IAM cybersecurity

Describe something revolving around the topic of Identity and Access Management and given an example in real life (Top trends in IAM).

IAM And single sigh-on systems (SSO)

IAM and the internet of things (IOT)

Blockchain in IAM 

Use of Biometric 

2 pages 

Structured External Assignment 2

  

SEC 235 – Structured External Assignment

Students will research one of the Security Tech Topics below and create a Power Point presentation that will be presented to the class. You are to examine past, present, and future trends of this topic. This project is worth 100 points. This is to be submitted via Canvas by the end of Week 7. Please refer to the Structured External Assignment Rubric for grading guidelines. Listed below are the minimum requirements for the project:

Power Point Presentation:

  • At least 15-20 slides of text      (No more than 25 slides of text or points will be deducted!!!) Use      transitions, backgrounds, etc. Presentation can be animated.
  • Title      Slide (does not count as a slide of text!)
  • References      slide (does not count as a slide of text!)
  • Presentation      must be relevant to the topic. Cite      past, current, and present directions the technology has taken or will      take.
  • Graphics      and/or music, video should be included.
  • Cite      whenever necessary, using APA citation styles; no paraphrasing or      plagiarism.
  • Online      sites may be used, with the exception of “Wikipedia” and other like sites.
  • Use      good judgment when selecting information from websites (reliability)
  • Books,      magazines, articles, etc should also be used
  • Get Creative!

Topics to choose from:

  

Peer-to-Peer / File   Sharing / BitTorrent

Biometrics

 

Smartcards

Voice over IP   (VoIP) Networks

 

Internet3 / Web 3.0

Cloud Computing

 

Virtualization

WiMax

 

Packet Sniffers,   Network & Protocol Analyzers

Public &   Private Key Infrastructure

 

Ethics of Network   Monitoring in the Workplace

Intrusion Detection   & Intrusion Prevention Systems

case study

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Course topics – 

1. fundamentals of a firewall, various network security threats and issues

2. network security roles and responsibilities and who within an IT organization is accountable for these security implementations.

3. motivations of hackers and malicious computer network intruders.

4. why you need a firewall, best placement for a firewall, limitations of a firewall

5. VPN policy and deployment plan

6. elements of network security design, network security management

7. common firewalls and common firewall implementations.

Discussion

Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Write a python function

 1.1 Oliver would like to know how much money he earns on products that cost less than 5 dollars per unit. 

Write a python function that can take as input a table of sales like the one above, and return the total amount he earned on products that cost less than 5 dollars per unit. 

Note : You don’t need to import a spreadsheet or csv at this stage, just write a function that can take as input any table that has the same model as the one above. 

Cloud Computing

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.