Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

bi-11

 

There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Need about 350 words. APA format with citations and references

Data incident

Pick a data incident in the news; it can be one of the well-known or smaller incidents(Zoom would be great).   Create a plan to show how you would respond and describe some risk-mitigating items that if they were in place may have stopped this incident. (3-4 pages)

portfolio project

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 6

 1. Discuss the Sarbanes-Oxley Act and how it impacts you.    

2.  Discuss FISMA and how it impacts you and/or your work. 

Easy Computer Assignment

 

  1. Download the attached data file Snow19.accdb and then save it as SnowRemoval19.

*Make sure you know the location where you are placing your saved file before you continue with step 2.

  1. Use the Form Wizard to create a Form based on the Clients table. Select all fields for the form, use the Columnar layout, and specify the title ClientContactInfo for the Form.
  2. Display the Form in Layout view, and then apply the Organic theme to the ClientContactInfo Form only.
  3. Switch to Form View, and use the Client Contact Info Form to update the Client’s table as follows:Use the Report Wizard to create a Report based on the primary ServiceAgreements table and the related Invoices table. Select all fields from the ServiceAgreements table, and select the InvNum, InvDate, InvAmt, and Paid fields from the Invoices table. Do not specify any additional grouping levels and sort the detail records by the Paid field in descending order. Choose the Outline layout and Landscape orientation. Specify the title InvoicesByAgreement for the report.
    1. Use the Find command to search for pony anywhere in the Company field to display the record for the Pony Grill (Client ID 21). Change the Street field value in this record to 8930 Saddle Brook Way.
    2. Add a new record with your first and last names in the First Name and Last Name fields.
  4. Display the report in Layout view. Change the report title text to Invoices by Agreement.
  5. Apply the Organic theme to the InvoicesByAgreement report only.
  6. Resize the Service Type label so it is about half the width it used to be and resize the Amount field value box so the value in it is right-aligned with the values in the ClientID and DateSigned field value boxes.
  • In case you need help with any step, contact me immediately please.
  • In the event you turn your assignment improperly completed, you need to write a note and explain what step/s you did not properly complete and what you were doing that did not work. You need to be specific and as clear as possible. I need to understand your approach in order to be able to help you better.
  • The last opportunity to turn this assignment and get a chance to resubmit it in case you need to do it to ensure a better grade is Thursday, in that case you will have until Saturday to resubmit your assignment one more time with the necessary corrections to secure a great grade.

Module 2 Assignment

 

Module 2 Assignment

Due: Sunday, November 1st, 2020 by 11:00 pm EST

For this assignment, complete Chapter 1 – Introduction based on the instructions provided. 

INSTRUCTIONS:

This section requires that you complete all sections of Chapter 1 as specified in the CU Research Guide 

  •  Introduction 
    • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    • As per the CU guide
  • Relevance and significance 
    • As per the CU guide
  • Research questions
    • Add no more than 2 research questions as they relate to your research focus
  • Barriers and Issues
    • As per the CU guide

Structure  – CU Research Guide
Format – APA 

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763