Physical Security – Research paper

Using proper APA formatting, write a 400-word discussion paper describing:

  • Physical Security mitigation for External Threats and Countermeasures.  
  • Search the Internet for an article for examples of physical security Physical Security mitigation for External Threats and Countermeasures.  
  • Why is Physical Security mitigation for External Threats and Countermeasures  ? So crucial in a data center?
  • Please cite at least two sources

Length: 2-3 paragraphs 

threat modeling

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin

Module 8 – Case Project 16-1

Write a code of ethics for an organization you belong to or a school you attend, and explain  the purpose of the code. Your code of ethics should have at least three items of expected ethical behavior.

Please don’t use books or journals as references.

resume

1. Submit your Resume Draft and Reference Page as one Word document. Please use the above resources to assist you in creating your Resume with Reference Page.

2. Submit your Cover Letter after reading the instructions on the attached document and review the template. Your cover letter should contain three paragraphs.

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following:  

Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive  incident. Discuss the challenges that organizations without proper Work Area Recovery Plan may face when disruptive events arise.

What are the benefits of performing Pandemic risk assessment in an organization?

The post should include adequate citations and references that adhere strictly to the APA format.

IT compliance

Develop a broad vision, an architecture, and a detailed plan of action that follows a life cycle concept for Developing IT Compliance Program for Alibaba 

Penetration Testing

 

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words

Policy

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many?