final grad project : Information Assurance

Information Security & Assurance: how the evolution of Internet of things(IoT) is effecting it? Securing today’s information systems?

NOTE: Recommended 4-5 pages, including a cover page and reference page, at least three references and in APA format.  No plagiarism must be there and no late submissions.

Execute Summary

The proposal will consist of the executive summary, communication plan, proposal introduction, policies and procedures, proposed solutions to the security vulnerabilities, and plans to continuously monitor the organization for malicious behaviors. 

I have the communication plan and policies and procedures. I just need a two page executive summary

Network

 

Based on the knowledge you have achieved thus far in this class, compose a brief synopsis compiling what you have learned about today’s networks. Describe how you would create a better network at your home or office utilizing the knowledge you’ve gained with this class. An example of this knowledge would be the cabling selected, as well as the IP address scheme utilized.

Parameters/Expectations:

  • At least 4 paragraphs in length not counting the title page, include a title page, double space, font size 10 or 12
  • Includes a highly developed viewpoint, purpose and exceptional content
  • Demonstrates superior organization, is well ordered, logical and unified
  • Free of grammar and spelling errors 5. No evidence of plagiarism

CS

Q1  Network Access Control. (600 – 800 WORDS)

     1 a.  Explain how it is relevant to network security.  Be as clear as you can in explaining your topic by using examples, software, hardware, etc. ( 200 words).

Physical security 6

 Subject name: Physical Security

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

REQUIREMENTS:

Provide a 2 page double spaced minimum reflection (i.e. no less than 2 full pages of content). This does not include the required APA Cover Page and reference page.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Network Troubleshooting

 

Discussion Topic

There are common home network problems that you need to explore in your discussion response. Several common issues are:

  • Your home network cannot reach certain areas of your home.
  • Devices cannot see each other on the network.
  • Devices cannot get on the Internet.
  • Devices cannot join the network.
  • Your home network is slow.
  • Your home network connections drop occasionally.
  • Your home network is not secure.

In your original post, pick a common issue above, and answer the following questions:

  • Choose a networking troubleshooting  approach; there are several in the text. Feel free to cover another that  is not listed in the text, as long as it is a suitable network  troubleshooting approach.
  • Why did you choose this networking troubleshooting approach?  
  • Take your networking troubleshooting  approach, and apply it to the issue you chose. Summarize the steps you  would take to troubleshoot the issue. 

cybersecurity

 

Describe PCI-DSS.

Specifically:

– What is it?

– Who must comply with it?

– How is it enforced?

– What are some gaps that are not addressed by PCI-DSS?

 Must be at least 400 words. It must include sources/references.

PLEC Week 2

 Answer Each question in 2-3 lines with in line satiations 

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

configuring

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.