Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 
Preview the document

Cable/DSL ISP Network

 

Unit 3 Graded Exercise 1 Downloadable InstructionsPreview the document

In this graded exercise you are creating the second step of your ISP network. You will be using portions of your Unit 1 Graded Exercise: Create an ISP Network.   Your network will include Cable modems and DSL DSLAM both connected  through your network to the Tier1 Internet provider.  You will program  your routers for RIP protocol dynamic routing.   You will be using the  following packet tracer files:

Cable_HomeNetwork

DSL_HomeNetwork

Tier1Network_OL

Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_U3_GE1.  Submit the document with  the screenshots using the upload instruction. 

final project objective alignment

   attached – 

Because this project is a demonstration of the skills that you have learned throughout your time here at Herzing University, your project should have addressed each of the program outcomes. Describe, in detail, how your completed project meets each of these specific course outcomes. Each objective should be addressed in one or two complete paragraphs. 

1. Apply industry standards to the implementation and support of network systems and computer devices. 

2. Demonstrate the principles of information technology security. 

3. Express relevant information to technical and nontechnical audiences

4. Design secure network infrastructures for physical and virtual environments

5. Create information technology solutions based on business needs or requirements. 

assignment-10

 Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

Python Coding

 

Discussion Points:

Explore the “for loop” and the “while loop”. 
1. Explain when to use these different types of loops.
2. How do you include a ‘loop’ structure programming in Python?
3. How do you control a loop?

4. Provide sample code to demonstrate loops

please answer the following questions with a total of over 250 words

One word Questions

  

1. Describe the role of a systems analyst.

2. What are some of the different roles for a computer engineer?

3. What are the duties of a computer operator?

4. What does the CIO do?

5. Describe the job of a project manager.

6. Explain the point of having two different career paths in information systems.

7. What are the advantages and disadvantages of centralizing the IT function?

8. What impact has information technology had on the way companies are organized?

9. What are the five types of information-systems users?

10. Why would an organization outsource?

11. What are the steps in the SDLC methodology?

12. What is RAD software development?

13. What makes the lean methodology unique?

14. What are three differences between second-generation and third-generation languages?

15. Why would an organization consider building its own software application if it is cheaper to buy one?

16. What is responsive design?

17. What is the relationship between HTML and CSS in website design?

18. What is the difference between the pilot implementation methodology and the parallel implementation methodology?

19. What is change management?

20. What are the four different implementation methodologies?

Bash Scripting – Three easy tasks

Please find the attachments for three tasks listed. Use bash scripting template attached (.sh file) to complete the three tasks. Please add comments wherever appropriate. 

Ask if you have questions, and need anything. 

Thank you!