7700 words total. 11 questions.
threat modeling and simulations
In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.
· Minimum 700 words
Paper should be developed in accordance to APA
· Use citations with appropriate references
This assignment should be in APA format and have to include at least two references.
portfolio assignment
This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.
Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?
Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
• Be approximately seven to ten pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
ERM
Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf
Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf
- Which case study in the paper was most interesting to you and why?
- Do you think that ERM is necessary in the contemporary organization and why?
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources . Use proper citations and references in your post.
Assignment
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Air force missile
For this assignment, you will also need to read the 2 papers that are saved as:
15 sept-lights-out.pdf and 15 sept-HPEM.pdf, which can be found on Canvasor at the links:
https://breakingdefense.com/2012/10/new-air-force-missile-turns-out-lights-with-raytheon-microwave-t/
https://defensesystems.com/articles/2017/10/18/air-force-hpem.aspx
2.Read the 2 articles about Raytheon’s new missile. What does this missile do? Explain very clearly.[4 pts]
3.From an Information Systems standpoint, explain the impact of what this means, i.e. if this missile was actually used, what is the impact to any and all information systems –impact to anything else?? Give this deep thought and be VERY complete! [8 pts]
4.Does this concern you? (Think hard about this before you answer!) How? STRONGLY Support your answer with specific examples of your concerns or likewise be very supportive of why this does NOT concern you.[8 pts]
5.Next, research SDI (Strategic Defense Initiative) or “Star Wars”, which was a President Reagan term and initiative. What is this(be very clear)? Could this help the current (potential use of EMPs) situation? Explain thoroughly.[8 pts]
6.Lastly, imagine that you have been hired to protect your company against these Raytheon missiles. What options do you have? Be very clear and thorough.Think through ALLpossibilities. (feel free to be creative!))[8 pts]
Not to exceed two pages.
cys-self
Explain (in 3-4 paragraphs) how you feel about the need for Internet privacy. If you value your own privacy, explain why you do. If you feel you have nothing to hide, explain why you believe your privacy is protected.
Project-new
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses:
· Financial (Bank, brokerage, Insurer, etc.)
· Hospital/Medical Services
· Pharmaceutical/Chemical
· Social Media Company
· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
· Manufacturer (Automobile, Computer, Consumer Electronics, etc.)
Respond to the following:
· Identify the business type you have selected for your paper.
· Provide a brief overview of the business
· Provide the goals and approach to the project
· Architectural diagrams and annotations
Submission
Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer.
Check your work and correct any spelling or grammatical errors.
Include at least two APA most recent references.
emerging threats and counter measures wk12
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- Be approximately four pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
W11
You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:
- Who is likely to attack your site?
- When are attacks likely to occur?
- What sort of attacks might take place?
- How can you best minimize attacks and protect the integrity of your site?
Write between 200-300 words