IT incident response

 

Week 2 Discussion

2424 unread replies.2424 replies.

Detail two methods you would use to collect and analyze network traffic.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other (at least two) students.

Note: You will not see the work of other students until you make your DQ post.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

BSWA FP

Final Project Topic Name:  Security and the Cloud

In 100 words (1)

1.  Include a short paragraph describing your project (  Security and the Cloud ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (  Security and the Cloud ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography

Please include the following:  

 What is ( Security and the Cloud ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

Group Policy and Unix Machines

 

Discussion Question 1:

Describe Group Policy object and why an organization would choose to deploy Group Policy. Explain some of the settings within Group Policy that organizations might choose to keep their desktops and servers secure.

Discussion Question 2:

You are an administrator for a large organization with a group of web developers that works on UNIX machines. You need to come with a solution that enables the web developers to save their files on the Windows system so that those files can be backed up with all of your other data. Because the web servers are critical to the company, you must ensure that the data is available and backed up regularly. Describe your proposed solution.

Assignment

assignment

 Course – Cloud Computing

  • Residency Poster PresentationPrepare a PowerPoint presentation of your preliminary idea for your research project. The PowerPoint presentation must include the following:
    • Background on the problem (1-2 slides)
    • Explanation of the problem to be studied (1-2 slides). Include evidence that the problem is current and significant
    • The overarching research question(s) (1 slide)
    • Identify at least three scholarly sources that directly inform the project. The sources should be relevant and recent.
  • AssignmentResidency Annotated Bibliography (September 26th 1:00 pm EST)  [5 references which includes the references delivered in poster presentation and cover the below requirements for the topic and for which we will be doinfg for final upcoming research paper] Begin organizing the research and topics for your project using an annotated bibliography. The format of the annotated bibliography is a referene to the article, formatted per APA 7th edition, and an annotation or summary of the article. The summary should include important topics and how the topic relates to your research. Your annotations should cover three areas (typically formatted in three paragraphs):
    • Summary: What did the author do? Why? What did he/she find?
    • Analysis: Was the author’s method sound? What information was missing? Is this a scholarly source?
    • Application: Does this article fill a gap in the literature? How would you be able to apply this method/study to yoru study? Is the article universal?
    • Writing annotated bibliographies will help you develop the skills to critically read and identify key points within an article. This will help you determine the validity and usefulness of the articles in relation to your research topic.
  • AssignmentResidency Literature Review (september 26th 6 pm est)You will submit a draft of the literature review portion of your research paper. The literature review will form the main body of your final research paper. This will be where you provide a synthesis of the articles you have found related to your topic. When writing a literature review, you should include or consider the following:
    • An introduction and a conclusion
    • Avoid direct quotes.
    • Organize by topic or theme rather than by author
    • Use headings
    • Show relationships and consider the flow of ideas
  • AssignmentResidency Research Paper (October 1st 7:00 pm est)Submit your professional research paper (15 pages) on a current topic in cloud computing. Amend your paper based on feedback you received during the residency weekend. The paper includes your final literature review and your completed analysis of your chosen research topic. The paper must adhere to APA format and style (APA 7th edition). 

Discussion Board Forum 3

 

Topic: Evolution of Attack Tools

Despite the fact that system and network administrators are becoming more diligent about protecting their systems from attack, attack methods have become more and more sophisticated and so more effective. How have these attack tools evolved?

Your thread is due by 11:59 p.m. (ET) on Thursday, and your replies are due by 11:59 p.m. (ET) on Sunday.

Fixed and growth mindsets-500 words/APA Format

 

Research fixed and growth mindsets in scholarly peer reviewed journals. Write 500 words explaining what each is.  Evaluate yourself, do you think you have a growth mindset or fixed?  This assignment allows you to use first person.  You can say things like “I have a fixed mindset because I focus on grades rather than on mastering the material.” If you find that you are in a fixed mindset, what can you do to shift to a growth mindset?

For all paragraphs that do not include your opinion, self-assessment, or steps that you plan to take to shift your mindset, you must use references and citations.

Ensure you use citations and references to avoid plagiarism. Do use any sources other than those which you include in your references.  Ensure that all references are cited. 

Use APA 7th edition.

Be aware that if you plagiarize during this assignment it will be dealt with as outlined in UC’s policies.

Physical Security

 

Topic: Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

Instructions: Please download the Assignment 2 Physical Security Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_2_Physical_Security_Assessment.docx and submit to the appropriate assignment folder. 
Also review any additional files attached for more information.

Turnitin® enabled

Project 3: Proof of Concept Report

Turnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

  • Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
  • Address the topics listed in the Proof-of-Concept Report Template
  • Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
    • Start Lab page
    • AWS Management Console Name with your name visible from user drop-down
    • Task 1: Create Your VPC
    • Task 2: Create Additional Subnets
    • Task 3: Create a VPC Security Group
    • Task 4: Launch a Web Server Instance

How Will My Work Be Evaluated?

As a cloud professional tasked with developing a proof of concept for the companies cloud adoption, you will prepare a proof of concept report to be submitted to the company owner. By developing a well-structured report of your results and recommendations to management, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task.
  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.1.2: Describe the context surrounding the issue or problem.
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
  • 2.3.4: Address alternative viewpoints, perspectives, and methods.
  • 11.1.3: Install software.
  • 11.2.1: Configure technology according to stakeholder specifications and requirements.
  • 13.1.1: Create documentation appropriate to the stakeholder.