quetion

 

Security Breach Evaluation

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

essay

  • Select a company of your choice and perform a case study similar to the Telenor case study described in the above article.
    • You may not have direct access to the company you select, which means you may not be able to conduct interviews, and you may not have access to all the information you would like access to.
  • Your case study must follow APA guidelines (see my guide in Week 1)
  • Your case study paper must be organized with the following level two headings. Use level one and level three headings as needed). 
    • Company Background
    • Company Business Strategy
    • Company IS/IT Strategy
    • IS Strategy Triangle (Read Shanardi and find other resources before arriving at the Friday meeting)
    • Strategic Alignment Model (Read Henderson and Venkatraman and find other resources before arriving at the Friday meeting)
    • Strategic Alignment Maturity Model (Read CIO wiki and find other resources before arriving at the Friday meeting)
    • Strategic Grid (Read McFarlan, McKenney, and Pyburn and find other resources before arriving at the Friday meeting)
    • Limitations (Cover the limitations of your study and paper)
    • Conclusions
  • Your paper must include at least five scholarly sources beyond the resources provided on Blackboard
  • Your paper must include a cover page with the names of all team members.

Cryptography (Please See Attached Rubric)

 

Review the following questions from Network security: Private communication in a public world and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

  1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

  1. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol’s answer to Alice’s challenge?

  1. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties— the good guys and the bad guys— get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. (note: this textbook is a reference for the assignment and not a required resource for learners)

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Assignment #019

1. Describe the importance of databases and database management systems in managing organizational data and information
2. provide the types and some examples of database management systems
3. address the advantages and disadvantages of using a DBMS.

Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

 Please download the Assignment 3 Door and Window Lock Assessment  template (MS Word), which is already in APA 7 format, using size 12  Times New Roman font, 1-inch margins, TOC, Headings and Reference page.  If you insert images or tables in your report make sure you label them  appropriately according to APA. Once completed name your file:  YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit  to the appropriate assignment folder. Also review any additional files  attached for more information.   

Computer Forensics

From the given scenario, we need to find 5 hidden evidences from the given image.dd file. you have to use Autopsy software to extract the .dd file

Color Mixer

I need this program in Raptor

Color Mixer

The colors red, blue, and yellow are known as the primary colors because they cannot be made by

mixing other colors. When you mix two primary colors, you get a secondary color, as shown here:

When you mix red and blue, you get purple.

When you mix red and yellow, you get orange.

When you mix blue and yellow, you get green.

Design a program that prompts the user to enter the names of two primary colors to mix. If the user

enters anything other than “red,” “blue,” or “yellow,” the program should display an error message.

Otherwise, the program should display the name of the secondary color that results.

Apply: Signature Assignment: SDLC Presentation

 

Refer to Ch. 3, “Pine Valley Furniture Company Background,” in Part One, “Foundations for Systems Development,” of Modern Systems Analysis and Design. In this course, there are weekly assignments incorporating Pine Valley Furniture, and you might use components from the previous week’s assignment to complete future Pine Valley Furniture assignments. 

Imagine this scenario: You work for Pine Valley Furniture. The board of directors is considering launching a WebStore and does not know what is involved in developing a new system. You have been asked to present to the board of directors to help them know what to expect.

Create a 12- to 16-slide presentation directed to the board of directors in which you:

  • Explain the importance of using systems analysis and design methodologies when building an information system.
  • Justify the systems development life cycle (SDLC) implementation, and explain why that’s the best option, rather than the quick and easy process.
  • Summarize the criteria for selecting commercial off-the-shelf software (COTS) presented in Modern Systems Analysis and Design, Ch. 2.
  • Identify additional criteria that are, or might be, used to select COTS.
  • Consider if the choice was between alternate custom software developers rather than pre-written packages.
  • Select appropriate criteria for comparing multiple application custom development bids.
  • Briefly define each of these criteria.
  • Briefly summarize the project management process.
  • Explain which of the 4 project management process phases you think is most challenging.
  • Explain how to mitigate the risks for that stage.

Include speaker notes and media, such as graphics or tables.

Cite any references and graphics used to support your assignment.

Format your citations according to APA guidelines.

Data Encryption Standard

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.