scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

security architecture 15 .2

 

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section 

This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

social engineering attack (Cyber Security)

 

You have a new CEO (this is the same new CEO from Weeks 8 and 9). They are non-technical and came to your organization from a completely different market segment. You’ve been tasked with training this CEO on how to spot and avoid falling victim to a social engineering attack. You will also develop a pretend phishing email to test the CEO to see how much your training worked.

Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures. Slides, infographics, interpretive dance – any of these can be used to convey to the CEO what social engineering is and how to avoid falling prey. If you use something other than a letter or memo you’ll need an introductory document (yes, with letterhead!)

For the phishing email, you can type it out in Microsoft Word. It is understood that the phishing email might not be grammatically correct.

***Give your CEO a name. CEOs can be any gender***

Computer Security – week 12

 What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one? 

Cyber law 3

describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.

File

Discussion

 

Figure 9.1 shows the six stages of process development.  Can you explain the six and how they can apply to your daily life?  Additionally, there is a dotted line between Policy evaluation and production identification, Policy evaluation and Policy implement, and Policy evaluation and Policy formulation.  Can you explain this line and why they are important?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

need 2 pages 

Resources: 

 Attached Files:

A7

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.

research paper

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

·  Introduction Section – A 2-3 page paper describing the industry chosen and potential resources to be used. 100 pts.

· Develop a full annotated bibliography (3-4 pages) and develop the literature review (3-4  pages). 200 pts.

· Completed final research paper (both milestones combined together and include the last sections as discussed in the list above). 300 pts.

3s week 14 assignment CC

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include References.

Important Note: Quotes need to be done properly. (-5 marks if quotes don’t have quotation marks)