Discussion

Given the vast amount of known threat indicators and level of network activity today, automation has become a necessity. It’s often difficult and time consuming for human analysts to efficiently manage large amounts of granular data and a wide range of cognitive biases. Therefore, manual threat correlation is often too slow to keep up with the amount of data generated, results include a high number of false negatives and positives, and outputs are not always reproducible.

However, performing manual threat correlation processes will remain crucial. The human brain’s ability to leverage well-formed biases and perform higher-order reasoning is essential for assessing the validity and value being provided by whatever solutions your organization uses as well as building your cyber threat management team’s knowledge base. Thus, even when automated methods are employed, the final tier of analysis typically uses these human abilities for sense-making before any actions are taken.

Conduct your own research and discuss with the group the following:

  • Field Techniques of Comparison? 
  • Rules for Based Matching?
  • What is Fuzzy Matching?

Bonus point

How threat actors can evade detection via threat correlation ?

To post in the discussion board you must do the following:

1) Using APA format create a new thread. Use guidelines indicated above to help you write your post, 

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

References:

Reid, R.D., and Sanders, N. (2016). Operations management. 6th ed. Wiley.  ISBN: 978-1118

CYS-13-D

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 300 words

Questions

         

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

practical connection (course: Information security risk management)

 it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use proper APA 6 formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through

Class Diagram and Use Case Diagram

 

Address the first question posed and then create the two diagrams as instructed below.

You can create your diagrams in Visio®, Word, or PowerPoint® (using drawing tools in Word or PowerPoint) or draw them out by hand and share photos.

Assignment Requirements

  1. Describe the difference between a use case and a class diagram. What is the purpose of each? What role do they play in object-oriented-programming design specifically?
  2. Create a class diagram that describes an automobile dealership. Your class diagram should include at least 6 classes and show the relationships between the classes.

Refer to this site for additional examples of class diagrams:
http://www.agilemodeling.com/artifacts/classDiagram.htm

  1. Create a use case that depicts the actors (people and systems) and processes involved in a university system that registers students for classes. Be sure that your use case includes all actors (systems and people) Involved in a university class registration process and show the interactions between actors. At a minimum, you should show the student, the registrar, the online registration system, and accounts receivable.

Refer to this site for additional examples of use case diagrams:
https://www.uml-diagrams.org/use-case-diagrams-examples.html

assignment – 2pages

 

Submit a Word document that addresses each of the following:

  • Chapter 10
    • Define and describe business continuity.
    • Define and describe disaster recovery.
    • Discuss pros and cons of cloud-based backup operations.
    • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
    • Create a DRP for a company with which you are familiar.
  • Chapter 11
    • Define software architecture.
    • Define and describe SOA.
    • Compare and contrast a web page and a web service.
    • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
    • Discuss what it means for a web service to be interoperable.
  • Chapter 12
    • Discuss key items that should be included in an SLA.
    • Define predictive analytics and discuss how an IT manager might use such analytics.
    • Discuss how an IT manager might use load testing on a site.
    • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
    • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.
  • Chapter 13
    • List and describe common system requirements one should consider before moving an application to the cloud.
    • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
    • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
    • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
    • List and describe budget considerations one should evaluate before moving an application to the cloud.
    • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
    • Define and describe cloud bursting.

Your responses should be submitted as a Word document and the paper should adhere to APA format and style. Your answers should be written in your own words. Include proper citations to any sources you used in your answers.