Cyber project

  

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

assignment aug

  

Question 1

Week 12 Quiz

This quiz is based on the material in Chapter 7 of the text. 

Please answer the questions in paragraphs containing at least five sentences. Include the question and number your answers accordingly.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Question 2

Do some research on Threat Response software. Find one particular software package to investigate.

What does the software do?

What are it’s major features?

What kind of training is required?

How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words and submit in a WORD document here.

Question 3

Week Five Discussion

Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Question 4

Week 5 

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

Prohibit guessable passwords

such as common names, real words, numbers only

require special characters and a mix of caps, lower case and numbers in passwords

Reauthenticate before changing passwords

user must enter old pw before creating new one

Make authenticators unforgeable 

do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Python Visualize Data

1. The ALIVE status of each SEX. (SEX needs to be integrated into the only Male, Female, ND, and Other) (bar comparison chart, pie comparison chart)

2. How many Male, Female, ND, and Other are there in each ALIGN. (Bar comparison chart)

3. How many red-haired heroes do Marvel and DC have?

Module 1 Discussion Questions

  1. You are the IT project leader for Baker Manufacturing Company and have been assigned the task of leading a project team to design and implement a new global IT infrastructure between the Baker Manufacturing Company data centers (refer to the Case Study for details). Identify who should be on the project team and describe why you chose each member. Include references to support your comments in APA format. 
  2. Identify the major IT design and information security concerns and threats that should be addressed by the project team in developing the new global IT infrastructure. Provide details as to why you chose the IT design and information security concerns and threats. Include references to support your comments in APA format. 

Please do not use books or journals. Only use online references, such as www.google.com

Biometrics characteristics

   

Overview: In week four, you completed Milestone One of the final project(Biometrics characteristics) to provide an overview of the issue you selected and that was approved for your project. That overview outlined the importance of your selected issue with respect to a trend in the field of criminal justice and included information necessary to set the stage for your “supervisor.” Now you will identify and summarize five peer-reviewed scholarly articles that you will use to conduct further research on the selected issue for your final project.

An annotated bibliography is a list of citations for books, articles, and documents. Each citation is followed by a brief descriptive and evaluative paragraph (usually under 150 words): the annotation.

Prompt: Create an annotated bibliography summarizing the 10 peer-reviewed scholarly articles, which include both qualitative and quantitative research, that you will use for research for your final project.

Instructions:

1. Save this worksheet to your computer and begin work.

2. Refer to week four Worksheet Rubric for more information on how your submission will be graded.

Use the UC Library to locate peer reviewed scholarly articles. You must include at least two articles based on quantitative research and at least two articles based on qualitative research. The following UC Library resources can assist you: https://www.ucumberlands.edu/library

3. Complete the worksheet for article #1:

  

Citation

(use   APA style)

 

Does the article use qualitative research   or quantitative research?

(highlight   the research type)

 

Article summary

The research in this article is about .   . .

(provide   a one-to-three sentence description of the research that is outlined in the   article)

  

Writing assignment

Identify and define at least three Cloud Deployment Models.  What are their characteristics? What are the pros and cons?

Requirement:

Two page minimum (cover sheet does not count)
Double Spaced
APA Format

Digital signatures

Analyze the advantages and disadvantages of digital signatures. 

APA formatting is a must with a minimum of 350 words. You must use at least two scholarly resources. 

APA formatting checklist. 

Times new roman, 12pt
Set page margins to 1 inch on all sides.
Double-space all text, including headings.
Indent the first line of every paragraph 0.5 inches.
Order the references alphabetically, each must have a hanging indent of 0.5 inches and in-text citations for the references listed.

plagiarism report needed

Formula for Celsius to Fahrenheit

programming project 1

 

CELSIUS TO FAHRENHEIT

Write a program that converts Celsius temperatures to Fahrenheit temperatures. The formula is

Formula for Celsius to Fahrenheit where F is the Fahrenheit temperature and C is the Celsius temperature. Write a program that prompts the user to input a Celsius temperature and then displays the corresponding Fahrenheit temperature.

  • Must Submit Flowchart (from RAPTOR) and C++ program files.
  • Name the Visual Studio Project folder containing your entire project (replacing LastName and FirstInitial with YOUR name): LastName_FirstInitial_Program1 (example: Smith_J_Program_1).
  • Create a Windows Compressed Folder (do NOT use any other ZIP programs, just use a Windows Compressed folder) that contains your entire project along with your 1 RAPTOR file (I only need the .rap file of your RAPTOR program).
  • Name the Windows compressed folder (replacing FirstInitial with YOUR name): LastName_FirstInitial_Program_1.zip (example: Smith_J_Program_1.zip).