Cloud computing within an enterprise risk management framework

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignement

  

Week-13 Assignment

This week we will focus on a Specific topic “IOT threats to database Security”

Please submit below two questions which relates to above mentioned topic. It is important that you use your own words. Do not use spinbot or other word replacement software.

  1. An annotated reference list of  at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.(Use References attached )
  2. A one page single spaced summary   of what you learned about this topic. it should be written in essay format  with no bullet or numbered lists. It must include quotes from your sources  which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

Research paper on Uber Breach

 

Company to work on is Uber breach and find any past issues/breaches the company has gone through, create Crisis Management Plan

Paper should include these points:

1. Introduction – brief background of company and any issues the company has had in the past such as data breaches

2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)

3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)

4. Crisis Management Plan:

a) Purpose

b) Committee for crisis management planning

c) Crisis types

d) Structure of the Crisis Management Team

e) Responsibility and control

f) Implementation Plan

g) Crisis Management Protocols

h) Crisis Management Plan Priorities

5. Conclusion

Page Count Range should be 20 pages not including: Title page, Table of Contents and References page

All References are to be in APA format. Only consider US articles

Project Outline

 

Primary Task Response

Your first task is  to post your own Key Assignment outline to the discussion area so that  other students are able to review your plan. Attach your document to the  main discussion post, and include any notes that you feel are  appropriate. The purpose of this assignment is to help improve the  quality of the Key Assignment draft that you will complete next week.

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Right Wing Web sites

Hide Assignment Information

Turnitin®

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Instructions

In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. What are the primary purposes of right-wing hate Web sites that use images, music, games, and the like to spread their propaganda?

2. Identify and explain situations where search and seizure is possible without a warrant. Please describe the limitations.

Due Date

Oct 11, 2020 11:59 PM

Cloud Computing Discussion 8

Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Do Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Digital Forensics

Chief Executive Officer & Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. 

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. 

 Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. 

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation. 

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2                

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

If Yes, provide a comprehensive narrative to support your assertion.