ETCM-Research-4

Evaluate it in 3 pages (900 words) exclude Title page and references from 3 pages:

Due Date: In 4 days. Friday End of Day USA time. 

For this assignment, review the article (Attached below):

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (900 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Datatronics Case Study on pages 246-250

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. 

Mainframe and Client/Server Environments

 

Respond to the following in a minimum of 175 words: 

Consider the following scenario: 

Your manufacturing company has operated with a mainframe IBM computer for more than 20 years. Recent technological advances have brought opportunities to replace that mainframe-based computing environment with a client/server environment. You have been tasked with responding to senior management about the security issues involved with replacing the existing mainframe computer environment with a client/server platform.

The salespeople you deal with from each vendor believe the current mainframe environment costs about $500K a year to maintain from a security standpoint, while a client/server environment would cost about $325K a year. But cost is not the only consideration. No PII or SPII data is contained in this manufacturing platform. It is strictly a final product for sale application. 

Outline and review a typical mainframe enterprise security footprint. Do the same for a possible client/server environment. This could include the use of the cloud for distributed computing, but that would also include unique security concerns. 

Discuss the following: 

  • Based on your outline, which of these environments is more secure and why? 
  • Does your outline show commonalities that could permit both the mainframe and the client/server environment to coexist from an enterprise security perspective? If so, what are they? 

Build or Buy

 

Build or Buy

Share your thoughts and opinions on build or buy in this week’s discussion.

  • Flesh out your thoughts and interact with your classmates. Post your initial response by the middle of each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Click the link to access the discussion. If you need help with completing discussions, please watch this video for more information.

Research Paper 5

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 2

Select from the following list four (4) topics and discuss. Use only 75-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 2  (Jamsa, 2013).

Chapter 2 topics:

  • Define and describe SaaS.
  • Discuss a SaaS provider for each of the following: –Sales and customer relationship management
  • Accounting
  • Income tax filing
  • Web-Based Meetings
  • Human Resources
  • Payroll Processing
  • Backup Automation
  • Office Document Creation
  • Social Networking
  • Define and describe mashups.
  • List the advantages and disadvantages of SaaS solutions.
  • Describe the role of OpenSaaS.
  • Compare and contrast a web service and a SaaS solution.
  • Define and describe SOA.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words.

The Open Web Application Security Project (OWASP) provides a distillation of several of the most well known sets of computer security principles; such as “Fail securely”

What “Fail securely” means and what architect a solutions can support that ?