Week#3 Discussion

 

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Answer these questions without plagarism

1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? (Hint: Look at the bandwidth and CPU utilization.)

page1image44572064page1image44572448

2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.

3. ExplainhowyoucoulduseoneormoreoftheWindowslog(Application, Security, Setup, System, and Forwarded Events logs) files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file?

4. Shouldyoufilterlogfilesduringaninvestigationintoasecurityincident?Why or why not?

5. Shouldremotedesktopservicesbeenabledonemployeeworkstationsforuse by IT Help Desk personnel? Why or why not?

6. HowdoesMicrosoftBaselineSecurityAnalyzer(MBSA)differfromWindows Update? Why are Shares a source of system vulnerabilities?

dis_dmwk2

 What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability). 

cc-15

 https://www.youtube.com/watch?v=W_O7mziH3vM&ab_channel=DEFCONConference

Review in 500 words or more the video above called Cloud Security Myths.

Data Breach

Before any health information system can be successfully implemented, there must be a team of experts who understand the vision and mission of both the health care organization and its stakeholders. Strategic health care leaders are positioned to propose system upgrades and/or implementations that can withstand inevitable organizational changes. Health information systems’ leaders understand that data is the overall management of the availability, usability, integrity and security of the data. From your weekly readings, choose at least three health information systems’ leaders and/or stakeholders, and define their role in the implementation of health information systems.

All the following items must be addressed in your paper:  The Breached vs Uncompromised Data paper 

  • Compare and contrast the limitations and opportunities in enterprise-wide data. Defend your technology infrastructure’s ability to support organizational leadership and end-user needs.
  • Explain the economic impact of your proposed system acquisition.
  • Predict the impact of quality improvement as it relates to the improvement of electronic health records.

The Breached vs Uncompromised Data paper

  • Must be three double-spaced pages in length (not including title and references pages) 
  •  Must begin with an introductory paragraph that has a succinct thesis statement.
  • Must address the topic of the paper with critical thought.
  • Must end with a conclusion that reaffirms your thesis.
  • Must use at least at least three scholarly or peer-reviewed sources in addition to the course text.
  • APA format 

Infrastucture and Security

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
  • Document (MS Word).
  • Microsoft Visio Plan (MS Visio).
Section 1

Write a 3–4 page deliverable in which you:

  • Explain the major cyber governance issues in an organization, and examine how organizations develop communication protocols because of those issues.
  • Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  • Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2