Week 2- Apply: Malware Attacks

Assignment Content

  1. Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams; all of which make it easy to follow troubleshooting instructions.

    Throughout the next four weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

    Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

    Include the following information:

    • Details of the malware
    • The exploited vulnerability and its attack vector
    • Two risks of this malware
    • Step-by-step instructions on how to resolve the malware attack
    • Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

      Cite at least two resources within the assignment in APA format.

      Submit your assignment.

CC2

 

Consider, in 500 words or more, how cloud computing business processes as services can improve efficiency. This discussion is about the cloud computing business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Research Paper on Forensics

After reading the articles of digital forensics techniques, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

I attached one paper, and you need to download some more papers in order to answer these questions. 

Research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper Summary

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below point for a  total of 300 words 

1. Read four (4) academically reviewed articles on Cyber Security and Risk Management. 

2. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste

3. Base on your article review and the assigned reading, discuss the relationship between cybersecurity and risk management.

4. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Analytics Software

  1. Analytics Software
    In the Group Discussion board for Analytics Software, discuss the following software (do an Internet search for information about these products or use your experience with these products): 1) Microsoft Excel, 2) Microsoft Access, 3) Tableau, 4) R-, 5) PowerBI, or 6) other OLAP solutions.
    Group Discussions: Each student will choose one of the 6 products above, conduct research on that product, post details on that product to the Group Discussion FILE EXCHANGE, and discuss with the other students which product might be the best for an OLAP solution.

    1. Create an initial post to tell the other students which product you will be researching. Students
      cannot share a product.
    2. Each student is expected to:
      1. create an initial post immediately to identify the product you have chosen.
      2. post written details on your research frequently through the FILE EXCHANGE
      3. be active in discussions so others know what you are doing and what you have found
      4. post your final written details on your research at least 1 week before the due date
      5. 1 week before the due date, start discussing how your product compares with the other products and tell everyone which product you might choose for an OLAP solution and under which case you might use it.

wk5_dsdba

 Several Big Data Visualization tools have been evaluated in this weeks paper.  While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day.  Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.   

Research Paper

 

Your final research paper assignment is to write a research paper that explains how Enterprise Risk Management (ERM) empowers organizations to both avoid loss and capitalize on opportunity. You must provide specific examples. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)

Paper MUST address: How Enterprise Risk Management (ERM) empowers organizations to both avoid loss and capitalize on opportunity. Yu must provide specific examples

Cited sources must directly support your paper (i.e. not incidental references)

At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles