Graduate Research & Critical Analysis jan 19

Assignment Content

  1. STOP: (1) Have you watched the HW video on APA 7 Basics and Cover Page? (2) IF you were absent, have you watched the class recording? Do not continue to the assignment until these things are complete

    ASSIGNMENT
    Step 1, Brainstorm: Think about your field of study as a master’s student. Use one of the two methods taught in class and find two news articles that report on relevant problems related to the industry associated with your master’s degree program (think about scandals within the last 5 years). Come up with two examples using the format below in a simple Word document, using APA 7 Basics and an APA 7 cover page learned through the HW video (see p. 20 in Foundations for a sample cover page)

    Step 2, Create your Word Document and Answer Questions (it should look similar to p. 5 in Foundations):

    FOR EXAMPLE: If my major is public health or even education, I would come up with something like Issue/Problem 1 below (MPH students, you cannot use this as your own). We have started one together in class, so you must complete what you started in class and find a second research problem proposal:

    Issue/Problem 1: Depression and anxiety among young adults 
    1) People Involved: College students, parents
    2) Link to Article: https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression
    3) My Research Question: What have researchers learned about the impact of COVID 19 on depression and anxiety among young adult students?

    I would then fill out my second Problem proposal below: 

    Issue/Problem 2:
    1) People Involved: 
    2) Link to Article: 
    3) My Research Question: What have researchers learned about

    Grading:
    Cover/Title Page = 40 pts
    Issue/Problem 1 = 30 pts
    Issue/Problem 2 = 30 pts

Computer Processes

 Communicating computer issues with others requires a level of proficiency with images and words. In this assignment, you will need to access your computer’s process management utility and select a running process to evaluate (do not select a running application). Provide a screenshot in your initial post showing your computer’s Task Manager (or Activity Monitor) and the running process you are evaluating. Research online what that process is, what it does, and why it is (or isn’t) necessary to make your computer work the way you need (or want). Based on your research and your needs, conclude whether to manage that process by keeping it running or stopping it. Describe how you would stop it and keep it stopped for your operating system.  

ERM Road Map

Overview

The following material may be useful for the completion of this assignment. You may refer to the documents Embracing Enterprise Risk Management: Practical Approaches for Getting Started and Developing Key Risk Indicators to Strengthen Enterprise Risk Management at the Committee of Sponsoring Organizations of the Treadway Commissionwebsite.Imagine you are an information technology manager employed by a business that needs you to develop a plan for an effective enterprise risk management (ERM) program. ERM has not been a priority for the organization, but failed corporate security audits, data breaches, and recent news stories have convinced the board of directors that they must address these weaknesses. As a result, the CEO has asked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program to address this area.

Instructions

Write a 3–4 page paper in which you:

  1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
  2. Recommend the approach management should take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
  3. Analyze the methods for establishing key risk indicators (KRIs).
  4. Suggest the approach that the organization should take to link the KRIs with the organization’s strategic initiatives.
  5. Use at least three quality resources in this assignment (in addition to—and which support—the documents from the COSO website referenced in this assignment). Note:Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Propose a risk management program based on the COSO framework.

oldm wk dis

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 3):  

Consider the ER diagram shown in Figure 3.22 for part of a BANK database (also below for reference). Each bank can have multiple branches, and each branch can have multiple accounts and loans.

(a) List the strong (nonweak) entity types in the ER diagram.

(b) Is there a weak entity type? If so, give its name, its partial key, and its identifying relationship.

(c) What constraints do the partial key and the identifying relationship of the weak entity type specify in this diagram?

(d) List the names of all relationship types, and specify the (min,max) constraint on each participation of an entity type in a relationship type. Justify your choices.

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Culminating Assignment Concept Paper: Red Team Assessment Strategies in Cybersecurity

 

Culminating Assignment

Concept Paper:   Red Team Assessment Strategies in Cybersecurity

Directions:

1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  

2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:

Parameters:  

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body:  
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  

Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.

The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.

After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.

Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.

Resources to help you complete this assignment:

Rubric:

Points: 

Assignment: Red Team Assessment Strategies in Cybersecurity

Criteria

Needs Improvement

Below 60-70 F

Fair

70-79 C

Proficient

80-89 B

Exemplary

90-100 A

1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.

Weight: 25%

Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.

Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.

Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.

Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.

2. Describe the approach to red team assessment.

Weight: 30%

Did not submit or incompletely described the approach to red team assessment.

Partially described the approach to red team assessment.

Satisfactorily described the approach to red team assessment.

Thoroughly described the approach to red team assessment.

3. Discuss how different types of organizations are utilizing red teaming.

Weight: 30%

Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.

Partially discussed how different types of organizations are utilizing red teaming.

Satisfactorily discussed how different types of organizations are utilizing red teaming.

Thoroughly discussed how different types of organizations are utilizing red teaming.

5. 3 References

Weight: 5%

No references were provided.

Does not meet the required number of references; some or all references poor quality choices.

Meets the number of required references; all references high-quality choices.

Exceeds the number of required references; all references high-quality choices.

6. Clarity, writing mechanics,  formatting.

Weight: 10%

More than 6 errors present

replays to discussion post

 

In each response, ask questions and share ideas. Responses should again be detailed, thoughtful & substantial.  Justify your responses.

Responses has to me a minimum of 5 sentences and 1 question each response. 

The 2 posts to replay are in the attachment. Each post needs 1 response.