Development Status-Security Design and Architecture/ 600 words/ 2 pages/ APA format

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures. 
  • The SANS Institute hosted three “What Works in Security Architecture” Summits. 
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet. 
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book. 
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development. 

802.11x phones with a cellular system

 

The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.

Overview detailing the following:

  1. Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
  2. Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
  3. Changes to existing networking infrastructure.
  4. Implementation of mobile protocols, logical channels, and encryption standards.
  5. Using mobile-unique identifiers and location-based services to track device and data input validation.

Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.

802.11x phones with a cellular system

 

The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.

Overview detailing the following:

  1. Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
  2. Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
  3. Changes to existing networking infrastructure.
  4. Implementation of mobile protocols, logical channels, and encryption standards.
  5. Using mobile-unique identifiers and location-based services to track device and data input validation.

Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.

security architecture 14 D

 As you meeting with a client, What are the top 3 points/topics that qualify as an assessor to perform a professional information security assessment? explain with examples  

Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it. https://www.esecurityplanet.com/malware/malware-types.html#maliciousmobileapp

 Cybercriminals use many different types of malware to attack systems. Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it.   https://www.esecurityplanet.com/malware/malware-types.html#maliciousmobileapp 

Please write a 350 words essay. 

Practical Connection Emerging Threats

 

Assignment: 
Provide a reflection of at least 550 words (or 2 pages) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 550 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Future impact of the internet

 

Week 8 Written Assignment

  • Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.
  • The title page and bibliography do not count towards the word count.
  • Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference
  • After completing the essay, save and upload the document in the Assignments section of the e-classroom.
  • Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that forecasts future impact of the Internet as its role in society continues to evolve. You should point out new issues if you foresee them.

Excel VBA project due in a few hours

 You’re being provided with a 10 year data set of weather data of min max temperatures and rainfall as collected at Raleigh-Durham International Airport by NOAA. – The data set contains the dates of readings in oF, and rainfall in inches – Dates are in generic number format with 1/1/2007 = 39083 – Dates are non-sequential • Construct an Excel solution that evaluates the data set and finds the following. – The average monthly temperatures. – Total monthly rainfall 

Below is the Dataset

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Instruction for the Course Project Assignment for the whole session is highlighted below in BOLD. Please read the instruction carefully.

The Course Project Assignment is an individual project draft proposal that students will develop incrementally to fully become the final paper at the end of the course. Students will add content every week when the Course Project Assignment for the week is due. 

As a security manager or administrator of a fictitious company, write a Security Plan Proposal as a project draft document with the formats in the bullet points below. Please note that the project document is incremental, starting with the first Course Project Assignment for this week (week two) and ends in week eight. The Course Project Assignments (CPA) are aligned with the corresponding  Chapters in your paper (as follows):

  1. Week two CPA is your Chapter One of the paper
  2. Week three CPA is your Chapter Two
  3. Week four CPA is Chapter Three
  4. Week five CPA is Chapter Four 
  5. Week six CPA is Chapter Five
  6. Week seven CPA is Chapter Six
  7. Week eight is for collating and reviewing the paper for thoroughness

The paper format should include the following: 

  • Running Head
  • The first page will contain the title of the Plan Proposal, Name of the Student, Instructor’s Name, Course Name, and Date
  • Add a Table of Contents to outline your Chapters
  • Include in-text citations and references in APA format

Course Assignment for this week (Chapter one of your paper): 

Briefly provide an overview/description of your fictitious company.

Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.

Explore the school library to identify some useful peer-reviewed, scholarly accepted articles for this assignment. Ensure your citations and references adhere to the school recommended APA format.