Security Threats & Vulnerabilities

The paper must by at least 10 pages double-spaced

1″ margin all around

Black12 point fonts (Times New Roman, Arial, or Courier)

Correct APA format citations

Graphics are allowed but do not apply for the minimum page count.

A minimum of 10 references are needed.

The paper is automatically submitted to Turnitin to against plagiarism

Recommendations and Global Considerations (Recent Twitter Hack)

This paper is on the Twitter hack that happened in July of this year.

Submit the Recommendations and Global Considerations portion of the final project. In this assignment, you will suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. 

Critical Elements (Headers):

For the below recommendation headers ensure to:

a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence?

b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization preven tfuture incidents. Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of theincident. Be sure to support your conclusion

Recommendations: Organizational Change

Recommendations: Ethical Guidelines

Recommendations: External Standards

For the below global consideration headers ensure to:

a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is.

b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise).In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?

c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident

Global Considerations: International Compliance

Global Considerations: Cultural Impacts

Global Considerations: Global Technology Environment

powerpoint 4

Develop a compensation and benefits package that you would like to be offered from your organization.

– Should include APA formate with 5 slides not including the cover slide and the reference slide. Every slide needs to include 100 words in the Notes section

Book Review ,Weekly Summary and Lab work

Book Report for Chapters 7, 8, 9, and 10

Each week you will write and submit a book report. The book report will include a review of chapters 7, 8,9, and 10 of the book. 

Writing Requirements

Weekly Summary 7.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Writing Requirements

Lab # 7-1 Base 64 Encoding and Decoding

This lab will familiarize the student with the use of Base 64 Encoding. The student will create a text file using one of the file editors (Nano, Vi, or Emacs), then the student will encode the file using base 64. The student will then save the encoded file to a test file.  Once the file is encoded the student will then decode the using the base 64 decode command.

Then the student will write a report on the process of base 64 encoding and decoding  

Writing Requirements

Lab # 7-2 Base 64 Encoding and Decoding (Scripting)

This lab will allow the student to create a script that will run the base 64 coder command “n” number of times and then allow for decoding “n” number of times upon request.

Then the student will write a report on the process of base 64 encoding and decoding using a script

Writing Requirements

BigData wk13

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

—275 words—-

Resources:

X. Li, X. Wu, X. Pei and Z. Yao, “Tokenization: Open Asset Protocol on Blockchain,” 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), Kahului, HI, USA, 2019, pp. 204-209. doi: 10.1109/INFOCT.2019.8711021 

URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8711021&isnumber=8710850

Business Intelligence

 Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

Risk Framework

The Attached article reading gives a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For This week research paper, please address the following in a properly formatted research paper:

Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

Are there other frameworks mentioned has been discussed in the article that might be more effective?

Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

report paper

i need a report paper 8 pages in length double-spaced, using font size 11 point. The report can be of one of the three forms:

1. a survey;
2. description of your design and implementation of a security approach (original ideas preferred);
3. your practical experience on a particular security topic.

 the report should be about security and ethics including a references. be sure to summarize, rephrase instead of directly “copy” 

Try to make your report organized; you can divide your articles into several sections such as overview, design and implementation, discussion, related work and conclusion.

Disaster Recovery for Cyber Security Assignment

Individual Assignment.

Prepare a paper on how disaster recovery works in the Cloud.  Cloud Computing delivers fast recovery times and multi-site availability at a fraction of the cost of conventional disaster recovery. Because Cloud computing is based on virtualization, it takes a very different approach to disaster recovery.

In your paper discuss:

  • Your definition of Cloud Computing
  • Pros and Cons of Disaster Recovery in the Cloud
  • The Trade-offs between Recovery Time vs Costs
  • Three (3) vendors that Provide Disaster Recovery Cloud Services (DRaaS), prepare a grid and compare and contrast them. Which one do you like best and why?
  • The use of Virtual Machines and the concept of Elasticity
  • Cyber Threats: what are they and how would you protect the Cloud infrastructure?
  • What are the vulnerabilities of a disaster recovery solution using the cloud?
  • Benefits of Disaster Recovery in the Cloud: cost / features / functionality / deployment
  • Summary / Conclusion

In addition, as part of your paper, prepare a diagram (your original work) of a cloud-based disaster recovery capability for Samsung, including your RTO. For your reference attached is a diagram illustrating the Samsung computer systems / infrastructure / departments that need to be recovered. Samsung does not use virtual machines and all systems in the attached diagram are in a centralized data center.

Paper requirements: single space, 12 point font, 6 page minimum, 8 page maximum, include cover page not part of 6 page minimum. Include diagram, not part of 6 page minimum, as last page in paper with a caption that describes what it is a representation of.