Week 11 Assignment

Assignment 1

This a research project and on this week, Choose any one topic and should stick to the same topic for coming weeks. Write a short paragraph (250 words) describing your project and how you intend to research it.

· Cloud Computing

· Computer Forensics

· Data Center Security

· Disaster Recovery

Assignment 2

Do a bit of research on penetration testing techniques. Investigate and document the following:

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration testing

Note: Please write between 250 words with intext citations and 2 references needed.

cybersecurity

Scenario:

You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.

Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.

As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.

To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.

Blue Stripe Tech’s computing environment includes the following:

  • 12 servers running the latest edition of Microsoft Server, providing the following:
    • Active Directory (AD)
    • Domain Name System (DNS)
    • Dynamic Host Configuration Protocol (DHCP)
    • Enterprise resource planning (ERP) application (Oracle)
    • A research and development (R&D) engineering network segment for testing, separate from the production environment
    • Microsoft Exchange Server for email
    • Email filter
    • Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
  • Two Linux servers running Apache Server to host your website
  • 400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools

Question:  List required standards for common devices, categorized by IT domain.  (These are group suggestions for these devices:  Printers, portable storage devices, mobile platforms, bio metric devices) 

Requirement: 

APA format

Double spaced

3 pages 

Challenges in utilizing Artificial Intelligence in Business Entities

Assignment Content

  1. STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both. 

    In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)

    For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following:

    • Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
    • Page 2 = 60 pts (breakdown below): Simply answer the following questions
    • (1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts) 
    • (2) What is the title of the research article you found? (5 pts)
    • (3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words(30 pts)
    • (4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings(20 pts)
    • Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)

Mobile Application – discussion

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the iOS platform. 

– 2 pages

– apa

How can I disable Router Firewall?

 

To find out how to disable router firewall, you must know the steps that you are supposed to follow. First of all, you should log in to your router settings; then, you should search through your router menus or settings for phrases such as firewall, filter, or packet check. Now the terms and locations will change, and then you must choose the appropriate option to disable the firewall settings and then save and apply to change the settings.

Read more: configure netgear router as access point

CASE STUDY-TRANSFORMING THE ORGANIZATION

 Week 5 Assignment – Case Study: Transforming the Organization

Use the Week 5 Case Study Template [DOCX] to complete this assignment. 

Congratulations! The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works.

The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running. Please also view the video How Tech Companies Are Revamping the Remote-Work Experience so you can recommend a change management pattern for your company to follow. 

Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics:

  1. How much of the implementation work can you handle? What additional resources (people, information, time, money, et cetera) will expedite the process so you don’t end up like Susie Jeffer?
  2. What is your change management strategy? Provide an outline. Consider:
    • What new equipment and software are necessary?
    • What training and support will the staff need?
    • How will the staff complete their work during the transition period?
    • Do you anticipate other areas of resistance?

The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations!

Your memo should be 3–5 pages long.

If you use sources to support your writing for this assignment, choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Develop an information systems solution to address an organizational problem

THE ATTACHEMENT IS JUST AN EXAMPLE

For count=1 to 2 do

  

For count=1 to 2 do
Prompt for cust_email
Read cust_email
Prompt for movie_title
Read movie_title
IF movie_rating = ‘R’ THEN
Read cust_age
IF cust_age < 17 THEN
Display ‘Customer does not meet minimum age’
ENDIF
ENDIF
Read rental_quant
Sales_tax = 5%
Total_bill = (rental_quant * $1.50) + sales_tax
Display cust_email, total_bill
END
END FOR
 

Modify the pseudocode above to contain the following modules:
– Enter Customer Email
– Calculate the Bill
– Print the Bill
 

After the customer has finished entering the movie titles, the system will calculate and print the bill.
Create a hierarchy chart for the modules.
 

Then modify the pseudocode for the problem above to:
• Enter the MovieName into an array named movies and QuantityonHand into an array named MovieQuantity The information for the movies is below. (QuantityonHand = -999 when end the file is reached)
• Update Movie inventory (add to inventory/deduct from inventory)
• Calculate and print the customer bill.
• Calculate and print the total daily sales.
• Calculate and print the average number of movies rented.
The customer will be prompted to enter their email address and whether they want to rent or return a movie.
Rent a movie -after the customer has finished entering the movie title(s), the system will calculate and print the bill.
Return a movie – a message is printed on the screen after returning the movie(s).
Modify the hierarchy chart to include the new modules
 

MovieTitle Movie Rating Movie Genre Movie Release Date Quantity in Stock
 

Braveheart PG13 War 1995 5
Super Troopers R Comedy 2001 3
Little Mermaid G Children 1989 2
Crank R Action 2006 4
Blow R Drama 2001 1

Lab 1: Creating an Acceptable Use Policy

Part 1: Research Acceptable Use Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on AUPs in order to form a basis for their purpose and usage. Understanding the reason for developing an AUP is key to understanding its component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing AUPs:

Cramer, M., & Hayes, G. R. (2010). Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing, 9(3), 37–44. https://doi.org/10.1109/MPRV.2010.42

Note: If you are unable to locate or access this research, find a similar scholarly, peer-reviewed article and provide a citation in your response.

2. Write a brief summary of the article. In your summary, focus on the need for an AUP and its key elements.

Part 2: Design an Acceptable Use Policy (0/1 completed)

Note: In this part of the lab, you will use what you learned from your research to design your own acceptable use policy.

  1. Review the example of an AUP on the SANS site: https://www.sans.org/reading-room/whitepapers/policyissues/acceptable-policy-document-369.

Note: While you evaluate the document, notice the following items:

  • The policy mentions positions rather than specific names.
  • The policy provides an overview of the topic but does not provide specifics on how a task will be completed. This point is the difference between a policy and a procedure.
  • The policy provides references to other policies or resources that were used to create it.

Keep this example in mind as you prepare for the next steps.

2. Consider the following fictional organization, which needs an acceptable use policy (AUP):

 

  • The organization is a local credit union with several branches and locations throughout the region.
  • A major focus for the organization is online banking.
  • The organization’s most critical business function is its customer service department.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.

Note: The best style for writing IT policy is straightforward and easy to understand. Avoid unnecessary wording and phrasing that could be understood more than one way. Write in concise, direct language.

3. Design an AUP for this fictional credit union, using the online example of the AUP as a template. Your policy does not need to be exhaustive, but it should outline the key components of an AUP and provide policy statements that address the above requirements. You may want to create your policy using word processing software on your local computer and then copy and paste the text into the deliverable field.

Challenge Exercise (0/3 completed)Note: The following exercise is provided to allow independent, unguided work using the skills you learned earlier in this lab – similar to what you would encounter in a real-world situation.

For this portion of the lab, you will utilize the AUP that you designed in Part 2. This exercise is designed to challenge your creativity by not providing industry guidelines or clues as provided in Part 2.

Select an industry other than banking. For example, you could choose manufacturing, higher education, or utilities.

Create a list of unique attributes of the business in your chosen industry.

Instead of creating an AUP, write a formal letter to the company’s CEO and board to explain the need for an AUP and your suggestions on the content of that policy.

List the Following Briefly in Six sentences each

Errors Failures and Risks 

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?