Risk Assessment

Briefly provide an overview/description of your fictitious company.

Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.

security architecture 3.2

 

A typical DMZ is a network virtualization schema when a particular network connects to at least two different networks with different security levels. 

What would be the Cloud Based DMZ Architectures’  Challenges? Support your answer with Examples 

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

ENTERPRISE RISK MANAGEMENT

 

Chapter 18 presented special risk management issues with Blue Wood Chocolates, and chapter 19 presented various financial risks at Kilgore Custom Milling. If Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, if Blue Wood Chocolate and Kilgore Custom Milling are to develop a risk management framework, who should lead the process at each company? Should a Chief Risk Officer (CRO) be appointed? If so, to whom should he/she report and have access to? How could smaller companies without the resources for a dedicated CRO deal with ERM? What is the role for the board in such a process?

.

Wk 2 – Apply: Configuring and Deploying a Private Cloud with System Center 2012

 

he director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Submit your assignment.

Professional Ethics and Responsibility

 Review in 400 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Wk 5 – Secure Staging Environment Design and Coding Technique Standards Technical Guide

 

A software engineer designs, develop, tests, and evaluates the software and the systems that allow computers to execute their applications.

Take on the role of Software Engineer for the organization you selected in Week 1.

Use the Technical Guide Template to create a 3- to 4-page Secure Staging Environment Design and Coding Technique Standards Technical Guide for the organization you chose.

Research and include the following:

  • Design a secure staging environment for your organization.
  • Diagram your staging environment.
  • Include descriptions for each object in your environment.
  • Create a secure coding technique/quality and testing standard for your organization, covering the following secure coding techniques:
  • Proper error handling
  • Proper input validation
  • Normalization
  • Stored procedures
  • Code signing
  • Encryption
  • Obfuscation/camouflage
  • Code reuse/dead code
  • Server-side vs. client-side execution and validation
  • Memory management
  • Use of third-party libraries and ADKs
  • Data exposure
  • Code quality and testing
  • Automation
  • Static code analyzers
  • Dynamic analysis (e.g. fuzzing)
  • Stress testing
  • Sandboxing
  • Model verification

Submit your assignment.