Power Point Presentation (PPT) for Project for “COVID Tracking digital app” base on attached documents

Subject: System Analysis Project 

Create Power Point Presentation (PPT) for Project for “COVID Tracking digital app”

Details: 

VaxUS will be an online portal and we also create Mobile App to record, manage and maintain the vaccination status of individuals who have been given the Covid19 shot or shots, in their entirety.  

The assumption is that the individual has not been vaccinated.

We also need to think of upcoming children vaccine between 5 to 12 year of age base on their state certificate/record.

Requirement:

1. Total 12 to 15 slides

2. No title page

3. please MUST READ and include from below 

   a. Project Management Plan

   b. Requirement

   c. Feasibility Executive Study

   d. Methodology – Waterfall

HomeWork

Discuss both advantages and disadvantages of remote authentication protocols and how business will use them.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the blank APA template to get started.

Discussion……2

  

Review both videos below and respond to the following:

1. What is the relationship between vulnerabilities, threats, risks and controls.

2. What is vulnerability scanning and what are some tools used for vulnerability scanning?

no less than 300words and in your own words.

videos links

Case Studies II and Cyber Response

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Based on your case study 1 and additional cases studies attached, discuss the various cyber responses.

CASE STUDY 1:

Evil Corp is one of the most popular cybercrime organizations worldwide due to its numerous attacks in the past decade (2010-2020). Evil Corp is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB). It is thought that some of the most gruesome attacks on companies in the US and the UK by the group were actions on behalf of the FSB. According to Arghire (2021), Evil Corp is still active in the hacking business despite the indictment of its lead members in the US, just that it might have evolved into corporate spying activities.

Some of the most memorable attacks perpetrated by Evil Corp are in the banking sector. They have stolen millions of dollars from unsuspecting banks. A banking Trojan known as Dridex developed by Evil Corp harnessed the confidential details of bank customers in the US as soon as they clicked on phishing emails. The scheme affected computers globally where American banks operate, leading to a loss of $100 million. In another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts. The US department of justice also believes that Evil Corp’s malware named ‘Zeus’ and ‘Bugat’ transferred over $70 million from US individuals, some pensioners.

References

Allyn, B. (2019). Russian Hacking Group Evil Corp. Charged by Federal Prosecutors in Alleged Bank Fraud. Retrieved from https://www.npr.org/2019/12/05/785034567/russian-hacking-group-evil-corp-charged-by-federal-prosecutors-in-alleged-bank-f

Arghire, I (2021). Understanding Russia’s Evil Corp cybercrime organization. Retrieved from https://www.securityweek.com/russian-evil-corp-cybercriminals-possibly-evolved-cyberspies

Sanger, D. E., &Perlroth, N. (2020). Russian criminal group finds a new target: Americans working at home. New York Times.

U5

  • Search the internet for these search terms “security policy template”, “security framework policy examples”, “Information Security Policy Document”, “ISO-27001-and-ISO-27002,” and others that seem appropriate to you.
  • Create a policy document portfolio (templates / form / diagrams). A reasonable goal for the portfolio would be 10 – 15 documents.
  • Create a table of contents naming the document, include a brief description, the reference (URL) of where it was retrieved from, the date retrieved, and the covering organization.
  • Describe the common characteristics between them (all or in specific combinations / categories). See below for some of the questions you could ask of these documents.
  • Pick one of the documents for your deeper analysis.

Use these questions to perform the analysis, as well as any others as appropriate.

  • What is the purpose of the document?
  • What information does it contain and why?
  • What information is needed by the document?
  • Who has access to it?
  • Are there non-compliance penalties associated with it?
  • Describe and explain any other aspects of the document that are important to successful implementation.
  • What are some of the procedural rules surrounding the use and implementation of the document?
  • Describe the type, target group, and duration of training (estimate) that may be required to fully implement the document.
  • You may have experienced a burst of learning in completing this assignment. If that is indeed the case, please reflect on the reasons. If you felt overwhelmed with the assignment, please indicate so and reflect on the reasons. Present your reflections in the final paragraph.
  • paper should be 2–3 pages in length. Be sure to use appropriate APA format 

Discussion

 

Discuss  500 words or more discuss why Security as a Service is a good investment.

Use at least three sources.  Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

linkedIn assignments

you must create an MS Word document including the Certificates you earned from LinkedIn Learning (80% for at least 8 hours credited) and your opinion about the courses you took (20%).

Mobile programming device

 In this application, you will need to create a game using SpriteKit.
The sketch of the app is seen given below.

 Image was here and  is attached below:

The challenge of this game is to collect as many as flower with the vase (catcher). Flowers fall down from the top of the screen and user will move the vase and collects flowers. In the above figure the dashed line arrows show possible movement directions of the components. In the game no dashed line will be shown. The game scene runs in gravity. The flower will be left from randomly chosen X points (Y is fix) from the top. User can swipe vase only to the right and/or left to collect them. Once the vase touches a flower, then a score is made, and that particular flower disappears with a sound (for example, http://soundbible.com/1536-Stapler.html). User will be granted 60 sec to collect as much as flowers. On the top-right corner of the game, show the remain time and score. Make sure that not many flowers will release at the same time. You may adapt a strategy to release flowers in a discrete way, such as one flower will be release every 2 – 5 seconds from random coordinates. Make sure that flower and vase sprites are not so small and/or big. A typical size for a flower is 64×64, and for vase image is 100×100. Game ends after 60 seconds, shows the score and a restart button a new game. 

Practices for Cyber Threats and Defense

  

1. Define what constitutes a secure posture and how it helps in understanding the importance of having a good defense and attack strategy.

2. Describe the Incident Response Process and the importance of having one? Be sure to include some industry standards and best practices for handling incident response in your answer.

3. What is a Cyber Strategy and why is it needed? How can you build an effective enterprise cyber strategy?

4. What is the Cybersecurity Kill Chain, the different stages of the attack, and what are some examples of activities that occur in each one of those phases?

5. What are some strategies to perform reconnaissance? 

6. What are some current trends in strategies to compromise a system?

7. Describes lateral movement and how attackers perform lateral movement once they compromise a system.

8. What is Privilege Escalation and describe some ways attackers can escalate privileges in order to gain administrative access to a network system?

9. What is Threat Intelligence and proves a few different aspects of threat intelligence?

10. What is the Recovery Process?

11. Describe Vulnerability Management and the importance of vulnerability management to mitigate vulnerability exploitation. 

12. Describe log analysis and provide some techniques for manual log analysis since it is critical for the reader to gain knowledge on how to deeply analyze different types of logs to hunt suspicious security activities