Security Policy Plan

 

This is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

 

Write a 3–5 page paper in which you:

  • Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
  • Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  • Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  • Determine the security testing methodology you would use to facilitate the assessment of technical controls.
Section 2

Complete the following:

  • Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
    • Tasks, subtasks, resources, and predecessors.
    • An outline of the planning, analysis, design, and implementation phases.
    • The use of cybersecurity in the information systems development life cycle.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

TCP/IP protocol

 You will type a three to five page paper on the TCP/IP Protocol suite, its history and application. You may use the textbook in addition to researching  the internet for additional sources. Please submit your APA-formatted paper in a Word document. Your paper must be double spaced and include a cover page and a reference page for your cited sources. Please note that the reference page and cover page do not count towards your paper’s three to five pages in length. 

Assignment 600 words

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references 600 words .

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

Hardening the Firewall

 

In this assignment, students will demonstrate methods and techniques of adjudicating systems configured in a manner consistent with general practice.

Research methods for hardening PFSense.

Using the virtualized PFSense system created in Topic 3, harden the PFSense system using Snort.

  1. Start the Snort service.
  2. Update Snort and download the latest community rules.
  3. Ensure that you have configured Snort to detect port scans.

Using the Kali VM from Topic 3, run another port scan.

Using screenshots of the results, explain if Snort detected the port scan.

Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:

  1. Explain what hardening is, what Snort does, and why it is being used in this scenario.
  2. Explain any other methods by which PFSense can be hardened.
  3. Include at least five screenshots.

assignment-9

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Honor and Emotional Reactions

Honor and Emotional Reactions
Click here to read the APA ethical principles of psychologists and code of conduct.
Using the Online Library, search the article, “A Bumpy Train Ride: A Field Experiment on Insult, Honor, and Emotional Reactions.”
Pay special attention to the Method section. Summarize the purpose of the study. Think about the specific issues or points they should have covered in the debriefing session. Consider the APA ethical requirements. Write the specific things the investigators would have had to include during the debriefing session if the study had been conducted in the United States. Explain why the investigators would have to include these specific things. Compile your work in a 1- to 2-page Microsoft Word document.
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Name your document SU_PSY2061_W9_A1_LastName_FirstInitial
Submit your document to the Submissions Area by the due date assigned.

PLEC Week 5

 Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.   

MIS 504 Introduction to Information Systems

  

Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. You are expected to prepare a research project (e.g. 400/500 words) about malicious programs (e.g. Shamoon), and the damage being caused to public and private sectors in Saudi Arabia, if any. 

Purpose: The assignment is to promote awareness of various security threats, and to develop a better understanding of how enterprises/business firms improve their security environment via the establishment of a framework for security and control. 

Assignment Guideline:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing. 

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords