OE Case Paper: IT Governance and Security Culture

Week 6 case paper-IT Governance and Security Culture

 

Week 6 case paper: IT governance and security culture

85 Points Possible                                                    

APA format is required – USE THE APA 7 TEMPLATE.

Building on your case project, for week 6 you will research best practices in IT governance and methods for building an IT security culture within the organization. Follow the video links provided and research ITIL and COBIT systems, and determine which may best work for your organization. If your organization already utilizes one of these systems, describe how it has been deployed and what the impacts have been on the organization overall. In addition, following the required reading for this week, evaluate the importance of establishing an IT security culture within your organization, and describe your basic plan for getting started. If your organization already employs best practices in security culture, describe what they do and how it works.

Your paper should be 2-3 pages (not including the cover page or final references page), including in-text headings for the topics addressed, and in-text citations matching the references given at the end of the paper.

 

ITIL Beginners Guide 2020 – Learn fundamentals of ITIL Certification | Hot on YouTube

 

Introducing COBIT® 2019

Linux System Scan

 

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

You will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

MIPS

 Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number 

TCP/IP routing protocols

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

 – Title of Paper

 – Author

 – Class

 – Professor

* Introduction

* Body

 – Support Introduction 

 – Elements (see above)

 – History

 – Advantages/Dis-advantages

 – Two Programmable Parameters

 – How do they effect traffic flow

 – Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

 – Your Opinion of selected Routing Protocol

 – A Summary

 – Modern Day Usage 

Case study

 2. Case Study

  • Download the lab file “Compare Data with a Hash lab”
  • Follow the instruction mentioned within the lab file to complete it.
  • Provide screen shot for every step of this lab.
  • Provide the answers to the questions within the lab file.

Business process redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

ROTOR MACHINE CIPHER IMPLEMENTATION

  1) Using any programming language of your choice implement the encryption scheme that uses a simple two cylinder rotor machine. It is not necessary to implement the decryption scheme [50 marks] Please note that your submission is expected to run on IRIS. Please ensure that you use a programming language that is compatible with IRIS and also ensure the program can run on IRIS before submitting it 2) Specifications: The program should start by randomly generating the mappings for the inner and outer cylinders, with the inner cylinder rotating faster than the outer cylinder. You can use any data structure to implement the cylinders but a “map” data structure is recommended. The program should then prompt the user for an input string to encrypt. When the user presses the enter, the program should validate and encrypt the input string. Validation would mean that the string is well formed and is not a command. It should then output the encrypted text and prompt the user for another text value. The cylinders should update their state after each character encryption. At any time, the user should be able to enter a predefined string to exit the program. The program should also contain a sub-routine that prints out the current state of the cylinders by entering a predefined command at the prompt. Example output might look like: Inner Cylinder 25 ↔ 4 6 ↔ 11 . . Outer Cylinder 13 ↔ 12 12 ↔ 24 . . In coding the above, please note the following • White space, numeric and special characters should not be encrypted. Simply output whitespace, numeric and special characters into the ciphertext • You can write your code to be case insensitive – convert all input to lower case 3) What can you say about the computational complexity of your algorithm relative to the size of the input string? [10 marks] Test 1 [10 marks] 1) Output the state of your cylinders. 2) Encrypt the string “A” and output its encrypted value. 3) Output the state of your cylinders. Test 2 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “EE” and output its encrypted value. 3) Output the state of your cylinders. 4) Is a rotor machine a monoalphabetic or polyalphabetic cipher? Comment based on the results above. Test 3 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “Mr. Jock, TV quiz PhD, bags few lynx” and output its encrypted value. 3) Output the state of your cylinders. 4) Comment on the state of your cylinders before and after encryption. Please provide an explanation for what you observe. Submission 1) Submit the following documents separately in Blackboard by the deadline. NO ZIPPED FILES ALLOWED 1) All your code files 2) A detailed README file, which should explain how to run the code with sample input and output. If you are unfamiliar with READMEs you can find an introduction here https://www.makeareadme.com/ , here https://medium.com/@meakaakka/a-beginners-guide-to-writing-a-kickassreadme-7ac01da88ab3 and here v=RZ5vduluea4. Note that the README file you

submit for this project need not be complex, it only needs to at least explain how

to compile the code and run the code with examples. [5 marks]

3) A MAKEFILE that automates the building/compiling of your code. If you are

unfamiliar with Makefiles you can get a quick introduction here

https://www.youtube.com/watch?v=vye0kV5gvkA and here

https://swcarpentry.github.io/make-novice/02-makefiles/. Note that the exact

structure of your makefile will depend on the programming language you are

using, so you may choose to find an example specific to you. The Makefile you

create for this assignment need not be complicated. It only needs to define the

TARGET, its DEPENDENCIES, if any and the COMMAND to create the target

executable. [5 marks]

4) A report (which should include your answer to Question 3 and your test results

with screen shots)

Network Security goverance

 What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security? 

Need in 500 words