Information Security and Risk Managment

  

Task 1

1. Define BIA (Business Impact Analysis)

2. Define BCP (Business Continuity planning)

3. Explain how BIA fits within BCP 

Goal and Purpose of BIA:  

The Main Goal and purpose of BIA are to analyze mission-critical services and business functions. Moreover, it helps to find and prioritize System resources/ Components by mutual relating them to the Critical processes or Services and identify the impact on those services if the System becomes unavailable.

BIA is used to find out impact to quantitative and qualitative process. organization determine five short and long RTO categories. As per there criticality processes and systems are kept in appropriate categories. BIA determines the time frame to restore each process or system to avoid serious organizational impact. for example, data backup should happen as frequently as possible. Recovery point objective should always be determined before any kind of data lost happens. Data restoration and time needed for it should always be considered as function of recovery time objective. 

Task 2 

1. Why do you believe (or don’t believe) reviewing a risk assessment plan is important.

2. What are risk elements; what process/s is/are used to find these risk elements; what role does a cost-benefit analyzes play in evaluating these risk elements?

3. Explain your understanding of a risk mitigation plan. As you recall, this was already partially discussed in week 10. However, for this week, go into the specifics of the plan, to include a narrative on the best practices used.

4. What role those a business impact analysis play in the overall risk management process? Include a discussion on the steps and critical elements a business impact analysis will provide.

5. Discuss your understanding of the benefits that can be derived from a business impact analysis, to include best practices to follow.

EH week15 p15

Hello,

i need this paper by 12/16 afternoon.

Strictly No plagiarism please use your own words.

300 words

In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Phd: Research paper-3

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper.:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet the following requirements:

• Be approximately 5-6 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. 

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

*** Please attach the grammarly score screenshot at the end of the research paper.

Database security

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list formats.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. 

Please keep in mind that you need to read and understand the instructions for your written assignments carefully before you begin them. When you are asked to use the Danforth library’s on-line publication database, do this. If you need help, please send an email to [email protected]. After you find the requisite number of relevant references that you can understand, read them and build a story in your mind from which you can write your own thoughts. (In other words, don’t plagiarize, or pay someone else to do your work for you.)

Follow the directions for formatting your document, i.e., the number of paragraphs, etc. Format the references correctly.

Don’t write a ransom note.

Basically, just read the directions and follow them. 

MI

 Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

.Ask an interesting, thoughtful question pertaining to the topic

· Provide extensive additional information on the topic

· Explain, define, or analyze the topic in detail

· Share an applicable personal experience

· Provide an outside source 

· Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Essay

 

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cyber security mini project proposal and materials needed

Topic: Home Automation Security and Vulnerabilities (need 3 word copies)

1) Submit mini project Topic with brief explanation. ( Home Automation Security and Vulnerabilities ) due today

2) Submit a brief abstract describing your mini project. (2nd copy) 

3) Subit minsi project materials.(3rd copy)

600-800 words, double spaced, written in APA format, showing sources and a biblography

Windows Server Project

 

There are specific requirements for the assignment: The final submission should contain at least 6 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

· At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader’s understanding of the proposal. Additional diagrams, images, or tables are welcome.

· The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

· The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

· At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. 

wk 13 fn

What future developments will we see for blockchain applications? Provide at least 2-3 examples.

Strategic IT Exam

 

Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
 

A. boot sector
B. file infector
C. file destroyer
D. file command
 

Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
 

Question 3 of 20 5.0 Points
 __________ invented the movable-type printing press that accelerated  the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
 

Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
 

Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
 

Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
 

Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
 

Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
 

Question 9 of 20 5.0 Points
 __________ is a type of software for securing information systems by  allowing only specific users access to specific computers, applications,  or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
 

Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
 

Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
 

Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
 

Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
 

Question 14 of 20 5.0 Points
 A(n) __________ is an ongoing planning process involving risk  assessment, risk reduction planning, and plan implementation as well as  ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
 

Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
 

Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
 

Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
 

Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
 

Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
 

Question 20 of 20 5.0 Points
 Some spam e-mail includes __________, which are attempts to trick  financial account and credit card holders into giving away their  authorization information.
A. freaking
B. tricking
C. phishing
D. luring