5s week 2 assignment BS

in 300 words

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Include references, do not copy paste.

Essential Concepts Project

 

The purpose of this hands-on project is to give students an opportunity to create a hierarchical folder structure (CLO 1, MLO 1.1) and explain key terms and concepts related to information systems (CLO 7, MLO 1.3). To do this, use the weekly readings, along with the video tutorial, to complete the Essential Concepts Project.

Part 1. Read the following modules in the Technology for Success textbook:

  • Module 3: Computer Hardware (pages CC 3-1 to CC 3-28)
  • Module 4: Operating Systems and File Management (pages CC 4-1 to CC 4-21)
  • Module 5: Software and Apps (pages CC 5-1 to CC 5-33)

Next, create a new Microsoft Word document (.docx). In 2-3 pages, answer the following questions:

  1. What does it mean to live in a “modern information society?”
  2. What types of input and output devices would be ideal for a college student completing his or her coursework?
  3. What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?
  4. Leah Jacobs is starting her own dance studio and wants to create digital media and use productivity software to support her business. She is hiring a graphic artist to create a logo for her business. She wants to use the logo across all visual communications at the company, from business cards to database forms, to websites and social media. What programs and apps should she consider using to run her business?

Part 2. Create a class folder so that you can save files in the proper folders. As an organization scheme, do the following:

  1. Create the folders you need onto the location of your choice. This may be your Documents folder, a flash drive, or the desktop if you are working on a CBU machine. Begin by creating a folder called LastnameFirstname. Inside of the LastnameFirstname folder, create a folder called CIS 265. Inside the CIS 265 folder, create the following folders: Office and Operating System, Word, PowerPoint, Excel, Access, and Outlook, Integrated Capstone Project.

  2. Expand the hierarchical tree so that all the folders are visible (via Windows Explorer).

  3. Press the Prnt Scrn button on your keyboard. This will take a snapshot of the screen and put it in the computer’s clipboard (temporary memory).

  4. Open the document you’ve already created for this Essential Concepts assignment. Press the Paste button or press Ctrl and V. This should paste a picture of the screen onto the last page of the document.
  5. The finished product should consist of a copy of the screenshot showing that you have created the folders.


(IMPORTANT: You should use these folders to save all your work throughout this course.)

Part 3. Attach and submit your completed project (which should be a single Word document with word processing and/or screen shots (in Full Screen Reading view) of all assignment components, labeled and in order) by the assigned due date.

Essential Concepts Project Scoring

Assignment ComponentsPossible
Points

Part 1  

  • Questions 1-4 answered correctly

15 x 4 = 60

Part 2  

  • Includes a LastnameFirstname folder
  • Includes the CIS265 sub-folder
  • Includes all seven (7) application sub-folders
  • Displays all folders in the correct hierarchy

 Below is an outline of what each page of your Essential Concepts Project should look like:

Page 1Essential Concepts ProjectFirst and Last NameCourse TitleCalifornia Baptist University_____________________________________________________

Pages 2-4I n 2-3 pages, answer the questions above._____________________________________________________________

Pages 5-6
Insert or paste screen shots of your class hierarchical folder and organizational scheme.

PhD Interview Questions INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY – PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Systems Thinking Project Milestone using microsoft visio

 

  1. Define the following systems-thinking concepts in your own words:
    1. Systems thinking
    2. Collection
    3. Feedback loop
    4. Stock and flow diagram
    5. Causal loop diagram
  2. The following scenario describes the system used for fulfilling an online order at Lost Pines Outfitters, a medium-sized outdoor clothing store. Read this scenario and create a basic map of the system using Microsoft Visio.

  3. Once you have mapped this system, you will map relationships contained within the system. First, identify relationships within your system diagram that represent feedback loops, and represent those loops within your model. Then, identify a relationship within the system that could be modeled with a stock and flow or causal loop diagram, and model that diagram in Visio. 

4.Compose a brief, 250- to 500-word summary of the given system, as well as the relationships present in this system. In your summary, describe the system, feedback loops, and other archetypes you identified within the system.

Investigation Considerations

A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project, you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and provide focus for your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes, allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation.

This situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together.

There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify tools and software needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project. Consult the relevant sections of Guidelines for Project 1 Investigation Project Plan in every step.

In Step 1, get started on the plan by creating an interview form to record questions, key words, and authorization information, and to complete the legal forms needed in this case. However, before you can do that, you need to review your training in criminal investigations.

Your tasks in Step 1 are to create interview forms to record questions, key words, and authorization information, and to designate other legal forms that will be needed in this case. It is important for you to describe the importance of each form that you create in the body of your final Project Plan assignment and include in-text reference citations for all of your content. The forms that you complete as part of Step 1 will be included in your Investigation Project Plan, the final assignment for this project.

As part of the investigation into two computers and a thumb drive, it’s important to do the necessary preliminary work. In criminal investigations, there are laws governing chain of custody, search warrants, subpoenas, jurisdiction, and the plain view doctrine. It’s important to be familiar with these topics. Review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation.

The next thing to do is to read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case.

You have received an official request for assistance that provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First, you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated.

It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance. This situation may require you to follow special procedures.

In Step 2, you will consider the types of resources needed for the investigation. 

Step 2: List Required Forensic Equipment, Software, and Labor Expenses

In Step 1, you developed forms and templates to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In this step, you will consider the types of equipment and human resources needed to conduct the investigation and create a budget table that includes expenses for software licenses, computers, storage devices, number of digital forensics examiners, digital forensics examiners’ labor hours, examiner hourly pay rate, including time spent for each phase of the investigation process in gathering evidence analysis, reporting, presentation preparation and court appearance(s).

It is important to total overall costs of all equipment and expenses in your budget table. By making these preparations, you are establishing forensic readiness. Required resources can include people; tools and technologies such as RAID storagedeployment kits, or imaging programs; and budget and timeline information.

Develop a checklist. It will be included in the final Investigation Project Plan.

In the next step, you will begin to prepare a plan for managing a digital forensic investigation.

Step 3: Plan Your Investigation

In the prior step, you determined what resources would be necessary for your investigation. In this step, you will develop a plan for managing the investigation. The requirements for writing case reports reflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and personnel requirements is essential.

Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of “wild cards” such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings.

Your project plan should include a properly sequenced narrative timeline and a separately labeled and sequenced Visual Graphic Timeline chart that reflects the time intervals between each phase of the evidence acquisition and investigation processes (e.g., 30 hours gathering evidence spread across five business days, 60 hours of analysis over 10 business days, 90 days for reporting and court preparation, etc.) including detailed time estimates, and contingency plans. Your plan will serve many purposes, including the assignment of a project budget. As you create your plan, be sure to include in your meeting agenda communications and reporting: who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency).

Once you have developed your project management plan, move on to the next step, where you will submit your final assignment.

Step 4: Prepare and Submit Completed Investigation Project Plan

For your final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include:

  1. Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)
  2. Resource checklist for equipment, human resources and labor expenses (Step 2)
  3. Management plan (Step 3)
  4. Search and seizure form(s)
  5. Chain of custody form

The organization and details of your plan is important. Be sure to refer to the Guidelines for Project 1 Investigation Project Plan to meet the minimum standards needed for this project.

All sources of information must be appropriately referenced. Submit your completed Investigation Project Plan to your supervisor (instructor) for evaluation upon completion.

access control discussion

Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected.

Discuss the weaknesses in these systems and how to improve them.

I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Demonstrating the Gap

Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network.

Using Microsoft Visio or another online network diagramming tool, diagram the network that was analyzed in the Topic 1 “Quantify the System” assignment.

Then, create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.

Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.

Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

APA style is not required, but solid academic writing is expected.

Refer to “Demonstrating the Gap Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

ALSO  PLEASE READ INSTRUCTOR ASSIGNMENT TIP

Hi Class, the link below can help you with week 4 assignment. The link is not an endorsement or affiliated in any way to GCU. However, you are welcome to use whatever application or site that will produce the end results for what is being asked.

https://creately.com/

Also, I don’t except to see 50-100 servers on your diagram. However, your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.

This is an assignment that many students forget to label or include what is required. That said, I want everyone to do their best and get the best possible grade.

15_Imoprtance of strategic IT planning

The final portfolio project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited). 

Note: Please refer to the attachments for UC library sources, so use them to prepare the answer

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-6 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately 5-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Important Note: This Answer should be checked for the plagiarism across the internet and University student records, So please prepare the unique answer and don’t copy the answer