IT incident response wk7

 

Week 7 Discussion

1717 unread replies.1717 replies.

Research a method that PDFs are exploited. What versions of Adobe Acrobat Reader are vulnerable to the exploit? Document the methods for prevention against the PDF exploit and detection of the exploited PDF.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other students. 

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

Color Mixer

I need this program in Raptor

Color Mixer

The colors red, blue, and yellow are known as the primary colors because they cannot be made by

mixing other colors. When you mix two primary colors, you get a secondary color, as shown here:

When you mix red and blue, you get purple.

When you mix red and yellow, you get orange.

When you mix blue and yellow, you get green.

Design a program that prompts the user to enter the names of two primary colors to mix. If the user

enters anything other than “red,” “blue,” or “yellow,” the program should display an error message.

Otherwise, the program should display the name of the secondary color that results.

Computerized objects discussion board

1515 unread replies.1515 replies.

Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a computer or information system, in fact, are today.

There are obvious benefits, but are there risks as well?

For instance, would you feel more or less comfortable riding on a roller coaster that was computer controlled?

Do the benefits of computerizing an increasing number of everyday objects outweigh the potential risks?

Why or why not?

ABstract

Write an abstract of at least 500 words discussing the  SOX compliance? NO plagarism

Business continuity and disaster recovery_8/19

Describe in 2 pages how “Critical Incident Protection” or CIP plan. How will CIP plan pertains to companies like IBM company? How does role of software developer in the company can help the plan be successful?

Please provide two page description with citation and reference. Provide this asap

Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

200-250 words

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts. 

Discussion question, 350 words and 2 references.

Describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:

1.  What is that project? Provide complete description. Consider using PPM.

2.  What was the scoop, deliverable, and results of the project?

3.  What constraints did you experience and how did you handle them?

4.  If you had to do the same project again, what changes will you recommend?

Digital Forensics-Need at least 5 pages excluding ref and title need APA format need plagiarism report + Minimum 10 slides excluding Title and ref and need really fancy PPT not just copy paste, need with videos links images and more colorful

Need a minimum 5 page paper + minimum 10 slides excluding title and reference, need really fancy ppt with video links, images and colorful ppt, on the computer forensics topic with example of how its used to investigate crime, and following attached abstract . No plagiarism need plagiarism report and paper + ppt in APA format

Cloud Computing

 

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.