Cybersecurity and the internet of things

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cybersecurity and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. 

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Physical Security Controls

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Analysis and visual data_8/29

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

 For this week’s discussion, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide the class with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. Remember to also reply to at least two of your classmate’s posts on this questions and include all in one single thread

technology-based leadership

 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Research paper

  

Research topics: Biometrics in Physical security

Paper must be 6-7 pages excluding title page and reference 

The paper must contain 4 section- Introduction, Literature Review, Details and Conclusion

linux

1. For this discussion topic, you will need to research storage virtualization and its benefits. Your initial post should focus on what benefits exist from virtualizing the storage attached to the hypervisor.  

2. or this discussion topic, you will need to research network virtualization and examine the resources you find carefully. While most of the information you find will be targeted at the reasons to virtualize networks, you need to determine what pitfalls exist. Summarize your findings in your initial post.  

3. For this discussion topic, you are expected to do research and post your findings on the pros and cons of implementing and using a virtual desktop infrastructure. 

4. In IT, sometimes a large part of the battle when developing a solution to a problem is knowing what options exist.  For this assignment, you will research what companies offer network virtualization products and how their products differ with the goal of writing up a summary of what options exist.  You should include in your summary if any of these solutions come from existing network hardware companies.   

5. For this assignment do research on either VMware Horizon or Microsoft Remote Desktop Services and complete a plan to implement a virtual desktop infrastructure based on up on the business details provided.  You plan should include details as to how many of what types of servers would be needed, how many and what types of virtual desktops would be needed and any other considerations you might encounter.  

6. For this assignment you will research the common client hardware and software that is used by end users to access virtual desktop environments.   You should explore each of the client connection methods in detail list both pros and cons for each connection method or device.  You need to have a minimum of 3 different devices or connection types discussed in your paper.  

SQL ( fund of data systems)

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Bank Enterprise Information Security Policy

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel
· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers
· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer
o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel
· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking
Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures
Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]
RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.  

Network Security

A.) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share? 

B.) Answer Below Question in a sentence each:

1 List three design goals for a firewall.

2 List four techniques used by firewalls to control access and enforce a security policy.

3 What information is used by a typical packet filtering firewall?

4 What are some weaknesses of a packet filtering firewall?

5 What is the difference between a packet filtering firewall and a stateful inspection firewall?

6 What is an application-level gateway?

7 What is a circuit-level gateway?

9 What are the common characteristics of a bastion host?

10 Why is it useful to have host-based firewalls?

11 What is a DMZ network and what types of systems would you expect to find on such networks?

12 What is the difference between an internal and an external firewall?