Information Security and Risk Management

 

1.Discuss why a computer incident response team (CIRT) plan is needed, and its purpose.

2.Why are the roles and responsibilities important to be listed and kept updated for a CIRT plan.

3.Connect the dots: Discuss your understanding of the CIRT incident  handling procedures, the role policies play, and the importance of  communication escalation procedures.

4.What are some best practices for implementing a CIRT plan? Do some personal research to answer this questions.

MySql and Database

Show the results (using screenshots) of executing each SQL statement against the database you created. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

peer-2 week-5

For Milestone 2 (due in week 5), you will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the final project. The entire milestone should be a minimum of 6 pages with 10 peer reviewed scholarly articles.

For your reference, the portfolio project guidelines are attached here. 

Please see the UC library for help in formatting your bibliography.

Here are some examples: 

Here are some resources to complete a literature review:

Cryptography

in our technological world, cryptography is all around us. Examine your everyday connections to technology for evidence of cryptography.  Provide detailed examples of how cryptography exists in your world.  Next, explore the level of security for two of your examples and offer your opinion on whether the current security is strong enough.  

2 pages papers

Practical connection assignment

Practical connection assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) on how the knowledge, skills, or theories of Business Intelligence course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe how these theories and knowledge could be applied to an employment opportunity in your field of study. 

Instructions:

1.No plagarism

2.Cite the reference properly (according to APA format)

3.  You might consider looking at the Course Objectives in the syllabus OR the table-of-contents of the course textbook to identify topics to discuss.  However, do not copy these Objectives or Chapter titles into your paper – just consider using them to help you think about what to write. 

4.  I might recommend you start the paper by saying “I currently work as (or plan to work as) a  … and the following is how Business intelligence might be used in my current or future position.” 

5.You can use the course objectives (listed in the course Syllabus) as a guide:
Reference:  Sharda, R., Delen, D., & Turban, E. (2020). Analytics, data science, & artificial intelligence: Systems for decision support. Pearson. 

Discussion 7

 

Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this week’s discussion, we’ll cover threats to our nation’s pipelines. To get started, read this article:

https://www.eenews.net/stories/1060054924

After reading the article, start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity and Commonality  could help mitigate these threats.

Wireless Netwok 2

 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.   

Section one

Assignment Overview

Now that you have started to design a wireless network for your assigned institution, the requirements for the wireless network will be considered in the form of a Network Needs Analysis. 

All Case Studies

Directions: Refer back to the Design Document and complete the information in the “Network Needs Analysis” portion of the document. Consider the following when completing the “Network Needs Analysis” section:

Types of applications/services that will be used on the wireless network

Number of users the wireless network will have to support

Speed requirements for the wireless network

Estimate the load on the wireless network

Remember to address the needs of your assigned business setting when considering the requirements of the wireless network. While most businesses typically have the same setup, each individual institution has to be concerned about specific privacy issues, reliability, and security threats. Therefore, some additional research may need to be conducted for your assigned business.

1-2 pages with Reference

  Section two

Assignment Overview

When installing a wireless network, there are many components to consider, such as access points’ routing, switching, and effects on their OSI model. In this assignment, students will explore the different elements that need to be taken into consideration before installing wireless access points. 

  

Directions: Write a report (1–2 pages) to the company administration that explains how the design of the wireless network will help to avoid congestion on the network, as well as what components that need to be considered when installing access points. Consider the following when preparing this assignment: 

1. The area in which the site is located may interfere with the wireless signal.

2. IP wireless phones must always be in service.

a. Explain how routing, switching, and the physical /transport layers are relevant to wireless IP phones.

3. Construction workers and sales team members always need the up-to-date information in the system (i.e., the options that the customer chooses have to be correct).

with Reference