7 pages
Discussion – 4 – Response to Peers
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Acme Enterprise Scenario Residency Week
Acme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc.
Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO.
Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:
1. Perimeter Security
2. Network Security
3. Endpoint Security
4. Application Security
5. Data Security
6. Operations
7. Policy Management
Migration from local to Cloud Infrastructure
Deliverables
You company has been allocated an unlimited budget to move to a virtualization infrastructure. The current IT infrastructure exists on bare metal with no virtualization implemented at all.
The current infrastructure contains the following components:
2 x Windows 2008 R2 Domain Controllers
2 x Exchange 2013 Servers
1 x SQL 2012 Server
1 x Red Hat 7.0 Apache Server
2 x Windows 2008 R2 Servers as File Servers
Your task is to do the following:
1) Provide a cost and description of the new hardware you will be implementing
2) Develop a migration plan to move all current infrastructure to virtualization (this also means 0 downtime)
3) Identify and Upgrade the old operating systems and software in the current infrastructure
4) Expand the current infrastructure to include new technologies (eg. An MDM solution)
Please create a detailed report on the tasks above.
Systematic Literature Review of Dynamic Threat Modeling
I have a research paper that I would like to hire you to help me out.
It is on Dynamic Threat Modeling.
I want you to do a systematic literature review on Threat Modeling on smart city. First and foremost, I want all the threat modeling techniques and methodology analysed.
The advantages and disadvantages of the various techniques should be analysed.
I want to differenciate the static threat modeling techniques from the ones that could be employed as a dynamic Threat modeling technique and used to model likely threats in a smart city.
Scenarios should be given on an attack in a Smart environment to get the risk score and how the chosen dynamic technique would be better suited to model in such scenario.
For example, there are various nodes such as computers, smart printers, switches, routers in a Smart environment. Normally, the organisation would be doing all they can to protect these devices and systems because they are always subject to attacks. Normally, a risk assessment would be performed on these nodes to get their risk score (which is to show the level of risk) to show how to protect these assets.
Most times, the level of risk of one asset is higher than others because organisations value some assets than others. For example, organisation could put more value on a Web server than an email server. Others could value their systems to people, while another organisation would place more value on their data to protect their customers information.
Now, when a risk assessment is conducted, different values are placed on the various assets in an organisation or smart environment. For example, the risk score on a Web server is 5 out of 10 while that of the payroll is 2 out of 10.
When an attack happens on the organisation and the web server is targeted, there could be a chance that it might be penetrated. If it was successfully attacked, the organisation might be informed due to the kind of security system in place that gives them signal when something have been attacked. When this happens, the risk score would be raised from 2 to 8. Now, this can only be assessed again by the risk analyst by conducting another risk assessment. This is a static way of modelling the threat level of an entity. This method is not always encouraged because one have to manually risk assess the whole system again and could take time. This is where dynamic modelling comes in.
I want you to categorise all the threat modeling techniques such as STRIDE, OCTAVE for example. There are many many others.
I want them to be analysed critically. How they work, their advantages and disadvantages.
Analyse which of them are static, dynamic or can be used as both to model threats.
Analyse why static is not really ideal because we need the risk score to dynamically change as soon as a threat occurs and not having to manually wait for the risk officer to conduct another risk assessment.
Discuss the likely best framework/technique for my threat modeling. This will be used to compare other techniques in the literature. Also explain why (with referencing) a certain methodology would be best suited to be used to dynamically model threats in a Smart city domain.
Analyse and categorise if the static threat modeling techniques and dynamic modeling techniques (Is it quantitative or qualitative) could work for the scenerio. For example, does this meet my scenerio. Using OCTAVE as an example, we could say, it works for this scenario while STRIDE does not meet this scenario because this and that.
This paper should contain academic references
Note, this is on smart city. Conducting the analysis for threat modeling for a Smart city
W11
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
- Who is likely to attack your site?
- When are attacks likely to occur?
- What sort of attacks might take place?
- How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words
Information Systems Business and Beyond
students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 2 pages, double spaced of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. The assignment is worth 100 points.
Requirements:
· Provide a minimum two (2) page, double spaced reflection paper. Include a coversheet with your name, title and class ID as a minimum.
· Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Coversheet, reference list, figures and tables don’t count toward the two (2) page count.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Business Intellegence
Discussion Questions:
1. Some say that analytics, in general, dehumanize manage-rial activities, and others say they do not. Discuss arguments for both points of view.
2. What are some of the major privacy concerns in employing intelligent systems on mobile data?
3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
Exercise:
1. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork
Computer
Definition of computer science
SC_AC16_9a
Access Database Assignment