Writing assignment 4

WRITING ASSIGNMENT 4 INSTRUCTIONS

SECURITY ISSUES IN P2P NETWORKS

In this assignment, you will answer the following review questions from the reading materials of the module/week. 

1. Question #1 in Section 2.9 in Chapter 2. 

“What are the key components of a typical P2P application? Describe their functions.”

2. Question #4 in Section 3.9 in Chapter 3. 

“What are the essential features of a typical hybrid network architecture design?”

3. Question #2 in Section 7.11 in Chapter 7. 

“What is Sybil attack? Why is it a serious problem?”

4. Question #4 in Section 7.11 in Chapter 7.

“Why is it possible to launch a DDoS attack using a P2P network?”

You are expected to provide a detailed answer that shows a clear understanding to each question’s subject matter. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. In addition to the module’s “Reading & Study” materials, a minimum of 3 references is required for this assignment and be sure to include complete reference information. Your submission must contain at least 1,000 words and should follow the current APA formatting style. Please refer to the current edition of the APA publication manual for guideline details.

Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 5.

Scholarly Asbstract Assignment 2

 

Just like you did in assignment 2.1, you will create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in 2.2. However, this time you need to review a different methodology than you previously did (i.e. if you reviewed a quantitative article in 2.1, you will do a qualitative one in 2.2 and vice versa). 

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this  link

Discussion

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two references (academic or professional literature) in APA v7 format.

Discussion board

What are the consequences of an organization not having an information policy?

Post your response below and respond to at least one other student’s post. 

this is the student post i want you to reply to” If a company does not have an information policy, the simply have no control of how the data they collect is used, and cannot legally use it efficiently. The scale of the repercussions will depend on the type of business that they are as well as the size of the business.  For example, if it’s a data centric business, then they have lost the core of their business and will surely get run over by a competitor soon enough. However, if it is a non data centric business, some major consequences would possibly include other businesses not wanting to work with them, a loss of credibility, and penalties from data security regulators. Other less serious consequences that not having an information policy would entail would be an overall loss of organization in the respect of data, the company would have to establish to their customers what exactly they were doing with their information without the policy, which could result in legal problems“

Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

Bank Enterprise Information Security Policy (EISP)

  

The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)

Here are some technical parameters of the Bank of Bowie.

· Headquarters is located in Bowie, MD

· Headquarters building has corporate offices and a branch on the lower level

· Two branch offices are located in Bowie and Laurel

· Each of the three branches employees the following staff

o Branch Manager

o Branch Security Officer

o Six Tellers

o Two Loan Officers

· Corporate Headquarters employs the following staff

o Officers and Directors

§ Chairman/CEO/President/Director

§ Vice-President/Secretary/Director

§ Financial Officer/Treasurer

§ Assistant Treasurer 

§ Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes

§ Chief Compliance Officer

o Employees

§ Head Loan Officer 

§ Senior Loan Administrator

§ Two Loan Processors

§ Escrow Processor

§ Eight Customer Service Representatives

§ Internal Auditor

§ Compliance Officer

§ Two Human Resources Personnel

§ Five Information Technology Personnel

· Bank Offerings

o Savings and Checking Accounts

o Loans

o Deposit Products such as IRAs

o Online Banking

Information Technology Landscape

· Primary corporate databases are maintained at the Headquarters and a backup location

· Data is replicated routinely from the branches to the Headquarters

· Headquarters and branch personnel use desktops for their day-to-day activities

· Software consists of a number of standard applications, e.g., Office, and customized banking applications

· The Bank of Bowie website provides static information about the bank

· Electronic banking activities are outsourced to other providers

· Data is archived by a third-party provider

· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures

Vision/Mission

Bank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]

Regulation

We will simplify the government regulations for this activity. You must account for federal requirements for the following.

· All financial transactions must have integrity.

· All financial transactions must be audited and audit data must be retained for a period of six years.

· Social Security Numbers must be kept confidential.

· Customers must have access to their accounts at least every 48 hours.

· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. 

Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. 

Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. 

Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. 

Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.

 .

Software Technology – Testing Software Testing

 

IT213-4: Apply the debugging process and testing process to programs containing fundamental concepts such as decision statements, iteration, functions and arrays.

GEL-7.02: Apply ethical reasoning to ethical issues within the field of Information Technology.

Purpose

In this assignment, you will be addressing what is entailed in each of the testing levels that will occur in a professional software development environment. You will also consider an ethical dilemma as it relates to software testing and share from your personal experience, perspective, readings and research.

Assignment Instructions

Write a 4–6 page paper addressing the following:

  • Define the following four levels of testing for software development: 1) unit testing, 2) integration testing, 3) systems testing, and acceptance testing.
  • Explain the purpose of each testing level, and provide your reasoning for why it is important that each level of testing is performed for any software development project.
  • Describe how the four testing levels are related to one another.
  • Additionally, conclude your paper by addressing the following ethical dilemma providing your perspective on how to approach this decision:

There is a “first to market at all costs” culture that exists at some well-known corporations today. They would rather send out a “buggy” product if it meant being first. There have been many inferior products to rise to the top simply because they took the biggest chunk of the market share before anyone else. If you worked for a major software corporation as a software developer and were assigned a role on a project, what would you do if your manager pushed to rush a product to market without sufficient debugging and testing. What are the ethical implications of delivering a quality product versus meeting a deadline? How would you approach this decision?

Be sure to cite your sources in this paper and use correct APA format.