Week 8 Course Project

 Week 8

Course Project Presentation

Add one new feature you have not added. This could be an additional array or function, an additional calculation, more inputs, or even try adding color. Create a powerpoint presentation explaining your course project. You should include the following slides: introduction, conclusion, purpose, challenges in your code, future improvements to your code, and conclusions. Include screenshots showing your program working through each phase. Discuss the evolution of your program through each phase.

Security Awareness Training

 

Scenario

You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University’s information security program. The CISO is working to address the university’s GLBA data safeguarding requirements that you previously provided to the Premier University president.The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.You recently notified the university’s president that information security awareness and training is a gap in the institution’s written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.

Tasks

Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.For this part of the project:

  • Read the Department of Education Office of Federal Student Aid at https://ifap.ed.gov/dear-colleague-letters/07-01-2016-gen-16-12-subject-protecting-student-information.
  • Research the need for security awareness training for faculty and staff at public universities, such as the latest EDUCAUSE Information Security Almanac
  • Write a persuasive, professional memo that addresses the need for security awareness training.
  • In the memo, include any sources you consulted.

Applications in Information Security

  

You are the Information Security Manager for Titan Industries, a Florida based company that provides Information Technology services to several clients all over the world. Your upper management has approached you with concerns that your computer system is vulnerable to an inside or outside attack. You have been tasked to identify ways that the computer systems within your company can be protected from both inside and outside attacks, identify risk mitigations strategies, and to write a white paper for your upper management.

First, you must do an Internet search and identify a computer configuration that you wish to use as the baseline for the computer system at Titan Industries. Second, identify the strengths and weaknesses of this computer system. Third, identify ways that the computer system can be protected from inside and outside attacks. Finally, discuss risk mitigation strategies that would minimize the effects of a successful attack.

Your paper should have the following format:

· Cover Page containing the following information:

o The Title of the paper

o Your Name

o Your Title with the company (e.g. Security Manager or IT Manager)

o The Date

o The Titan Industries Logo (you may create one or modify one you find online)

· Table of Contents

· Introduction – discusses the problem and why you are writing this white paper

· System Description

· System Strengths and Weaknesses

· System Protection Options

· Risk Mitigation Strategies

· Conclusions

· References

Your paper should be in Microsoft Word format, one inch margins, Times New Roman font, size 12, and be double spaced. Your papers should be between 10 to 12 pages in length, not counting the Cover Page. You will be graded on the content, structure, conformity to the guidelines discussed above, and the overall appearance of your white paper. 

Signature Assignment – Security Threat Awareness Infographic & Presentation

  

Imagine you are the Information Systems Security Officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Create a 1-page infographic or job aid of the cyber domain using the DoD or OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation.

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training in your presentation.

Select 3 threats from your infographic or job aid.

Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines. 

Research paper

1) Analytical research paper – Collaboration and Learning in human computer interaction

Prepare a ten (10) page research paper. In the paper, cover the following: 

· Cover Page 

· Abstract 

· Introduction 

· Key Definitions

· Review of Literature Findings

· Future Research Recommendations

· Conclusion

· Bibliography 

The paper should aim to comprehend the topic relative to interaction design, usability, and user experience. Confine the research scope to a specific business domain.

2)   Annotated Bibliography – Collaboration and Learning in human computer interaction

20 references are to be scholarly papers. 

Cited APA citation and a description of the article that is 100-125 words

HW

 

Initial Post

Your initial post should read approximately 250 to 350 words in length and include at least one citation from the bibliography of your textbook chapter, with the accompanying reference in APA format. To receive the maximum points, your post should include a reference from the textbook, an article of your choosing, and one of this week’s ancillary readings.

Prompt

Based on your readings, why is it important to refer to a sports psychologist, and what is the value of having a multidisciplinary team of health professionals?

Parameters

  • Retrieve one article/citation from the chapter bibliography that was referenced to make this point 
  • Apply what you learned from reading this additional article
  • Address how reading this additional article built upon this major point from the text
  • Discuss contradictory information from the article to the text’s main point
  • Follow APA guidelines

 

Compliance Audit

  

It is essential as a cybersecurity professional to have a complete understanding of how a compliance audit is conducted and documented because organizational sustainability often depends on the adequate assessment of information security and privacy management.Using the GCU Virtualization Environment, build either a Windows or Linux server. Then, search the web for technical controls related to HIPAA.Break the technical controls down into technical requirements appropriate for your virtual server with Pass/Fail criteria.Audit the virtual server and report if compliant or not.Once compliance testing has been completed, draft a certification letter for your client or organization highlighting the applicable controls tested along with the compliance model used. 

Refer to the “HIPAA Security Audit Certification Document,” located within the Required Readings, as an example.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-630 Compliance Audit Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

MS ACCESS file

 Part A: Develop an entity-relationship diagram (ERD) and its corresponding database (Microsoft Access) to be used by a product manufacturer to manage the orders it receives from its customers. Part A will be submitted as an MS WORD document. Make sure the ERD diagram shows the relation between entities clearly. Use the attached document to develop ERD for your database.

  • Each customer is identified uniquely by a customer id; include the first name, last name, and address for each customer. 
  • The company has several products that it stocks and for which customers place orders.
  • Each product has a unique id, unique name, unit price, and quantity on hand. At any time, a customer may place an order which will involve possibly many products.
  • For each product ordered the database must know the quantity ordered and the unit price at that point in time. If the customer does this through a phone call then an employee is involved in the call and will be responsible for the order from the company side.
  • Some orders are placed via the Internet. For each order, an order number is generated. For each order, the database must keep track of the order number, the date the order was placed, and the date by which the customer needs to receive the goods.

Part B: Consider the Orders database. This database has several one-to-many relationships.Part B will be submitted as an MS ACCESS file. Make sure one-to-many relationship runs between entities according to the ERD diagram in Part A Create appropriate forms to list:

  • A customer and the customer’s orders
  • Order and its detail lines
  • A product and the order detail lines where the product is referenced
  • A category and the products belonging to the category.

Use the information provided in the  Relational Databases and Microsoft Access Relational Databases and Microsoft Access – Alternative Formats document. Pages 118 and 185.Also, watch the video at the following link https://www.youtube.com/watch?v=57jBdK3YVJo 

You may assign the value o to the elements

You may assign the value o to the elements in your array to initialize the elements — whether you are creating the array or appending to the array. 0 will indicate an “empty” element. • Recall, in pre-allocation, we allocate more space in memory than what is requested by the user. rows and cols are the number of rows and columns the user has requested for in their 2D matrix. For example, if rows is 10 and cols is 10, and the user appends a value such that the number of rows increase by one, then you increase rows to 11. o reserved_rows and reserved_cols are the number of rows and columns that are reserved for the user i.e. this is the capacity of your 2D array. For example, currently, the rows and reserved_rows are 10 and cols and reserved_cols are 10. If the user appends a value such that the number of rows should increase, then you increase rows to 11 and double the size of reserved_rows to 20 along with the number of rows allocated in memory for your 2D array. Review preallocation for more details. These functions would work around the following user defined data structures (see toimgr.h): /* Structure type that encapsulates our image: 2D array. * the rows represent the indices of the main array, * the cols represent the indices of the arrays pointed to by the pointers * in the elements of the main array. */ typedef struct { uint8_t** pixels; unsigned int rows; unsigned int cols; unsigned int reserved_rows; unsigned int reserved_cols; } imgr_t; /* A type for returning status codes */ typedef enum { IMGR_OK, IMGR_BADCOL, IMGR_BADROW, IMGR_BADALLOC, IMGR EMPTY } imgr_result_t; HINTS • Don’t forget to keep adding appropriate function calls to your test driver as you go along. reserved_rows should always represent the amount of memory allocated to all the row arrays in imgr_t. This means that if you doubled the length of one row, you need to do the same for all other rows. reserved_cols should always represent the amount of memory allocated to the main col array. This means that if you double your original array, you also need to double the amount of rows you have in imgr_t. TESTING: you can test your program by running: $ make to # OR gcc -Werror -Wfatal-errors -g -o to to.c toimgr.c (see Makefile) $ ./to (see? Makefiles saves your gcc command so you don’t have to type this long thing over and over again, convenient huh :D) The following is a breakdown of the tasks. REMINDER: • write comments!! Test and debug your code! Prompt the user for what they should enter by printing messages with printf , e.g. “Enter an integer: “, and let the user know what the output is by printing a message, e.g. “Here is the result: Task 01.1 REQUIREMENT: write a function in toimgr.c with the following declaration: imgr_t* imgr_create(unsigned int rows, unsigned int cols); • INPUT: the number of rows and cols of the desired array. • OUTPUT: ingr_create() returns the POINTER to a new instance of data structure imgr_t. • BEHAVIOUR: if malloc() fails (i.e. returns NULL ), imgr_create() returns NULL . o The reserved_rows and reserved_cols should be initialized to be the same as rows and cols respectively. These fields represent the capacity or the available space in your 2D array. In the front end, the user should not have to deal with this. You use them in your functions to perform preallocation. Task 01.2 REQUIREMENT: write a function in toimgr.c with the following declaration: void imgr_destroy(imgr_t* im); • INPUT: the pointer of a imgr_t variable im. • BEHAVIOUR: ingr_destroy() should free() the memory allocated to im.