Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Please write a 350 words essay

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Incident Response Plan – Draft & Final

Please attach two different assignments. Please first provide the draft for the IRP then provide the revised IRP that is finalized. It is crucial that you thoroughly check for grammatical errors. 

Please do not use books or journals as references. 

Please use online sources. 

Requirements for final draft:

60.0 to >54.0 pts

Excellent

Plan includes the following for one data center and the global network: • Comprehensive list and explanation of potential incidents • Rating of incidents by risks as high, medium, or low, with rationale for all ratings • Mitigating controls to reduce the identified risks, with clear explanation and rational for each control • Identification of incident response team (contact list – names, titles, work and home contact information) with roles and responsibilities, and explanation of why those roles are responsibilities were assigned to each team member • Detailed and concise process to assess, describe, and document the damage with appropriate forms; explanation of rationale for each step in the process; forms clear and well laid-out • Detailed and concise incident reporting process and appropriate forms; explanation of rationale for each step in the process; forms clear and well laid-out

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Integrating Microsoft Office Project

  

You have started a new business selling used cell phones, MP3/MP4 players, and accessories. You have been using an Access database to track your inventory. You decide to improve the data entry process by adding a few additional tables. After the new tables are added and the relationships are set, you will create several queries to analyze the data. You will also create forms, reports, and export/import data between Access, Excel, and Word.  

Discussion

Industry: healthcare

Problems: Fraud and revenue cycle management. 

                 Patient experience. 

                 Price transparency.

                 Big data. 

                 Invoicing and payment processing. 

What are five ways the problem can be solved using blockchain technology? (This is the details to the use case)Who will the blockchain innovation impact in the organization?

  • You must explain – the what, how, why for each. 

security

Read the article, “How Apple and Amazon security flaws led to my epic hacking” by Mat Honan. A PDF of the article is posted to Canvas. In addition, you can find it online

http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/

For additional information, read:

 http://www.wired.com/2012/08/mat-honan-data-recovery/

4 Security Lessons Learned from Mat Honan’s iCloud Account Hack

AFTER reading the article, answer the following questions:

2.In all, 4 accounts were hacked.  Briefly list all 4 with the extent of “damage” (why hacking into the specific account was a problem).  Include your opinion for each account as well.

  3.Googleacct.    What is Google’s two-factor authentication?    Clearly explain first A. what two-factor authentication is at Google, then B. provide a clear and specific example of how Google uses two-factor authentication, i.e. how do they do two-factor authentication. This needs to be understandable. [note be sure you understand how GOOGLE uses it!]

4.“Wired” successfully verified the hackers’ access technique by performing it on a different account.   When it came down to it, what were the final three items needed to successfully do this?  Simply list the three.

5.Mat Honan corresponded with the hacker.  A.  What was the hacker’s “name”? and B.  Why were the accounts hacked, i.e. what was the “target”? Be clear.

6.What are TWO lessons learned that YOU personally could apply, after having read this article?  [i.e. in addition to what the companies need to improve!].  Be specific and be sure these are take-aways from having read this article.

DQ

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

final paper

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

short answer

 

Think back over the quarter and where you began with your storyboard and how your final project looks. Were you able to develop a site that followed your storyboard? Where did you need to adjust the outcome from your original vision of the site’s functionality? What challenges did you face? What major wins will you take away from the process?