Week 4 Assignment – Defense in Depth

 

Week 4 Assignment – Defense in Depth

Introduction

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in  layers, which, in many cases, requires a network that is designed  accordingly. The specific course learning outcome associated with this assignment is: 

  • Recommend best security practices to achieve business objectives based on risk assumptions.

Instructions

Design a network that incorporates the following: 

  • One corporate site (Chicago).     
    • All servers exist here (web server, file server, print server, mail server, FTP server).
    • Connection to the Internet (50 MBps).
    • 300 employees who only need access to local corporate resources and the Internet.
  • One remote site (8 miles away).     
    • 20 employees who need access to all resources at corporate, plus the Internet.
    • Connection to the Internet (3 MBps).
Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to: 

  • Create a network diagram with defense in depth in mind, citing  specific, credible sources that support the design and depicting at  least four-fifths of the following:     
    • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
    • The interconnections between network devices.
    • Connections to end-user (client) devices (desktops, laptops).
    • Connections from the Internet cloud to the network input.
Part 2

Write a 6–10 page paper in which you: 

  • Describe the flow of data through the network, citing specific, credible sources.     
    • Assume data begins at the remote site.
    • Data flow may be monitored by an IDS.
  • Explain all three elements of the CIA triad and how isolating by  network functions helps deliver a layered approach, citing specific,  credible sources that support your assertions and conclusions.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.

Thayane Disscuasion Response

I have always found Microsoft Word to be a very useful program, and I have learned a lot of new things about it this week. One of my favorite features is the ability to customize documents in a variety of ways. For example, I can change the font, color, and size of text, as well as add bullet lists, footers, and headers. I find this really helpful when I am creating documents for school or work. I can make them look professional and organized, which is important to me.

I also appreciate the variety of keyboard shortcuts that are available in Word. I am a big fan of shortcuts in general, as they help me to work more efficiently. Some of the shortcuts that I have found to be most useful are (Gookin, 2016, Word 2016 keyboard command roundup)

“Ctrl + O” (open a doc)

“Ctrl + N” (create a doc)

 “Ctrl + S” (save)

 “Ctrl + P” (print)

“Ctrl + Z” (undo)

“Ctrl + Y” (re-do)

“Ctrl + X” (cut)

“Ctrl + V” (paste)

In addition, I really like how Microsoft Word has a lot of features that can help make my document look more professional. I like the fact that I can customize the document to my liking. This feature is found in the review folder with the markups (Lene, 2020). This allows me to see all of the changes that have been made to the document and makes it easy to track the changes. I also think the ability to remove markups is important because it allows me to keep track of the changes without having to keep track of the markups themselves.

Overall, I find these features to be very important because they make it easy to format and edit documents. The review folder is especially useful for tracking changes and making sure that all edits are made correctly (Lene, 2020). The ability to easily add headers and footers is also very useful for ensuring that all documents are properly formatted and easy to read.

Reference

Gookin, D. (n.d.). Word 2016 For Dummies Cheat Sheet. Retrieved April 20, 2019, from http://www.dummies.com/software/microsoft-office/word/word-2016-for-dummies-cheat-sheet/ (Links to an external site.) (Links to an external site.)

Lene Fredborg, D. (2020). How to add, remove, and change comments in Word

3/4 Paper Outline and Reference List Phase 2

  • Identify a set of technology issues or concerns associated with a real-world information technology infrastructure.
  • Explore potential solutions to varying types of real-life technology issues in the business environment.
  • Design a solution that will resolve an identified technology issue.
  • Demonstrate the ability to use appropriate communication strategies to convey a solution to a real-life technology issue.

Instructions: 

  1. This is Phase 2 of your final capstone project.
  2. Refer to the Capstone Project Guide as needed.
  3. Prepare an outline of your project paper. Base the outline on the Capstone Project Template. You may use the template and embed the outline into each template section. You must include an outline bullet for each major and minor idea in each section (the bullets would be taken out in the final paper).
  4. The assignment submission should also include all the references you intend to use in the paper. Place your references in the template under the reference section. No annotations should be included at this stage of the outline. Your references must be in compliance with APA 7th edition. A total of 10 or more references should be used in the paper.
    1. For questions on APA style, go to the OCLS APA Style Page.
  5. Note: At this point, you are halfway through the course. Although this assignment is an outline of the paper, you should have begun to develop sections of the paper. It is not required that you include details of sections, but you may do so.

Please find attached Phase 1 of the paper

IOT & Challenges

Need this in a word document with no less than 1000 words in APA format with 3 references & Citations  

A) Securing IoT Devices: What are the Challenges?

B) Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

discussion V1

 

Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.

Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.

Read these brief articles from the UMGC library to learn about the ransomware incidents:

Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).

Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).

If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.

Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.

  • What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?
  • Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.
  • If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?
  • If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?
  • Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?
  • Would you have a different decision if you were working for a small organization like Mercury USA?

Advance programming Languages ppt

Submit your presentation here it has to be 10-15 slides on any of the following advanced programming languages topics. This will be worth 100 points!

PowerPoint Presentation

Object-oriented programming

Control structures

Formal Syntax and semantics

Logic programming

Concurrent programming

Enumerated data types

Python programming

Java Programming

C#

C++

Go 

Swift

Artificial Intelligence Writing Assignment

Discuss game theory and how artificial intelligence is used in video games.  Provide examples and visual representations.  

 

Requirement 

APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject. 

Pages : 3 ( 1000 words)

fundemental of data systems

 

The Harvard Business School Publishing Coursepack is required for this discussion. You can purchase it on this link: Harvard Business course pack.

In recent years, many firms use algorithms to help make management group’s decisions and optimize operation processes and supply chains. When such algorithms produce unexpected outcomes, bias concerns may arise. Thus, removing these kinds of bias from the data is so critical in data-driven business. Based on this case anlaysis, please elaborate on the questions below.

Q1) Please address the concept of ‘algorithmic bias’ in a marketing context. What is the reason behind the bias in this case?

Q2) How might a firm acquire capability to analyze situations and detect whether algorithmic bias occurs and how it can be mitigated?

Q3) Algorithmic bias can occur even when demographic data is not used as a variable by the algorithm.  What would you play a role as an information sysem manager if a bias was brough to your attention?