Project Part 2: Access Controls Procedure Guide Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 3 pages(Excluding References)

Self-Assessment Checklist

§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

Essay

 Write an essay of at least 500 words discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or other list formats.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your submission Do not use spinbot or other word replacement software. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Digital Forensics Tools&Tech week 11

 

Week Eleven Assignment

Using Chapter 10 as a reference, explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Bank network design and recomendation

  

Network Design and Architecture (4 pages)

The Network Design and Architecture section should include the following: 

The design and architecture will include network model drawings, descriptions, and justification of the design and architecture.

  • Infrastructure:
    • Describe the network architecture       that is suitable for this distributed network.
    • Include at least 1 visual       model of the system that identifies the major components.
    • Justify the physical design of the       system with reference to the requirements established in previous       sections of the proposal.
    • Summarize the estimated cost of the       network infrastructure.
  • Software:
    • Describe the software required for       the network.
    • Include the operating systems and       other software applications that are required to meet the functional and       operational requirements established in previous sections of the       proposal.
    • Summarize the estimated cost of the       network software.

Future Needs Analysis and Recommendations (3 pages)

  • Research current and future trends       in distributed networking.
  • Summarize at least three potential       changes in distributed networking that might affect your company.

Provide a modified design and architecture and discuss the changes from the original design proposal that would be required to support the new requirements 

Topic: [Revision] Data Structures and Algorithms

 Type of service

Academic paper writing

Type of assignment

Essay

Subject

IT & Technology

Pages / words

2 / 550

Academic level

Undergraduate

Paper format

Harvard

Line spacing

Double

Language style

UK English
Currently the paper explains nodes in detail, which is closer to my goal, however the assignment asks to design a data structure(s) suitable for the given scenario, and explain why it is good for that scenario. Here is the specification:
https://gyazo.com/00214761b67a4d34a4d832a716f8a575

I have attached the assignment document in full, but here is another link to the full document:
https://gofile.io/?c=E188so

Assignment

If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? 

2 Questions each one in separate document

Q1: Use the Web to search for examples of hacks that made the news.  Write a brief description of the      attack indicating what type of hack was involved.   

  • Hacking methodology, Hacking tools, Historical references
  • 200-300 Words 

Q2. In 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a fingerprint?  how hackers benefit from stealing medical records. Use an example from the news. 

          Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. 

https://www.youtube.com/watch?v=sWjic4xMHbM

https://www.youtube.com/watch?v=VDVhWro8to0

https://www.youtube.com/watch?v=iVeenkfa-0s

https://www.youtube.com/watch?v=Z77twyRQ5mY

https://www.youtube.com/watch?v=Xycb5wyTL4k

https://www.youtube.com/watch?v=QuMCvkqZbCQ

https://www.youtube.com/watch?v=avRkRuQsZ6M

Operative Paradigm

  1. Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
  2. The body of your paper should be 7–10 pages long, written in good APA, and with at least 10 references.

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

Videos Review why Big Data is important to field of Knowledge Management and your your current organization

a. “Big Data, Small World: Kirk Borne at TEDxGeorgeMasonU” found at https://www.youtube.com/watch?v=Zr02fMBfuRA

b. “KM Russia 2015: Big Data and KM” found at https://www.youtube.com/watch?v=UypaQRfgkKE (by Dr. John Girard)

1. Write 4-5 page document 

2. NO Title Page

3. Minimum 3-4 references

Discussion-II

 

Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect.