The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.
CORE COMPETENCIES
Write a 4-5 page paper (deliverable length does not include the title and reference pages)
- What are the core competencies of two competing companies and how are they similar / different?
- What steps could each company take to improve and strengthen their core competencies to increase its current market share?
Wk 4 – Apply: Controls, Protocols, and Threats
Assignment Content
- Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.
Create an 8- to 10-slide multimedia-rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:
- What do they protect against?
- What is their purpose?
- Write a 2- to 3-page analysis of your findings answering the following questions:
- How are controls or protocols implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and protocols would you find in a security policy?
- WARNING – There are two assignment in one for this week, the presentation and written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.
Presentation checklist:
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Consistent fonts and font sizes throughout the presentation
- Use colors and background. No black and white presentations.
- Include at least one references that are properly cited
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
- Include speaker notes for every slide except title and reference pages.
- Did the use slides to convey ideas and handouts to communicate details?
- Did the slides follow the golden rule of one idea per slide?.
- Did the slide titles convey the key message of each slide?
- Did the visual diagrams to convey the concepts in a simple, clear, and memorable way?
- Can the charts be understood in less than 5 seconds?
- Did the pictures add clarity to the message the slides
- Did the presentation build curiosity in the audience by revealing information in stages?
- Did the presentation repeat the agenda slide as a guidepost to review your points periodically?
- Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?
- Are the slides clearly readable from the last row in the room?
- Consistent fonts and font sizes throughout the presentation?
In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.
Assignment checklist:
- The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count)
- Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points
- Include at least one references that are properly cited
- Any images must have a caption and referenced in the paper.
- Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab.
Project Phase 3
Unit 3 Project Phase 3 Downloadable Instructions
Congratulations, you have set up a new network in a rural area that will be serving a small neighborhood. Your network currently consist of 6 houses but is expected to grow to include all of the 500 houses in your area. The only other network alternative to your system is satellite networking which is very slow and prone to outages. You will be providing both cable TV and internet access through your network so make sure you are providing enough speed in your network for your customers.
You will be using the following packet tracer file:s
Download the project instructions. Type your class number: 10.___.0.0/16 in all of the underline ___ indicators, answer the questions as you go through the steps and add the screenshots where indicated in the instructions document. Save using the following file naming convention YourFirst_LastName_Project_Phase_3. Submit the document with the screenshots using the upload instruction.
physcial security
Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.
Your written assignment should consist of 2-3 paragraphs.
300 wods with citations, reference and no plagiarism
Please fins the attachment.
Mininet and Openflow
Problem-1: Create the network topology
Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.
Fig.1
Please refer attached document for topology(Figure)
Problem-2: Push the flow rules
Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.
· No traffic should be allowed between H3 and H1.
· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.
· The traffic between H3 and H2 should be routed through Switch S3.
· The traffic between remaining nodes should follow shortest path.
Problem-3: Link Bandwidth Measurement
Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:
· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.
Problem-4: Packet loss Count for a specific traffic flow
· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow
H4 —S4 — S2 — S1 — H1
· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow
H4 —S4 — S3 — S1 — H1
Deliverables:
1) Topology implementation file: prob1.py
2) Controller implementation file: prob2.py
3) Controller implementation file: prob3.py
4) Controller implementation file: prob4.py
*******
Java Program
Write a program, in a file called MeanNumbers.java, that collect integer variables from the user until the user enters a non-positive value. It the user has enter less than two values, display a message “Insufficient data.” and stop. If the user enters more than 10 values, display “Too many values” and stop. Otherwise, call the following methods and display the results: double arithmeticMean(int [] d), double harmonicMean(int [] d), and double harmonicMean(it [] d). arithmeticMean should calculate the arithmetic mean: am= ∑i=0 N d [i] N , harmonicMean should calculate the harmonic mean: am= ∑i=0 N 1 d [i] N , and geometricMean should calculate the geometric mean: am= N √∏i=0 N d[i] .
Defensive Technologies Responses
Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
In order to prevent attackers from gaining access to your network, there are three control mechanisms that are used to work together to make sure that security is maintained (Oriyano, 2013). These three controls are administrative, technical and physical.
Administrative controls deal with the policies and procedures. This includes setting up restricted privileges. Server configuration, alerts, response and desktop configurations. Implicit deny is a setting that defaults any missed settings or configurations ill automatically default to not allow access. Least privilege is setting each access to be allowed to only what is absolutely needed and nothing more. Job rotation is used to ensure not one person has too much power in one area, this helps to hold accountability. Other tasks consist of separation of duties, mandatory vacation, and privilege management. All these tasks help contribute to a good mixture of security from attackers internally and externally.
Technical controls consist of things such as passwords, biometrics, access control software, antivirus and malware software. Using access control software to be able to enforce access of sharing information and applications. Anti-Malware software and passwords are one of the most common and most needed technical tools for protecting the security of an organization (Oriyano, 2013). Passwords are only useful if used properly though.
Physical controls are thing that you physically use to protect your systems such as cameras, locks, safes, any types of barriers that act as an extra barricade for an attacker. I think of it like a prison, there’s location, that’s in a strategic place, usually in the middle of nowhere. Fences, barricades, guards, alarms etc. all this can be used to protect your equipment and personnel.
All three of these controls are used in combination with each other to provide an organization security and help prevent from attackers. Each action performed makes it one more hurdle for an attacker to have to navigate through.
Amanda
RESPONSE 2:
There are three overall types of controls used to prevent attackers from gaining access to a network or specific data. The types are Administrative, Technical, and Physical and with the three layered in whatever ways are chosen by the security or IT person, they protect or at least slow the would-be attacker.
Administrative controls are the rules that are in place to dictate who receives what access, and one of my favorite methods of doing this and slowing attackers is through the Principle of Least Privilege. This only provides users with the bare minimum access to perform their job, nothing extra. (Oriyano, 2014) This would slow attackers down because they would then need to find a user with the proper accesses instead of just getting access from any user.
Technical controls are what most people think of when it comes to security and are things like antivirus and malware software but are also methods of users authenticating themselves. (Oriyano, 2014) Biometrics would make gaining access much harder for an attacker as they would need to either somehow obtain a user’s biometric information or obtain it from the database where that belongs.
Physical control is exactly what it sounds like, but location is one that can be a huge deterrent for attacks. Does the server or data get stored in one location? Or is the locations broken up into sections? It can be harder for an attacker either way if controls are present. With one central location a location can only worry about the security for one location, but if the data is spread out the job becomes more work to locate where the data the attacker wants is.
Ruston
Phd: Discussion topic
As outlined within this weeks Topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Identify the challenges associated with each of the Catagories below:
- Data Gathering
- Storage and Integration
- Data Analysis
- Knowledge Discovery and Information Interpretation
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
600 Words Initial post with at least 3 scholarly references and In-text citation.
Comment 1: 150 words with at least 1 scholarly reference.
Comment 2: 150 words with at least 1 scholarly reference.
Please use proper APA formatting for Headings, paragraphs, spacing, references and all.