Managing Access Controls

 

Complete a three to four-page report with APA cited references to support your work.

Part 1: For the scenarios that follow, identify the  data that would need to be protected. Recommend how you would implement  one or more of the access controls for the given scenario. Justify your  recommendations.

Scenarios:

  1. A small construction company consisting of 12 computers that have Internet access.
  2. A small advertising company consisting of 12 computers that have Internet access.
  3. All employees communicate using smartphones.
  4. A multinational IT services company consisting of 120,000 computers  that have Internet access and 45,000 servers. All employees communicate  using smartphones and e-mail. Many employees work from home and travel  extensively.
  5. A defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.
  6. A military-support branch consisting of 14,000,000 computers with  Internet access and 250,000 servers. All employees must have security  clearances, and they communicate mainly using BlackBerry devices and  e-mail.

Part 2: Select an access control model that best  prevents unauthorized access for each of the five scenarios. Which types  of logical access controls should be used in each scenario? Justify  your recommendations.

  1. Access control models:
    1. Mandatory access controls
    2. Discretionary access controls
    3. Role-based access controls
    4. Rule-based access controls
    5. Content-dependent access controls
    6. Nondiscretionary access controls

  2. Access Controls

  1. Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
  2. Logical/technical controls: Control access to a computer system or network, such as a username and password combination
  3. Hardware controls: Equipment that checks and validates IDs, such as a  smart-card for or security token for multifactor authentication.
  4. Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
  5. Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Submission ○ For each problem below, submit file(s) electronically to Blackboard according to description.

 Grading Guideline ● Your code should execute. For code with errors executing, points will be deducted. ● Keep code clean, unclean code will get points deducted. Unused lines of code or debugging prints should be removed before submitting. Repeated lines or functionalities should be avoided. You may lose points if code has repeating lines. (for example, you may calculated “prices” already, but later you calculated it again, is considered repeating code) ● Variable Naming: use variable names that make sense, avoid built-in and reserved keywords. 

fake news

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format. 

mid

 

You have been asked by management (manufacturing, healthcare, retail,  financial, and etc. ) to create a demo using a data analytic or BI  tool. It is your responsibility to download and produce outputs using  one of the tools. You will need to focus your results on the data set  you select.  

Ensure to address at least one topic covered in Chapters 1-5 with  the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations

R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Pseudocode and Flowchart Solution

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Company Privacy Policy – Operations Security

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

– 1 Page, 3-4 paragraphs required

– NO Plagiarism 

– References required

Wk 3 – Apply: DDOS

Assignment Content

  1. Imagine you are on a specialized team tasked with exploring network vulnerabilities in your company. The CEO of the company has read about similar companies being subjected to a Distributed Denial of Service (DDOS) and is very concerned. 

    Research the definition of a DDOS attack and how it can be prevented. If it cannot be prevented, describe the steps that may be required to remediate the DDOS attack, along with the potential business impacts caused by a DDOS attack.  

    Prepare a 10- to 12-slide multimedia-rich Microsoft® PowerPoint® boardroom presentation for the CEO. Include the following in your presentation:

    • Title slide
    • Definition of a DDOS attack
    • At least 2 methods (attack vectors) of DDOS attacks to include the threat agents’ (hackers) motivation for conducting a DDOS attack
    • Common prevention tools and/or processes to block a DDOS
    • Common detection tools to detect if a DDOS is occurring or has occurred.
    • Recommended methods for containing or eradicating the DDOS attack
    • Recommend methods for bringing the affected systems back online from a successful DDOS attack
    • Reference slide
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Presentation checklist:

    1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    2. Consistent fonts and font sizes throughout the presentation 
    3. Use colors and background. No black and white presentations.  
    4. Include at least one references that are properly cited 
    5. Follow APA format (fonts, etc). 
    6. Include speaker notes for every slide except title and reference pages. 
    7. Did the use slides to convey ideas and handouts to communicate details?  
    8. Did the slides follow the golden rule of one idea per slide?.  
    9. Did the slide titles convey the key message of each slide? 
    10. Did the visual diagrams to convey the concepts in a simple, clear, and memorable way? 
    11. Can the charts be understood in less than 5 seconds? 
    12. Did the pictures add clarity to the message the slides  
    13. Did the presentation build curiosity in the audience by revealing information in stages?  
    14. Did the presentation repeat the agenda slide as a guidepost to review your points periodically? 
    15. Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?  
    16. Are the slides clearly readable from the last row in the room?  
    17. Consistent fonts and font sizes throughout the presentation?

      In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.

Research paper – Organisation leader and decision making

 This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

Discussion : Describe the current trends in information systems as well as how technology changes impact society and culture

Discussion: This week the focus turns to the future as we talk about trends in information systems.  Describe the current trends in information systems as well as how technology changes impact society and culture.

Note: The first post should be made in 12-15 hours.

Your response should be 250-300 words.  Respond to two postings provided by your classmates by saturday .