Emerging Threats

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post

discussion-10

 

discuss the scope of a cloud computing audit for your business.

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Blockchain Implementation

 Every project that has a reasonable chance at success starts with a solid plan. A project plan is far more than just a schedule – it is a master plan that directs all planning and execution efforts to meet a project’s goals. For this class project, need create a project plan to implement a newly developed blockchain application. 

Experts

 

Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network.  They specialize in building secure firewalls as well as complex intrusion detection systems designed to keep intruders out.  They watch and monitor the incoming message traffic very closely.  But no matter how well they protect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.

When do YOU think an organization needs information systems security policies? Why? 

Essay Help – Python 3 Language

 

Assignment Content

  1. In this course, you have learned that computer programming is key to computer science. The ability to program a succession of instructions to resolve a computing problem is a valuable skill that is integral to many aspects of modern life. You have also seen the versatility and distinguishing characteristics that make Python 3 a popular choice for programmers.

    End-of-Course Essay

    Write a 1- to 2-page essay in which you connect this course to your own career or personal life. Imagine the audience for this essay is someone who is interested in finding out about your experience with this course and the programming language.

    An essay is a short composition on a theme or subject, written in prose and generally analytic, speculative, or interpretative.

    Consider these questions as you write. You may answer all or some of the questions in your essay.

    • Why is object-oriented programming a valuable skill?
    • What are the benefits and limitations of Python 3?
    • Besides programming, what are some other tasks you can perform with Python 3?
    • How might you use the concepts you learned in this course in your career or personal life?
    • In what ways would you like to extend or strengthen your knowledge of object-oriented programming or Python 3 in particular?
    • Grading guidelines:
    • Title your essay.
    • Write 1 to 2 pages on your experience with Python 3.
    • Consider your audience as anyone interested in your experience with the course and Python 3.
    • Cite any references to support your assignment.

      Format your assignment according to APA guidelines.

      Submit your assignment.

2 discussion questions, one project.

   

Microsoft Windows implements access controls by allowing organizations to define users, groups, and object DACLs that support their environment. Organizations define the rules, and Windows enables those rules to be enforced.

Answer the following question(s):

  1. Do you think access controls are implemented differently in a government agency versus a typical information technology company? Why or why not?
  2.  2. Do you think access controls differ among private industries, such as retail, banking, and manufacturing? Why or why not?

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

  • BitLocker
  • BitLocker      To Go
  • File      encryption via Encrypting File System (EFS)
  • Folder      encryption via EFS

Answer the following question(s):

Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages