CYB/100 Week 3 Assignment

Assignment Content

  1.     The CIO of the organization you chose is ready for you to take a look at the organization’s potential vulnerabilities and threats.

    Complete the 1.5- to 2-page Security Planning and Risk Management Template. Include the following:

    • Considering the aspects or components of the cyber domain, list potential vulnerabilities or threats facing the organization.
    • Give a description of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation.
    • Explain each risk’s impact on the organization.
    • Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Or, give a defined reason why this vulnerability or threat would not be mitigated, such as the use of a different risk control strategy.
    • Include citations as necessary in APA format.

      Submit your assignment.

Project Plan

Complete the Contract Plan Template to use a third party for the new website.

Customize the template to fit the needs of HWE Accessories. Include the following:

  1. Evaluation and selection process
  2. Contract management
  3. Vendor risk and relationship management
  4. Software escrow
  5. Software licensing

Project Milestones

Review your project plan from Wk 2.

Add project milestone dates and dependencies to your tasks and subtasks.

Write a 1- to 2-page summary of your project milestones and dependencies. Include answers to the following questions:

  • How will you know if your project is on track?
  • What will you do if a task or subtask is not proceeding on time?
  • What criteria besides time may be used to measure the project’s success?

Cloud computing – Virtualization

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Module 2 – Security Policy Statement

Use the attached documents to complete the assignment and use the template provided. 

For references please only use online websites. Do not use journals or websites. 

40.0 to >35.0 pts

Excellent

Contains a clear explanation of purpose and scope of the policy and specific objectives of the policy, including information beyond what is found in the template.

Discussion

List and briefly describe the process you would take to conduct test the security of a firewall?

** Do NOT write an introduction, rather just answer the question noted above **

Note: The essay should be one-page at most (double-spaced) and should include an APA cover page and at least two references (academic or professional literature) in APA v7 format as well as the in-text citation.

Buy Geometry Dash: Read Apps & Games Reviews

Welcome to Geometry Dash.

Geometry Dash is a rhythm-based platformer game developed and published by RobTop Games. 

It was released for $1.99 USD on August 13, 2013 for iOS and Android, and for $3.99 USD on December 22, 2014 for Steam. 

A lite version of the game is available on mobile devices with fewer features, as well as free expansions, Geometry Dash Meltdown, Geometry Dash World and Geometry Dash SubZero, which include exclusive levels.

The player takes the form of different entities with unique mechanics such as a cube, a ball or a UFO. 

Using one-touch gameplay, the player must try to navigate through a series of interactive obstacles, movement-shifting transporters and behaviour-manipulating portals to reach the end of levels without crashing, all while listening to exciting soundtracks along the way.

  

Buy Geometry Dash: Read Apps & Games Reviews

Cryptography

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

In your own words, using the APA 6E guide, prepare 200 to 250 words summary about this research by John Anthony by reading the attached peer-reviewed research paper.

  

Peer-Reviewed Assignment – APA 6E Guide. To complete this assignment, the following instructions must be followed:

o read the attached peer-reviewed research paper in its entirety

o in your own words, using the APA 6E guide, prepare 200 words to 250 words summary about this research by John Anthony

o  DO NOT COPY and PASTE parts/sections of the research paper to complete this assignment

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?