create Crisis Management Plan

1.  Introduction – brief background of company and any issues the company has had in the past such as data breaches-

2.  Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)

3.  Risk Analysis – political analysis, environmental analysis (more or less depending upon company)

4.  Crisis Management Plan:

a.  Purpose

b.  Committee for crisis management planning

c.  Crisis types

d.  Structure of the Crisis Management Team

e.  Responsibility and control

f.  Implementation Plan

g.  Crisis Management Protocols

h.  Crisis Management Plan Priorities

5.  Conclusion

6.  You must have a total of 10 unique references.

7..  The paper must be in APA format.

8.  There is a MINIMUM of 15 pages, required, and does not include references or title page.

9.  Limit pictures, diagrams, charts, and graphics to no more than 2 pages in total. 

Computer crime affects

 

Overview:

In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

  1. Identify theft
  2. Hacking systems for data
  3. Cyberstalking / harassment
  4. Internet fraud
  5. Non-access computer crimes
  6. Cyberterrorism

Instructions

For this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment.

week-12-ft

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

 Please download the Assignment 3 Door and Window Lock Assessment  template (MS Word), which is already in APA 7 format, using size 12  Times New Roman font, 1-inch margins, TOC, Headings and Reference page.  If you insert images or tables in your report make sure you label them  appropriately according to APA. Once completed name your file:  YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit  to the appropriate assignment folder. Also review any additional files  attached for more information.   

PLEC Week 4

 

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format.

Hardening the Firewall

 

In this assignment, students will demonstrate methods and techniques of adjudicating systems configured in a manner consistent with general practice.

Research methods for hardening PFSense.

Using the virtualized PFSense system created in Topic 3, harden the PFSense system using Snort.

  1. Start the Snort service.
  2. Update Snort and download the latest community rules.
  3. Ensure that you have configured Snort to detect port scans.

Using the Kali VM from Topic 3, run another port scan.

Using screenshots of the results, explain if Snort detected the port scan.

Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:

  1. Explain what hardening is, what Snort does, and why it is being used in this scenario.
  2. Explain any other methods by which PFSense can be hardened.
  3. Include at least five screenshots.