Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments. 

BE JAA7

 

 Summary:

Pick one of the following terms for your research: Compliance, codes of ethics, ethics officers, formal controls, or ethics audit. 

Instructions

Journal Article Summary & Discussion:

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words-this should be in the 150-200-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected weekly reading assignment Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Quatitative Research paper

 Please use APA formatting and include the following information in the article with 600 to 800 words and properly cited.

  1. Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  2. Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  3. Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  4. Conclusions:  Evaluate the article in terms of significance, research methods, readability, and the implications of the results.  Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  5. References 

Attaching the document for reference. 

Discussion on networked setting

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.

Homework

Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.

List some of your personal, social, and cultural identities.  Are there any of these that are interrelated?  In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities? 

How does your personal, social, and cultural identities impact you as a communicator and as a listener?

System Architecture & Authentication System

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components. 

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.(600 Words)

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? 

What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? 

How about if we move the authentication system to a tier behind the DMZ, thus, a more trusted zone? 

What are the implications of doing so for authentication performance? For security?

EH week4 DB

Hello,

i need this paper by 09/16 afternoon.

Strictly No plagiarism please use your own words.

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Write a 300 words paper.

Strictly No plagiarism

MIS Assignments

 

View the following video on  Information Security Concepts in LinkedIn Learning: 

Information security concepts

https://www.linkedin.com/learning/cisa-cert-prep-5-information-asset-protection-for-is-auditors?u=74653834 ( if you have LinkedIn account)

or using the video in this Google Drive link: 

https://drive.google.com/file/d/1Nh-BtPM5lUolb–Iok5bcchDedOsxQs-/view?usp=sharing

Provide discussion answers to the following statements below.  The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive. 

1. Explain the three IS Concepts in the AIC Triad.

2.  Explain, in your own words, the following terms:  

2a.  vulnerability

2b.  threat

2c.  exposure

3.  Explain the difference between privacy and security.