discussion-3

 

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Cloud Security Threats and Mitigation (5 pages)

 Competency

Describe cloud security architecture.

Scenario

You are the cloud security expert for a finance company. Your company is planning to store Personally Identifiable Information (PII) data on a public cloud medium. Your company will use this PII data to run analytics and then send credit card offers to its customers. It is a federal obligation for financial firms to protect PII data. A public cloud is a safe option but there are still many security threats to consider.

You need to analyze the various security threats and analyze various cloud services that are available to protect your data.

Instructions

In order for the leadership team to approve funding for this project, you will create a case study to help the leadership team decide how to enhance the security of the PII data in the future.

Your case study should include the following points:

  1. Security threats on the cloud
  2. Data encryption on a public cloud
  3. Threat detection tools for a public cloud
  4. Vulnerability scanning tools for a public cloud
  5. Cloud-native security services for a public cloud

Be sure to use a professional tone and check your spelling and grammar.

Length

Microsoft Word, 5-6 pages

References

Include a minimum of 5 scholarly resources

Resources

The requirement to PASS (RUBRIC)

 Word document is 5 or more pages. 

 A full, robust, and detailed description of security threats on the cloud. 

 A full, robust, and detailed description of data encryption on a public cloud. 

 A full, robust, and detailed description of threat protection tools for a public cloud. 

 A full, robust, and detailed explanation of vulnerability scanning tools for a public cloud. 

 A full, robust, and detailed description of cloud-native security for public cloud infrastructure as a code tool. 

 5 scholarly references provided; documented correctly. 

Physical security- Security Threats

Using proper APA formatting write a 400-word discussion paper describing:

  • Discuss the theory and concepts Approaches to Physical Security
  • Search the Internet for an article for examples  of physical security threats
  • Why is Physical Security so important?

3 Page Writing In APA 6th Standard – Explaining Data Presentation

Writing should be APA 6th standard. From the attached textbook Select 3 different data presentations from chapter 6 of the text (Grey Section). Pages 240-366

For each different data presentation answer the following:

What is the Page # and picture/snapshot of your Visual?

What is the visual that you selected?

What is the purpose of the visual?

What kind of data should be compiled in the selected visual?

What kinds of data should not be compiled in the selected visual?

How can you avoid making the visual misleading?

Create new Security policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people and have been asked to write two new security policies for this company. 

The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms 

Assignment

 

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples.

Why Is Enterprise Architecture Important for healthcare industry ?