Assignment and Discussion

 Week 6 – Discussion 

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

Internet Research – WK 6

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.

 

Week 6 Assignment

  • 6.2 What protocols comprise TLS?
  • 6.3 What is the difference between a TLS connection and a TLS session?
  • 6.4 List and briefly define the parameters that define a TLS session state.
  • 6.5 List and briefly define the parameters that define a TLS session connection.
  • 6.6 What services are provided by the TLS Record Protocol?
  • 6.7 What steps are involved in the TLS Record Protocol transmission?
  • 6.8 What is the purpose of HTTPS?
  • 6.9 For what applications is SSH useful?
  • 6.10 List and briefly define the SSH protocols.

Discuss, “Legal Protection for Bitcoin users in E-commerce and Application of Blockchain in Industry and Businesses”

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public. Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

At least one scholarly source should be used in the initial discussion thread.

review below links for reference :

N. Mohamed and J. Al-Jaroodi, “Applying Blockchain in Industry 4.0 Applications,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas,NV, USA, 2019, pp. 0852-0858. doi: 10.1109/CCWC.2019.8666558

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8666558&isnumber=8666184

https://www.consumer.ftc.gov/blog/2018/08/how-avoid-bitcoin-blackmail-scam?page=7

Discussion-2

 

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

cloud computing 3

 

PowerPoint briefing that discusses Software as a Service, Roles and Boundaries, Cloud Characteristics.

Format:

Here is what I expect in your PowerPoint recording:

  • 1st Slide – Title and group members’ names
  • 2-16 Slides- Contain the Content on topics
  • Slide 17 – Key Points Learned
  • Slide 18 – References

RG-10

 Read the attached Quantum Crypto file.  What risks does this scenario pose?  How would you address this risk?  What areas of an organization and potentially affected by a cryptographic apocalypse? What about technical concerns and so on? 

One page is fine. 

Data management paper

This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.

Network Security Technologies and hardening

 

  • This week we discussed Network Security Technologies and hardening of Devices. What are some of the Security Basics when it comes to workstations and ways to secure Server environments? Identify a minimum of two additional Network Devices and ways to secure the devices? Please provide input based on this week’s reading and homework assignments, personal experience, and internet research with a cited reference in APA format.

Security architecture and design final paper

  

Respond to each question below. Remember to cover all aspects of the question.

Successful security architecture needs upper management to support for effective security standards and protocols. However, there are possible disadvantages to upper management involvement. List and describe the tradeoffs in business between rigorous security and delivering products to customers. Go beyond merely the automated solutions, or the technical checks that can be done without much human support.

Examine how capturing, standardizing, applying patterns, and standard solutions help to increase efficiency and maintain delivery teams’ velocity. Provide at least 3 real-world examples which describe and examine how they provide the velocity. Do not simply provide a list of things teams can do but for each idea, define the idea and explain its relevance. 

Schoenfield lists several components of a successful security architecture practice, such as broad support across the organization, recruitment and training of security architects with the right kind of aptitude and interest, effective security requirements that enhance but do not slow down the innovation process, and finally, indicators that the security architecture team is being well utilized and adding value to project development. Describe what each of these components are and explain how each is relevant to security development. Include detail and examples.