Although there are many different reasons what a person may decide to commit a computer intrusion, the basic methods and processes used are fairly common. Discuss the common intrusion processes.
Discussion Reply!!! About 75 words
Part 1: Security Threats
- Provide an example of at least one security threat. This can be an actual threat to an organization. It can be an example of a “what-if” scenario. Discuss at least one way that this threat could have been minimized or prevented.
Phishing is one example of a security threat to pretty much anyone. Phishing is where a message, usually an email or text, is sent to you and it may look like a legitimate company/bank reaching out to you. These messages usually include a link, and these links can have malware embedded in them. They may also be asking for personal information. (Borges, 2021)
To minimize/prevent this threat include changing passwords regularly, not clicking on suspicious links, and installing firewalls. (Simister, 2021)
Part 2: Mobile devices
- Compare desktops to laptops, tablets, and smartphones using best practices related to security. Discuss the best practices that you use or plan to implement on your mobile device(s).
Desktops tend to be more secure compared to mobile devices (tablets, smartphones, laptops, etc.) because of their stationary position making them easier to guard, and also because they tend to be on one source of the internet (rather it be Wi-Fi or cable). (Editor, 2019)
The practices I use to protect the security of my mobile devices is to keep software updated, I keep fingerprint/code locks on my phone, and try to avoid any unsecured networks.
References:
Borges, E. (April 07, 2021). Ten Common Network Security Threats Explained. Retrieved on 7/11/22 from 10 Popular Common Network Security Threats Explained (securitytrails.com) (Links to an external site.)
Simister, A. (August 6, 2021) 10 Ways to Prevent Phishing Attacks. Retrieved on 7/11/22 from 10 Ways to Prevent Phishing Attacks (lepide.com) (Links to an external site.)
Editor, (October 16, 2019) Computers for a small business: Laptop vs. desktop. Retrieved on 7/11/22 from Computers for a small business: Laptop vs. desktop (techadvisory.org)
6.2 Literature Review Funnel
This week, we looked at the components of a literature review funnel.
For this assignment you will develop a literature review funnel for your research topic.
See included example.
6/3 Second Paper
Resources:
The following websites provide some guidance on compliance and governance planning:
Example plans:
Remember, these are examples. You are not producing a lengthy plan. Use these resources as guidance in developing your project plan.
Instructions.
- You will complete this paper in the form of a compliance and governance plan for an organization. You may use your own organization (although you must change the name for confidentiality purposes) or use a fictitious company. You may use the internet to look for examples of privacy policies and compliance and governance plans; however, the plan you develop must be in your own words. The plan must cover the issues and concerns that need to be addressed by the plan, including the following:
- Privacy issues of customers
- Protection of intellectual property your organization possesses (assume the company has some copyrighted or patented material [e.g., software] or some product)
- Cyberlaws that will apply to your organization
- The paper should be outlined as follows:
- Executive summary/introduction: Include the issues and concerns to be addressed by the plan. Provide four to five paragraphs introducing the plan, including the rationales for developing a compliance plan and the goals of doing so.
- Sections: Include sections that address each of the concerns noted above. See the bulleted points on topics the plan should cover. Provide a paragraph at the beginning of each section. Include any additional sections you believe necessary to develop a comprehensive plan.
- Conclusion: Provide a four- or five-paragraph conclusion to the plan. A bulleted list of recommendations would help to summarize the plan. Include suggestions for implementing the plan.
- The paper should be about 15 pages in length (double-spaced), and transitions between sections should be addressed.
- Any graphics or tables do not count toward the page count.
Cloud based data warehousing
write 3 pages on Cloud based data warehousing.
urgent now now
This assignment allows students to look at a problem from a managerial perspective, and see how a technical solution supports the business needs of the organization.
You are the IT manager at XYZ Company, and you notice that the business is lacking efficiency. Reports are being completed manually, information is not well transferred throughout the departments, the business is having trouble keeping up with its order volume, and customer satisfaction is faltering as a result.
Outline how your solution would address the common issues of identity management associated with ERP implementation, specifically single authentication, automatic trust, and managing full access rights. Then, using Figure 8.4 from the textbook, construct a formal business case for an ERP system. Analyze the effectiveness and efficiency gained with departmental cooperation. Then, present an effective case to efficiently input, transfer, communicate, and display company data.
This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source.
APA style is not required, but solid academic writing is expected.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.
Benchmark Information
This benchmark assignment assesses the following programmatic competencies:
BS in Cybersecurity
3.1 Analyze leadership skills in terms of diversity, effectiveness, and responsiveness to organizational needs.
3.2 Communicate a vision of leadership, synthesized through critical thinking and conceptual skills, which is intended to motivate and inspire others to achieve organizational goals.
5.5 Manage processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Fig 8.4
Building a Business
CaseIn order to meet demand, the IT organization is often charged with providing solutions. Business managers often turn to IT for good solutions, but IT projects end up competing with those of other managers in tight economic times when there clearly aren’t enough budget resources to cover them all. After all, there is often no shortage of other business investments such as new production machinery for higher product quality and lower costs or funding for product research and development on product innovations. Thus, managers need to show that the solution they want would be not only a good IT investment but also a good business investment. To gain support and a “goahead” decision, every manager must often create a business case. Similar to a legal case, a business case is a structured document that lays out all the relevant information needed to make a go/nogo decision. The business case for an IT project is also a way to establish priorities for investing in different projects, an opportunity to identify how IT and the business can deliver new benets, gain commitment from business managers, and create a basis for monitoring the investment.6 The components of a business case vary from corporation to corporation, depending on the priorities and decision-making environment. However, there are several primary elements of any business case (see Figure8.4). Critical to the business case is the identification of both costs and benets, both in financial and non-financial terms. In building, it is particularly important for the business case to describe the benets to be gained with the acceptance of the project the case is selling. Ward, Daniel, and Peppard7suggested a framework for identifying and describing both financial and non-financial benets (Figure8.5). The first step in this framework is to identify each benefit as innovation (allowing the organization to do new things), improvement (allowing the organization to do……
NOTE- SEE ATTACH THE LAST PART
PowerPoint_2G_Wedding_Services
#PowerPoint_2G_Wedding_Services
#PowerPoint 2G Wedding Services
Project Description:
In the following project, you will format a presentation describing some of the wedding services offered by The Big Event Production and Entertainment.
#On Slide 1, format the subtitle-Floral and Lighting Design-as a WordArt using the first style in the second column. Change the Text Fill to Black, Text 1.
#Select the picture and then Crop the image from the bottom so that the bottom-center crop handle aligns with the lower half of the vertical ruler at 2.5 inches.
Change the picture Height to 3 and then apply a Glow: 5 point; Dark Teal, Accent color 1 picture effect to the image. Align the picture and title using the Align Selected Objects command to apply Align Top.
#On Slide 1, insert a Text Box anywhere in the green content placeholder on the bottom of the slide. In the text box, type The Big Event Production and Entertainment and then using the Align to Slide option, apply the Align Center and Align Bottom alignment commands.
On Slide 2, remove the bullet symbol from the paragraph, and then change the Shape Fill to the second color in the fifth column, and the Shape Outline to Black, Text 1.
#On Slide 3, convert the bulleted list to the List type SmartArt graphic-Vertical Curved List. Change the color to Colorful Range – Accent Colors 4 to 5, and then apply the Simple Fill style.
Note—Mac users, convert to any SmartArt style, and then change to Vertical Curved List.
On Slide 4, change the bulleted list to Numbering.
On Slide 5, in the placeholder on the right, insert an Online Picture by searching for full bloom rose then insert the picture of the large single rose. Select and delete any additional text boxes that may display when the image is inserted. To avoid file size limitations, compress the online picture once it is inserted.
Note—alternatively, search for an image in a web browser, and then download and insert a relevant image from the results.
Remove the background from the picture using the default selected area, and then apply the Glow: 18 point; Brown, Accent color 6 picture effect.
On Slide 5, change the bullet symbols to Star Bullets, change the Color to the first color in the last column, and then change the Size to 80.
On Slide 6, from the Shapes gallery, under Basic Shapes, insert a Diamond of any size anywhere on the slide. Resize the diamond so that its Shape Height is 6 and its Shape Width is 8. Using the Align to Slide option, apply the Align Center, and Align Middle alignment commands to the diamond shape. Apply the Intense Effect – Dark Teal, Accent 1 shape style.
In the diamond, type The Big Event Productions and Entertainment (no period). Change the Font Size to 36, and then, to the diamond shape, apply the Round Convex Bevel effect to the diamond shape. Note—this effect may be called Art Deco on some systems.
Insert a Header & Footer on the Notes and Handouts. Include the Date and time updated automatically, the Page number, a Footer with the text 2G_Wedding_Services
Save and close the file, and then submit for grading.
Core Principles
You have been hired as the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC to overhaul the cyber security program. In addition to local PCS information systems, the CISO is responsible for ensuring the various program managers maintain security compliance for customer systems under PCS security cognizance. PCS holds several government contracts in various regulatory environments making CISO a challenging position.
One of your first actions to improve the security program is to create a working group between the Information Technology, Engineering, and Security departments to foster better communication, address information system security challenges, and to work off action items. During this week’s working group meeting, an informative debate breaks out regarding the three core principles of information security and which one is most important: confidentiality, integrity, or availability. The working group debate stemmed from discussions regarding security protections for PCS’s new contract to overhaul the early warning missile detection system for the Ministry of Defense in Istanbogus.
Rank each of the three security principles in the order of importance for this system. Explain your rationale for each ranking to include any factors, criteria, and assumptions you made in selecting the order of precedence. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss their ranking/rationale.
QUANTITATIVE Journal Article Review
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
create a number of classes that provide information about the personnel
For this task you will create a number of classes that provide information about the personnel in an organisation. You will write a Manager class and a Worker class, each of which will subclass a Person class. A Person will have a name, just a String, and an identity number, which is an integer. As no-one is just a person, the constructor of the Person class will only be used by constructors of derived classes. The name will be provided when an instance of a derived class is created. The identity should be automatically generated during construction and must be unique. No person, either manager or worker, can have the same identity number as another person. You should also ensure that the identity numbers of managers and workers cover separate ranges of integers (e.g. 1 – 99 for managers and 100 – 999 for workers), so that an identity number can be used, in the human organisation but not in your program, to discern whether a person is a manager or a worker.
There is a relationship between managers and workers that needs to be incorporated in the
corresponding classes. Each manager is the leader of a team of workers. In particular, a manager leads
exactly one team and a worker belongs to exactly one team. The system must allow for workers to be
moved from one team to another, managers to be moved from leadership of one team to leadership of
another, as well as for the appointment and retirement of personnel. For the current assignment task a
simplifying assumption will be that we do not need a class to represent a team’s work area. Instead the
manager-worker relationships will be incorporated by each Manager object maintaining a list of
Worker references, representing the team, and each Worker object maintaining a Manager reference,
representing the team leader.
The following state and functionality should be provided for these classes:
- The Person class will maintain name and identity fields, as described above, and the derived
Manager and Worker classes will add the fields necessary to implement their
interrelationships.
- Appropriate constructors will allow the name and identity fields of Manager and Worker
objects to be initialised properly. Note that, although the identity field will be inherited,
its initialisation depends on the particular derived class. Full initialisation of the fields
implementing manager-worker interrelationships would not be done at this stage, but they
must be in an appropriate state for testing.
- Getters for fields will be provided in appropriate classes.
- Appropriate toString methods will be provided as required to simplify the display of object
state. Where an object’s state contains a reference to a person, include that person’s identity
number in the string.
- For setting up, changing, or nullifying the field values implementing manager-worker
interrelationships you need to make changes in the state of both a Manager object and a
Worker object. There are different ways to do this. For example, for moving a worker
between teams, one way is to provide the Worker class with a movetoTeamOf instance
method that accepts a Manager reference. The code of this method could first make some
checks (e.g. are either of the current and new Manager references null or are they the same?)
before removing the current worker from the team of the current manager, changing the
worker’s manager and then moving the worker to the new manager’s team. Note that this
would access instance methods of Manager for removing a worker from a team and for
adding a worker to a team. A similar approach applies for setting up a new worker and for
removing a worker from the system; the changes must be done so as to ensure the
information system remains in a stable state, which cannot be left as a responsibility of client
code.
- Changing team managers is another operation on manager-worker interrelationships that
needs to be done, and with care. It might be implemented via a switchTeams instance method
of the Manager class that accepts the reference of another manager, but you need to make
sure that this switches all the Manager references held by the respective teams. You also
need to implement functionality for removing a manager from the system, which will only
occur if a newly created manager is available as a replacement, and adding an additional
manager, whose team could then be populated by client code applying some combination of
creating new workers and moving workers using functionality described above.
Write a TestPersonnel class to test the functionality of the classes you have developed. It will be done
without user interaction and will provide the following sequence of actions, using good design techniques such as in the appropriate use of methods:
- Create a single list for the people in the organisation, which is a list containing Person
references for managers and workers.
- Provide code to create some managers (3 will do) and some workers (12 will do) and add
them to the list. Assign the workers in turn to the different managers.
- Display the state of all the people in the organisation.
- Add 3 new workers to the organisation, assigning them in turn to the different managers.
- Display the state of all the people in the organisation.
- Remove from the organisation the first 2 workers in the list of people.
- Display the state of all the people in the organisation.
- Add a new manager to the organisation, reassigning the first worker in the list of people to
this new manager.
- Display the state of all the people in the organisation.
