Assignment Today

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.APA formate 

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Prepare an email

prepare an e-mail analyzing ethical privacy trends, confidentiality, and privacy regulations.  

Consider the following questions as you create your e-mail:

  • How      might privacy and user considerations differ for an application such as      Facebook, which is used primarily by individual users, compared with an      application such as an ERP system that is used primarily by corporations?
  • How      does the default selection of sharing versus not sharing information      affect the subsequent choices of individual users?
  • What      is the likely perspective of marketers on privacy issues at Facebook?
  • How      do app developers fit into the social media industry?

Note: There is no specific length requirement but consider the required information, audience, and how much time the audience might spend.

Please add your references.

mmm

Complete Exercise questions 1 through 4 found at the end of Chapter 13, CPM 4e. You must select a project that is available online or in print from a news source within 6 months prior to the due date for this assignment. Provide an active link or an image of the source (including date) as evidence and place it as an appendix to your responses to the exercise questions. Use a question-response format for this assignment. Provide in-text citation of all references. Use APA writing style. Turn-it-In will be used to screen this assignment for authenticity. Point allocation will be as follows: Source of project provided and within 6 months prior to the due date for the assignment – PASS/FAIL screen for the assignment. Question 1 – 20 points (ensure that you develop a complete list of as many potential contracted items as possible) Question 2 – 20 points (ensure that you properly cite the reference used to baseline or template your RFI). Question 3 – 20 points (ensure that your ideas are tailored to the project) Question 4 – 20 points (ensure that you explain why the chosen contract is used AND why others were rejected)

Security Architecture

 Assessment Description

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

  1. Identify all types of data and sensitive data the organization will store.
  2. Define where that information is stored.
  3. Record all hardware and software devices in your network.
  4. Describe how the security controls are positioned and how they relate to the overall systems architecture.
  5. Define security attacks, mechanisms, and services, and the relationships between these categories.
  6. Specify when and where to apply security controls.
  7. Present in-depth security control specifications.
  8. Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.
  9. Include the full scope of policy, procedural, and technical responsibilities.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

discussion

does a multilayered defense guarantee that attacks will not be successful? why or why not?

PYTHON

Attached below.

Part 1 is there for now. Part 2 will be available next week. 

Assignment

  1. Please give in-depth view of Security Threats what are the characteristic of Trojan Horses, Viruses, and Worms. Also brief describe common terms like malware, spyware, bots…etc. 

2. Please describe in details what is Denial of Service in terms of common form of Security Attack with example(s).

3. Describe more details then just brief about most common Four-layered Model of Security. Also study/research and brief describe common concepts of whitelisting, blacklisting…etc. in an organization environment. 

4.Please read chapter 32 of your textbook and review PP slides and read reputable articles/ web resources and discuss: 

How does disaster recovery relate to business continuity? What is the scope of DR? What is the scope of BCP? Please list your reference/s

5.Read chapter 32 , online resources and reputable articles/journals AND:

Choose an organization that you are familiar with, for example a university, place that you are working for or any other organization and write a paper and describe your plan and proposal for a comprehensive Disaster Recovery and Business Continuity plan.

List all your references/resources.

LEED Certification Assessment

  Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area or work location. Remember to get permission from security. If you wish you may approach the subject in terms of Best Practices.