IT476 week5

Adams, Ives, and Scott Incorporated is an agency that specializes in representing clients in the fields of sports and entertainment. Given the nature of the business, some employees are given a company car to drive, and each company car must be assigned to an employee. Each employee has a unique employee number, plus an address and set of certifications. Not all employees have earned one or more certifications. Company cars are identified by their vehicle id, and also contain a license plate number, make, model, and year. Employees represent clients. Not all employees represent clients, while some employees represent many clients. Each client is represented by one and only one employee. Sometimes clients refer one another to use Adams, Ives, and Scott to represent them. A given client can refer one or more other clients. A client may or may not have been referred to Adams, Ives, and Scott by another client, but a client may be referred by only one other client. Each client is assigned a unique client number. Additional attributes recorded for each client are name, address, and date of birth.

Create an ERD by first identifying the entities, then their relationships, and finally add the attributes to each entity.

Document everything including ERD diagram using Open ModelSphere or Dia.

OS vulnerability

 

It is necessary to understand that there is more than just file vulnerabilities in order to recognize the brevity of a situation involving an operating system attack that can render an entire system compromised.

Using the GCU library, research the security differences between the Windows and the Linux operation system. In 500-750 words, address the following:

  1. Proactive and reactive defensive tools provided by the operating system vendors themselves
  2. Third-party tools that further assist in mitigating cybersecurity threats
  3. Different methodologies used by hackers who have found a way to penetrate both operating systems
  4. At least one chart detailing the severity of at least five vulnerabilities found throughout your research, including descriptions of the potential side effects of the vulnerability becoming active
  5. At least one table outlining differing types of vulnerabilities for each operating system; within the table, including solutions to these vulnerabilities in the form of tools provided by the operating system vendor or third party vendors who provide mitigation tools for the vulnerability you list
  6. Evidence that exposes any trends found regarding each operating systems security efforts

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

1.2: Apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives.

Cybersecurity

Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and determine which security model it uses. Next, outline the steps it would take to move it to the next highest level. Estimate how much it would cost and how much time it would take to increase the level. Finally, estimate how long it would take you to replace all the data on your computer if it was corrupted by an attacker, and what you might lose. Would this be motivation to increase your current wireless security model? Write a one-page paper on your work.

Hacking

Research security-related matters affecting the common good and write a 500-750 word document reflecting “Hacking” and the impact current technologies and practices have on society’s ability to justly and humanely address associated concerns.

You must use APA style to include cover sheet, abstract, text, and references. You must cite at least three sources, with a minimum of two from refereed or edited publications.

Explore the ethical dimensions and dilemmas associated with “Hacking”, and reflect on how your experiences have shaped your perspective. 

Datamining Case study by Krizanic 2020

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?