incident response in the cloud

Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

CSO

 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

1.Computer and email acceptable use policy

2.Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references 

:• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Incident Response Paper

 

Assignment Content

  1. Cyber security tools are available to organizations requiring integration of its problem management, configuration management, and incident management processes. 

    The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cyber security tool.

    Part I: Incident Response Plan
    Incident response is a disciplined methodology for managing the aftermath of a security breach, cyberattack, or some other security incident. An IRP provides an organization procedures that effectively limit the impact on the data, system, and business and reduces recovery time and overall cost. 

    Create a 1- to 2-page IRP Microsoft Word for the organization you chose in Week 1. In your plan, ensure you:

    • Discuss roles and responsibilities.
    • Discuss the critical activities for each of the 5 phases in the incident response process.
    • List at least 3 cyber security tools that work together to monitor the organization’s network for malicious and abnormal activity.
    • Part II: Change Management Plan
      Change management plans define the process for identifying, approving, implementing, and evaluating necessary changes due to new requirements, risks, patches, maintenance, and errors in the organization’s networked environment.

      Create a 1- to 2-page Change Management Plan in Microsoft Word for your chosen organization. In your plan, ensure you discuss:

    • Roles and responsibilities
    • The use of swim lanes and callouts
    • Who should be involved in developing, testing, and planning
    • Who reviews and signs off on the change management requests
    • Briefly describe how a change management plan reduces the organization’s risk from known threats.

      Part III: Cyber Security Tool Comparison
      Create a 1- to 2-page table that compares two of the industry standard tools that integrate incident management and change management. 

      Recommend the best tool for the organization to the CEO and CIO. Explain how it maintains compliance with the organization’s regulatory requirements.

      Format your citations according to APA guidelines.

      Submit your assignment.

       

Organization Leadership and decision making

  • What is the nature of leadership?
  • What is the difference between leadership and management?

Requirements

  • Your answer must be substantive, which usually requires 300 or more words
  • Your answer must be well written and well organized
  • Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.
  • NO PLAGIARISM

Physical securrity Discussion 6(500 words and references)

 10 threats choose 5:

  

a. Internal theft or diversion

b. Armed attack

c. Hostage incident

d. Burglary

e. Civil disturbance

f. Auto theft

g. Sabotage

h. Employee pilferage

i. Kidnapping

j. Robbery

he course textbook outlined the top ten security threats to an organization. For this assignment, write at least 500 words discussing the following:

  • Out of the ten threats list the five you think are most important
  • Describe and define each of these five threat areas as to their significance
  • Provide strategies you would have implemented to improve these areas to reduce risk and vulnerability

Assignment Requirements

Please provide and discuss the above

  • Each paragraph must have at least four complete sentences
  • You also need to respond to at least two (2) classmates’ posts (150-word each)
  • There should be no personal pronouns in your initial discussion post.
  • Your initial post is due by Wednesday before 1159pm
  • You should have a minimum of three credible in-text citations (Not at the end of your paragraphs)
  • All requirements must be met, and proper grammar, spelling, and punctuation must be correct.
  • Please also ensure you use the Discussion Board Header; you can find this template in the Getting Started folder.
  • No contractions should be used, or any conjunctions at the beginning of a sentence.
  • Failure to follow each instruction will negatively affect your grades.

Order # 13689 Information Management

Title:Information Management

Paper type: Essay

Paper format: Harvard

Course level: Master

Subject Area : IT Management

# pages: 13   ( or 3900 words Minimum)

Spacing: Double Spacing

# sources: 15

Paper Details

• Abstract (no more than 150 words in a single paragraph)

• Table of contents (Table of tables/figures if necessary)

• A subsection for each of the five questions of the assessment – no more than 4500 words in total

• References (or Bibliography) – at Master level you must use in-text citations to support your arguments and any work cited must appear in the References list at the end of the work

– Harvard referencing

Homework

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Answer the following Question

 

Consider the reputation service and the needs of both individual consumers and large organizations that are security conscious.

What will be the expectations and requirements of the customers?

Will small-scale consumers’ needs be different from those of enterprises?

Who owns the data that is being served from the reputation service?

What kinds of protections might a customer expect from other customers when accessing reputations?

map reduction

You are supposed to do online research and find out one case study where MapReduce was used to solve a particular problem. I am expecting 4-5 page write-up. Please provide as much technical details as possible about solution through MapReduce. 

I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up. I am not looking for copy-paste from some website. If I found out that it is copy-paste from some website then you will get ‘F’ grade in the course.

There are so many examples where MapReduce has solved complex business problems. Please use power point or Visio to draw technical diagrams to explain the solution. You have seen technical diagrams in our lectures throughout this class.