Assignment

I ned both chapter answers in different doc file. The link to the book is: https://software-engineering-book.com/

Project

Project description

• The aim of the project is to show a mastery/integration of the security concepts and technologies learnt in ISOM340.

• Each person will look for an organization that will allow them to assess their security preparedness, evaluate/audit their enterprise security system, identify outstanding issues and recommend a defense in depth security system that address these issues.

Suggested presentation template system

a) Describe the organization/its environment

b) Describe the major data/systems that they have to protect

c) Describe the top threats that the company is facing?

d) What are the legal issues and regulations that the company must comply with?

e) Describe the current enterprise security systems giving details on how they are using security controls to minimize the risks

f) What are the top major security issues that need to be addressed?

g) With the aid of diagrams, Recommend and describe a defense in depth state of the art system that protects the above assets and addresses the security issues

h) Do a cost-benefit analysis to demonstrate that your recommendation is viable

i) Suggest a phased implementation plan for the new system considering availability issues and identify new personnel required if any.

Research report

Need to present a research reports on 

1.program and programming 

2. Web attacks 

Both reports should be written with a word count of 70-105 words(not more than the count provided) and should provide a URL reference link too . 

Note : NO PLAGIARISM

Tips: Should be in simple own words and no usage of critical words and attached the file to know in detail to write on it.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

Deadline August 29 2022 12:00Pm.Cst

bswa week13 pa

Hello,

i need this paper by 4/21 afternoon 12am.

Strictly No plagiarism please use your own words.

Week 13. Submit – Topic:PHISHING CYBERCRIME.

what i initially gave description to professor :

PHISHING

Phishing is a cyber-crime conducted by fraudsters to obtain sensitive information such as

bank account numbers, passwords or PIN. Their intentions to get such information is for the sole

purpose of scamming the victim. As the criminal masquerades as legit organizations an individual

is affiliated to, they can trick a person into releasing sensitive information. My research is based on

how to detect and distinguish attacks instigated on the email platform. The study aims to identify

the different techniques employed by scammers to obtain personal information from victims. The

formulated hypothesis statement is ‘an email that prompts an individual to verify account

information by inputting both account number and pin combination is phishing’

please write 700 word explaining about above requested topic, double spaced, written in APA format, showing sources and a bibliography.

And

12 slides power point presentation on PHISHING CYBERCRIME.

reference :

 https://www.youtube.com/watch?v=-JcgRyJUfZM

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Assignment

 

Week Five Assignment

Learn About creating good password security.An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry. 

wk-5

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

Prohibit guessable passwords

such as common names, real words, numbers only

require special characters and a mix of caps, lower case and numbers in passwords

Reauthenticate before changing passwords

user must enter old pw before creating new one

Make authenticators unforgeable 

do not allow email or user ID as password

Using WORD, write a brief paper  explaining each of these security recommendations. 

 Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.