valuable in collecting both live memory images and images of various forms of media

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Information Sec System

  

At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that 

1. Users are authenticated with password-based method

a. discuss the method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification– 

a. discuss the potential method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

3. Compare both password and biometric based method in terms of advantages and disadvantages.

Corporate IT Security Audit Compliance

Describe how to establish compliance in a small health care clinic. 

The clinic could have 2 physicians, 5 nurses, and serve a thousand customers annually. Patients and healthcare provides can access patient data online/remotely.

Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Password complexity policy (Cybersecurity)

 For this week’s discussion,explain the purpose of a password complexity policy.  Give an example of a complete one that you may have used or have seen used.  Also, give an example of one that is not complete and where there may be holes that could cause issues.  Give full details of each example.