40/p2

Prepare a detailed outline of your paper.  Your paper (and outline) must address the following points:

  1. Describe the factors influencing the need for change and the imperatives for managing information assurance change initiatives.
  2. Discuss how the group and organizational dynamics may affect the success of your information assurance change initiative.
  3. Evaluate the leadership style needed to successfully implement your information assurance change initiative.
  4. Describe your change strategy and the potential resistance factors to be managed.
  5. Describe the change model most appropriate for your information assurance change initiative.

disction

-need one page 

 

-VLANs offer significant flexibility in the design and management of network traffic. From segmenting devices attached to the same switch to blending traffic from different buildings, VLANs allow network admins to design logical traffic flows that are not bound to the layout of physical devices. With  great power comes great responsibility, however, as many wise sages have advised throughout the centuries. The question that emerges is, how can you best manage VLANs so they function efficiently and securely? Do some research online for VLAN best practices and VLAN security, and then respond to the following question:

  • List some tips for VLAN configuration that increase security and overall network performance.

Anthropology of Language and Communication

 

The anthropologist Margaret Mead suggested that there should be an international writing system so that people of different cultures and languages could communicate. For example, most of the Western world uses Arabic numbers (1, 2, 3, 4) – even though they are called different things in different languages (e.g. one, uno, un, ein).

In today’s world, can we think of emojis in a similar way? Can we use emojis to communicate a message to those who don’t speak our language or come from a different culture?

For this discussion you will create a two sentence message using emojis.

Go to the website https://emojikeyboard.io/

Create a two-sentence message using any of the emojis available. Along the bottom of the page there are many different categories of emojis to choose from. Once you complete your message on the website, you should then cut and paste it in the discussion board as your initial response. Please don’t write anything else in the discussion that may help your classmates translate your message.

For your first reply to a classmate – select a classmate’s post that has not already had a reply. See if you can translate their emoji message. Please discuss why you translated it the way you did using examples of the symbols they posted. How do you think your culture (or subculture) affected the way you translated the message?  

For your second response – reply back to a person who translated your message. Let them know how close they came to your original message. Discuss what may have gotten lost in translation and why. For example, did they take a symbol literally, when it really has another more common figurative meaning? Using the learning resources this week, what are the cultural reasons that they may have either gotten or missed your message? Discuss how this exercise relates to the issue of language and culture? How do you think culture affects how people may translate symbols, or other types of messages?

**For this discussion, the rubric will be switched. Your replies to classmates will be graded as your initial post since that is where you will be writing most of your discussion this week. Your emoji message will be graded as a reply to a classmate in the rubric.

Provide your initial post by 11:59 pm on Sunday. Your initial post should be at least 200 words in length, excluding the discussion prompt and the references. Please use in-text APA citations within your post as well as full APA references at the end of your post.

assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could used these theories and knowledge could be applied to an employment opportunity in your field of study. 

behavioural biometrics / computer Science

1. Read about Common criteria and different EALs [1]. Understand the Protection Profiles and Security Targets. Discuss about the role CC plays to maintain and enhance the security of biometric systems and answer the question “What role does common criteria play in security evaluation of biometric systems and devices?”

2. FAR (False Acceptance Rate) is a measure for the security of a BB systems, whereas FRR (False Rejection Rate) is a measure for the usability of the system. Although both needs to be low, still they are contrary to each other. Do you agree? Explain using an example. Also how these measures help in making the system attack resistance?

Project 4: The Cybersecurity Threat Landscape Team Assignment

 Instructions

Group Project #1 MUST have 15 external scholarly citations within the submission.

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections.

Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder.  

Your team’s report should use the The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas:

Part 1: Threat Landscape Analysis

  • Provide a detailed analysis of the threat landscape.
  • What has changed over the past year?
  • Describe common tactics, techniques, and procedures to include threat actor types.
  • What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

  • Provide a detailed analysis and description of the APT your group was assigned. Describe the specific tactics used to gain access to the target(s).
  • Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

  • Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
  • Consider the hardware and software solutions deployed today in the context of defense-in-depth.
  • Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

  • Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
  • Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Notes

  • Use additional sources of information but also describe the concept in layman’s terms.
  • Use visuals where appropriate.
  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.
  • You will be assigned an individual grade for this assignment based on your contribution to the overall project.  

Organizational Analysis Paper

 Organizational Analysis Paper 

Write an 8-10-page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections:

 • Introduction of the organization, including history and background. 

• Organizational strategy. 

• Organizational design and your assessment of effectiveness. 

• Organizational culture. 

• Conclusion and what you would change about the selected organization for improvement.