Project part 2

  

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

final papers

1)  Discuss in 300 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

2)   the surveillance state  

750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

Evaluating one quantitative research article

 

Do your research on statistical  research methods and choose one article that used statistical quantitative research method. Review the article and write a report following  the steps below:

Your report paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Scholarly articles can be found in the UC Online Library, in databases such as JSTOR or ProQuest. At least the article must be peer-reviewed, full-text article that used quantitative research methods from scholarly journals.

Note: When reading an article use the PECO to analyze the paper:

  • P – Population being study, techniques used in the paper
  • E – Exposure (what)
  • C – Control(how)
  • O- outcome

Scoring Rubric:

  1. The research paper used quantitative statistical methods to addressed the problems —20/20
  2. The paper is 3 to 5 pages excluding the cover page and references pages—-10/10
  3. The paper is APA formatted——10/10

Be clear with well-written, concise, using excellent grammar and style techniques.—-10

Week 10 Research Paper: Develop a Computer/Internet Security Policy

 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

What to turn in:  Computer Use & Internet Security Policy that you create!  This should not be a copy of a policy that you’ve read.

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

RM-RESEARCH-12

RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

4 pages full excluding references and cover page. Follow APA 7 format and citations.

TOPIC:

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.