Management of Information Security Project

Project Description

Carry out a security self-assessment of an organization of your current or previous employer or your own organization. You must seek permission from the individual responsible for the information security of that organization. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.

Report

Write a report based on the self-assessment of an organization. It should be 5-7 pages long, 12 point character size, double line spacing, and have 1” margins on all sides. It is recommended that you do not use the actual name of the organization in the report; use a title, such as “ABC, Inc.” Your report should include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of an action plan.

Deliverables: A single Word document

Project Guidelines:

For the project, you can do a security assessment on either a single IT system or the entire IT infrastructure of an organization, whichever you think is feasible and manageable.

You can use these guidelines when working on your project:

1) Your project report just needs to be a very general assessment of the IT system in organization. You can keep it brief (about 4 to 8 pages long, not including the cover page), and broadly cover the following areas:

 Management Controls

 Operational Controls

 Technical Controls.

You don’t need to get into specifics on anything that might be considered sensitive or proprietary. Keep it very general (something that can be in the public-domain).

2) For your project, **only** use information that is considered public. Please **do not** use or reference any proprietary or non-public information. As the project guidelines state, do not use the actual name of any organization – instead use “ABC Inc.” And in your project please don’t reference any documents that are not considered to be in the public domain; also don’t use any company names – use something generic such as XYZ Inc.

3) Instead of doing a self-assessment of a real company, you can also do a self-assessment of a fictitious company similar to a real entity. For example, you could imagine that you are performing an assessment of a fictitious entity such as the following:

 A college bookstore that accepts online textbook purchases, or

 A pharmacy store that maintains a database of customer prescriptions

 An auto-insurance agency that maintains customer data

 … etc. … etc.

You can imagine yourself being hired as an Info Security consultant to perform a security audit of the fictitious company’s IT infrastructure. Assume that some rudimentary security measures are currently in place, but there is much room for improvement. In your report describe your assessment of the security measures currently in place and recommend any needed improvements to ensure better IT security in the organization.

On The Spot Courier Services

Here are tips for creating an excellent project:

1. Please do not have the questions from the assignment in the document. The questions are simply the requirements for the report that you are writing. The headings and narrative you add to the document will be enough to explain the section and why it’s in the document.
2. Please add narratives to your sections, subsections, figure explanations, etc. For example, don’t just list actors. You need to explain to the reader what this section is about,  why these actors were chosen, and perhaps a brief description of the actors.  For example, your section may start off like this “This section/subsection is a result of our use-case analysis where we have identified the users (actors) for the proposed system…” (You use own wording and style of course).

Case Study: On the Spot  Courier Services

1. Using information from chapter 8 and previous information from the running case study paragraphs over the previous chapters, list at least five domain model classes that form the core functionality of the system.

2. List at least five tables corresponding to the domain model classes above. Include the following information for each of the tables: primary key, foreign keys to other tables, and other attributes that you think is needed to characterize the class. Also include whether or not the table is in third normal form or not – and why.

3. Develop a multilayer sequence diagram for the use case you fully developed in the milestone 1 project that includes the domain classes and data access layers. This should be similar to the example shown in Figure 13-18, 13-19, and 13-20.

4. Develop a package diagram that includes all the problem domain classes and organized around the major subsystems. Use Figures 13-25 as an examples of the diagram that is organized around the View, Domain, and Data Access layers.

5. In designing a deployment architecture for the system, what are at least five design considerations you would take to implement a scalable, highly available, and secure run time environment?

Data Analysis and Data Visualization

 “A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

Please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). 

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. 

Provide a brief description of your choices and explain why you made your choices. 

Also, describe what advantage do your choices have over the others.  

Write it in a 500+ words (Just the content not including Title page/References) Needed in APA format document.

Instructions:

 Breakdown the topic using sub-headings when writing a paper.
Include in-text citations and references.APA format is expected. Please visit  http://ucumberlands.libguides.com/citations/apa  for APA guidelines.
When quoting a source, use the quote exactly the way it appears within quotation marks.
Make sure that you do not copy verbatim more than two words in a row from the text you have found in a resource. If you do use more than two words together, you will have to use quotation marks.
Review the rubrics before submission. 

Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

Data Analytics Lab Work – In Full APA format

Hi, 

Please solve below mentioned 2 problems and answer all the questions asked in each. Use the attached excel files to solve each question.

1. Question 38 – Use P02_35.xlsx

2. Question 40 – Use P02_30.xlsx

Note: Below attached are 2 questions and required 2 excel files to be used in solving those questions.

Writing Requirements:

– Provide the excel file with calculations performed

– Provide detailed explanation to each question in a word document with screenshot

– Full APA Format

– NO PLAGIARISM

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Research Paper

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.