COMPUTER SCIENCE

 

You have just received a panic call from your client explaining that the business next to their coffee shop network has just been attacked by malware. The client wants to know how the coffee shop can be protected from such a malware attack. Your task, is to reassure your client by explaining what malware is and the types of malware that could pose a threat.  Also be sure to go into detail with the client what should be done to prevent such attacks to their network. 

APA 7TH edition format, two page.

        Use the video segment, “Anti-Malware Solutions” to help you.

Need it Thursday by 5pm eastern time.

Br3

Reaction Paper:

Please read the classic paper (Zadeh, 1988) and write an 800 word summary and reaction paper

in APA format, including citations to the paper and a “works cited” section which must include

at least the source paper. This is an overview paper of a mature topic, so it may be wise to look

at some earlier material too if you have time. Please be sure to address its revolutionary ideas.

Works Cited

Zadeh, L. A. (1988, April). Fuzzy Logic. Computer, 83-93.

mod 4

 

Module 04 Content

  1. In this next part of your course project, your manager has asked you to work with the network security team to implement a zone-based firewall with a DMZ, stateful inspection, and ACL packet filtering based upon security level.

    During a PCS compliance audit, it was revealed that the Application Development team was operating on a public IP address range separate from the rest of the company. (Unknown to management, the application development team had convinced the previous network administrator that the public IP range was necessary for testing reasons when in fact it was because they didn’t want the company to monitor their downloading of pirated movies.)

    Your manager asked you to review the design and implementation process and asked for recommendations to be made concerning which security devices should be configured to use stateful inspection versus stateless packet inspection as well as next gen firewall technologies.

    Follow the process outlined in the Module 04 Course Project Template for your project and provide a response to the Body and Executive Summary sections of the template. Note: You should be working off the latest version of your Network Diagram from your previous project submission.

    the original network is attached make sure to use it for the updated network diagram in question number 1.

Auditing the Workstation Domain for Compliance

1.What are some risks, threats, and vulnerabilities commonly found in the Workstation Domain that

must be mitigated through a layered security strategy? 

2.

File-sharing utilities and client-to-client communication applications can provide the capability to

share files with other users (for instance, peer-to-peer networking or sharing). What risks and/or

vulnerabilities are introduced with these applications?

3.

Explain how confidentiality can be achieved in the Workstation Domain with security controls

and security countermeasures.

4Explain how data integrity can be achieved in the Workstation Domain with security controls and

security countermeasures.

5.

Explain how availability can be achieved in the Workstation Domain with security controls and

security countermeasures.

6.

Although users of desktop applications might not create mission-critical data, all of their data

represents a resource that, if lost, can result in a permanent loss of information or productivity.

Explain what countermeasures and best practices should be implemented to avoid this potential

disaster.

7.

What is the purpose of the Microsoft® Windows Security Configuration and Analysis snap-in?

Explain.

8.

How would you go about updating the Windows Security Options File? Explain how this option

can help mitigate risk in the Workstation Domain.

9.

What does the Microsoft® Windows executable GPResult.exe do and what general information

does it provide? Explain how this application helps mitigate the risks, threats, and vulnerabilities

commonly found in the Workstation Domain.

10.

What is the risk involved in caching logon credentials on a Microsoft® Windows system?

11.

What is the current URL for the location of the DISA Military STIGs on Microsoft® Windows 7

operating systems?

12.

Within the Windows 7 Security Technical Implementation Guide (STIG), what are the three

Vulnerability Severity Code Definitions defined?

13.

DumpSec is a tool used by system administrators performing information assurance on a

Microsoft® Windows 7 workstation. What is the purpose of this tool?

14.

From the Windows 7 Security Technical Implementation Guide (STIG), where can Windows 7

File & Registry Settings be reviewed and audited on a Windows 7 workstation?

15.

As per DoD and information assurance procedures, who must be notified if any exceptions to

DoD STIGs standards for workstation configurations are to be implemented?

Urgent 5

Part 1. Find at least two journal articles in your discipline (e.g. informatics, information systems, IT) that have a similar problem that you are attempting to solve in your systems analysis and design project for this course.  Use a minimum of two scholarly journal articles from top information systems, informatics, or information technology journals to support your systems analysis and design methodology.
In one paragraph each, describe the design methods and processes the authors of the articles justified to attempt to solve the underlying problem(s).  For example, did they use a framework or standard to benchmark and test their systems analysis and design?  Your methodology is the blueprint that you will follow to compare the old system to the new system in the results of the final phase of the project.  It needs to be objective and enable a proper benchmark that adequately compares the systems.  For example, you could use ACM, ANSI, ISO, ITU, NIST, and/or information standards like HIPAA or PCI.
Part 2. Include at least four unique systems analysis diagrams from your systems analysis project for peer review.  Diagram 1 must be a written use case / use case description of the existing system.  Diagram 2 must be a written use case / use case description of the new system. Diagram 3 must be an activity diagram of the existing system.  Diagram 4 must be an activity diagram of the new system. Do not attach the diagrams, embed them into your post as a video

H8

 Download and read the document and answer all questions in the document. Please see attached document H8 & APA Criteria doc.     

Wk 2 – Apply: Social Engineering Presentation

Assignment Content

  1. Imagine you have been hired to conduct a social engineering penetration test by a flooring sales and installation company with showrooms, warehouses, and offices throughout the state. Recently, several employees, including the company’s president, fell prey to a phishing scam. The company’s leadership realized they needed to better understand social engineering to better protect the company, the employees, and their customers. The first step is to present a general overview of social engineering and how social engineering threats function in preparation for the social engineering penetration test to the leadership team.

    Create a 10- to 12-slide media-rich presentation with speaker notes providing your client with details on how the social engineering penetration test will be conducted. Include the following information:

    Explain the concept of social engineering and how it can threaten the security of an organization.

    Describe human-, computer-, and mobile-based methods of social engineering.

    Explain differences between social engineering threats from inside and outside an organization.

    Identify tools and techniques used in a social engineering campaign.

    Explain how credentials are captured.

    Describe the target audience and what characteristics will be exploited in your social engineering penetration test.

    Format your references according to APA guidelines.

Practical Connection

 Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

 The above submission should be three pages in length.  Remember the total length does not include the APA-approved cover page or the references.  There should be at least three APA-approved references to support your work. 

Big data concepts Assignment

 Complete the following assignment in one MS word document:

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

Discussion questions:

 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise 3:

 At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.