Discussion

Incident Response Team (IRT) Policies

  • Describe the different ISS policies associated with incident response teams (IRTs).

Keywords

Use the following keywords to search for additional materials to support your work:

  • Business Continuity Plan (BCP)
  • Business Impact Analysis (BIA)
  • Containment and Minimizing Damage
  • Disaster Recovery Plan (DRP)
  • Incident Classification
  • Incident Response
  • Incident Response Support
  • Incident Response Team (IRT)
  • Incident Response Team (IRT) Charter
  • Incident Response Team (IRT) Members
  • Media Handling

Bus Cont Plan&Disas Recov Plan

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Evidence Collection Policy

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response

team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a

CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence

collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner.

Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual

steps.

Address the following in your policy:

▪ Description of information required for items of evidence

▪ Documentation required in addition to item details (personnel, description of circumstances, and

so on)

▪ Description of measures required to preserve initial evidence integrity

▪ Description of measures required to preserve ongoing evidence integrity

▪ Controls necessary to maintain evidence integrity in storage

▪ Documentation required to demonstrate evidence integrity

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 1 to 2 pages

Self-Assessment Checklist

▪ I created a policy that addressed all issues.

▪ I followed the submission guidelines.

The Internet & Databases

 

Answer the following question:

How do you believe smart technologies and the Internet will continue to play an integral role in the use of databases as we collect more contextual, personalized data from all around us?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

Research paper

1.  

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet the following requirements:

• Be approximately 3 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. 

• Be clear with well-written, concise, using excellent grammar and style techniques. 

2.   While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. From your research, discuss what legal protections exist for Bitcoin users in the US and other countries(250 words)

Quatro

Deliverables:

SOFTWARE VULNERABILITY ASSESSMENT

PROCUREMENT POLICY LIST

SOFTWARE ACCEPTANCE POLICY

TEST SCRIPT PROCEDURES

SUPPLY CHAIN CYBER SECURITY RISK REPORT- two- to three-page narrative

ACQUISITION ALIGNMENT REPORT – one-page plan

SUPPLY CHAIN RISK MITIGATION FINAL REPORT- five to seven pages

SA – Discussion

This weeks reading mentioned various types of mobile attacks. In your own words state what types of attacks exists and the method of approach you would utilize to address the attack in an enterprise setting.

  Please state your answer in 500 words  with APA format. 

CS-340 2-1 Assignment:CRUD in MongoDB

 

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

VBA assignment

Being able to step through VBA code and debug code is a vital part of creating sound and useable code. Explain what debugging is and why it’s important. Include a discussion of static analysis vs. dynamic analysis.

  • Prepare a quality, substantive journal post that addresses the objectives of the assignment and the expectations set forth in the grading rubric. 
  • 300 words minimum is required. 
  • Use APA format