ET WK3 – S

 Research Paper – 5 Full pages

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

 Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks.  IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, Security Technology, 535–543. https://doi.org/10.1109/CCST.2003.1297616 

4 discussions due in 24 hours

 4 DISCUSSIONS DUE IN 24 HOURS – 50 WORDS EACH

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 https://youtu.be/WL2YkK5dvkg 

 Research and discuss the advantages and disadvantages of popular browsers available today? 

 

INSTRUCTIONS: 

  • Respond to the following topic in a minimum of 50 words. 

 

Files and Directories

A root directory is the very base of a file system, under which all other directories are sub-directories. The root directory changes for different volumes. In other words, the root directory for the C: volume is different from the root directory of the D: volume because each volume has its own root directory. 

View the below YouTube video which demonstrates working with Windows files and folders.

  https://youtu.be/4-MF7t5KGuQ 

Why should folders be created on a hard drive instead of placing every file in the root directory?

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Protection from Viruses and Other Malware

Click the link below to view the video from TEDTalks  as computer security expert Mikko Hyppönen tells us how we can stop these new viruses from threatening the internet as we know it.  

TedTalk Video: Fighting viruses

It is impossible to ensure a virus or malware never will attack a computer, but you can take steps to protect your computer.

What precautions do you take to prevent viruses and other malware from infecting your computer? 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Would You Connect to an Unsecured Network? 

View the below YouTube video on WiFi (wireless) security.

 https://youtu.be/WZaIfyvERcA 

 What would you do if you found out that someone was using your wireless home network without your permission? How should legal authorities address such abuse? What punishment should violators receive? Should those leaving their networks unsecured receive punishment, too? Why or why not?  

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.

Querries

  

1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).

2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence?  Why or why not? (300 Word)

Wk#7 Discussion and Research paper

  

1. Discussion:

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

2. Research paper:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

2. Introduction

3. Roles and Responsibilities

4. Incident Response

5. Plan Activation

6. Document History

7. Procedures

Your paper should meet the following requirements:

· Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research and make powerpoint

As you can see from this module’s content, technology can be found everywhere including musics and movies. For example, “Kodachrome” by Paul Simon mentioned “kodachrome” and “Nikon camera”. If you are not familiar with this song, you need to search and listen to “Kodachrome” in order to complete this assignment.

1. Research on what kodachrome is/was and the history of it;

2. Research on the history of cameras; 

3. Create a PowerPoint document to include your research results. (25 points)

4. In the Notes section for each slide, provide a description and interpretation of the information you put on that slide:

You need to present your research results within these notes, as well as, discuss how technology can affect people’s way of communication and affect people’s way of sharing information based on your research. For example, what impact of kodachrome had? Why is it not popular now? What impact of cameras (film and digital cameras) have on people’s life? What other technologies have made or are making impact on people’s communication?

The information on your slides should not be an exact mirror of your notes (and vice versa). 

You may want to review Tips for Making Effective PowerPoint Presentations (Links to an external site.)

(25 points)

Incident Response & Challenges

 Discuss in 400 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.