document theme to Office, and both theme colors and theme fonts to Office. If the theme is not available, click Browse for Themes, and then select the downloaded theme file Office.thmx.

Ensure that the insertion point is on the first paragraph of the document. Create a paragraph style and name it Title_Page_1 with the following formats: 22 pt font size, and a font color of Blue-Gray, Text 2, Darker 50% (fourth column, last row). Apply the new style to the first paragraph of the document, Personal Finance, if necessary.

Click in the paragraph below Updated by: and type Laura Sims. Change the case of Laura Sims to UPPERCASE.

Select document text from the paragraph beginning with Personal Finance through the end of the document. Justify the selected text and change line spacing to 1.15.

Place the insertion point on the left side of the title Personal Finance (below Laura Sims) and insert a page break (not a section break).

Apply Heading 1 style to Personal Finance at the top of page 2.

Apply Heading 2 style to paragraph headings, including Introduction, Equity Stocks, Bonds, Mutual Funds, U.S. Treasury Bills, Fixed Deposits, Sources, and Conclusion.

Modify Heading 2 style to use Dark Red font color (the first color under Standard Colors).

Select the six paragraphs in the Introduction section on page 2, beginning with Equity stocks and ending with Fixed deposits. Apply a diamond bullet to the selected text.

6611

Select the second paragraph in the Introduction section, beginning with The best time to prepare for your retirement, and apply these formats:
• 0.6” left and right indent
• 6 pt spacing after the paragraph
• Boxed 1 1/2 pt border using the color Blue-Gray, Text 2, Darker 25% (fourth column, fifth row)
• Shading of Blue-Gray, Text 2, Lighter 80% (fourth column, second row)

9912

Apply the default numbered-list format (1., 2., 3.) to the three types of bonds in the Bonds section.

5513

Select the three quotes by Warren Buffet and the Source: paragraph in the Equity Stocks section. Display the selected text in two columns with a line between the columns.

101014

Insert the picture file WallStreet.jpg at the beginning of the line that contains The major stock market in the Equity Stocks section. Change the height of the picture to 3”, and apply Top and Bottom text wrapping. Apply the Rounded Diagonal Corner, White picture style. Position the picture so that it appears below the Equity Stocks heading. Align the picture so that it is centered horizontally relative to the margin.

6615

Insert the picture file GreatIdeas.jpg at the beginning of the paragraph that contains If you want something a little less risky than stocks in the Bonds section. Change the height of the picture to 3”, and apply Top and Bottom text wrapping. Apply the Center Shadow Rectangle picture effect. Position the picture so that it appears above the Bonds heading.

6616

Spell check and review the entire document—no author names are misspelled.

2217

Display the document in Outline view. Collapse all paragraphs so only lines formatted as Heading 1 or Heading 2 display. Move the Sources section to below the Conclusion section. Close Outline view.

6618

Save and close Exp19_Word_Ch02_CapAssessment_PersonalFinance.docx. Exit Word. Submit the file as directed.

Emerging technologies

 

The research project is a research-based paper on a Emerging Technologies topic.  Pick only one of the two topics listed below.

You will develop your research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting your final project (paper) for evaluation.  You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook. Your project (paper) will comprise 3000 to 3500 words (not including title and reference pages).  Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one-inch margins.

This assignment should indicate which topic you have selected and provide an outline of your research project using APA format.

Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?

Describe and contrast the operational challenges faced by the following startups: (a) consumer Web services startup, (b) iPhone application company, and (c) electronic device company.

YO19_Excel_BU02_PS1_Advertise

YO19_Excel_BU02_PS1_Advertise

     

Start Excel. Download and open   the file named Excel_BU02_PS1_Advertise.xlsx.   Grader will automatically add your last name to the start of the filename.   Save the file to the location where you are storing your files.

 

 

On the GuestData worksheet, in   cell H2, add a COUNTA function to determine the number of months listed in cell   range A6:A17.

 

 

In cell J2, add a DATEDIF function to calculate the survey duration   in years using the 2020 Fiscal Start date and 2021 Fiscal Start date.

 

Assign the named range Season to cell range L6:M17.

 

 

In cell range C6:C17, add a   VLOOKUP that will look up the value in column B and then return the exact   season match of Low, Mid, or High based on the value in column B. Use the   named range Season in the formula.

 

 

To count the number of seasons   in cell B22, enter a COUNTIF function that counts the Seasons in cell range   C6:C17 that meet the criteria in cell A22. Copy the formula through cell B24.   

 

To total the number of guests   surveyed by season in cell E22, enter a SUMIF function that sums the total   surveyed in J6:J17 if it meets the criteria in cell D22. Use appropriate   absolute referencing to copy the formula through cell E24. 

 

In cell range D19:J19, calculate   the averages for each column with a rounded (not formatted) value to zero   decimal places.

 

INT

 Write a short, 250 words , reflecting on your internship and how it related to your executive masters program(Subjects of this Program are Computer Security Foundations

and Database Security.) at  College.  As you prepare your paper, you might consider answering some of these questions:

  • How did this internship help prepare you for future endeavors, both academically and in the workplace?
  • What was the best and worst parts of your overall experience?
  • What surprised you about this internship?
  • What, if any, were any disappointment’s?

Prepare your in WORD using APA format. 

Computer Security Foundations:

Introduction to computer Security 

Networks and Internet

Cyberstalking, Fraud and Abuse

Denial of Service Attacks

Malware

Hacking

Industrial Espionage

Encryption

Computer Security Technology

Security Policies

Network Scanning

Cyber Terrorism

DATBASE SECURITY TOPICS: 

Introduction and CIA triads

Types of Database Exploits

Array of Beaches

Admin controls users and roles

POLP and Patch Management

Prevention Controls and Encryption

Data Obfuscation, Redaction and Tokenization

Detective Controls 1 – DAM & auditing  

Failover and disaster recovery

Regulatory Frameworks 1 – HIPAA

Regulatory Frameworks 2 – PCI

Regulatory Frameworks 3 – SOX & STIG

Regulatory Frameworks 4 –  FISMA

Emerging Technologies

Professional Ethics and Responsibilities