Cyber Foundations

 

Application Assignment 2 – Krebs on Security

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  
 

Order # 13476

Title: Software Development and Your Role in It

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

In this assessment, you will articulate the roles played by team members in a software development project. You will explain how the Java programming language and development environment enable you to perform your role as a software programmer/developer in a development project.

In software development projects, a team is formed to carry out the project. The team is made of several members, each with a distinct role and responsibilities. Examples of these roles include the client, the project manager, the software architect, and the software programmer/developer roles.

Please refer to the resources of this assessment to learn about the software development process and the roles played in a typical software development project.

You may wish to reference these resources in your assessment.

Follow these steps to complete this assessment:

1.Research the software development process and the roles played by the development team members in software development projects. This research may include the readings suggested with this assessment, or you may conduct additional research.

2.Create a PDF or Word document named “U1A1_SWRoles” of 1–2 pages in which you: a.Describe the software development process and its phases.

b.Explain at least four of the roles played by team members in a software development project and examine their corresponding responsibilities. The four roles must include the role of the software developer/programmer.

c.As an aspiring Java programmer, articulate how the Java programming language and the Java development environment enable you to perform the role of a Java developer in a software development project.

Your document should follow APA style and guidelines, including proper spelling and grammar. APA guides are available in the assessment resources.

Deliverables

Submit your paper as Word document named as U1A1_SWRoles.doc (a PDF is also acceptable).Your document should follow APA style and guidelines, including proper spelling and grammar.

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

1.Describe the software development process and its phases.

2.Explain roles and responsibilities of the developer/programmer teams.

3.Articulate how the programming language and development environment enable the role of a developer/programmer.

4.Communicate efficiently, effectively, and in an appropriate manner for an IT professional.

Application security Procedure guide

  

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Project Part 1

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

Task   2: Risk Assessment Plan

Task   3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?
  • Did the student      create a professional, well-developed draft with proper grammar, spelling,      and punctuation?

  

  

Biometric Techniques – Cybersecurity

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits  and the  vulnerabilities associated with that method in 3-4 paragraphs.

– No Plagirism

– References required

Prof writing & proposal Devel(DSRT) 2.2Question

 

Just like you did in assignment 2.1, you will create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question.  However, this time you need to review a different methodology than you previously did (i.e. if you reviewed a quantitative article in 2.1, you will do a qualitative one in 2.2 and vice versa). 

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example

Request for Proposal

 

Due Thursday 

Respond to the following in a minimum of 250 words: 

The vendor selection process ensures you choose a vendor to meet the organization’s needs. A Request for Proposal process provides a structure that leads to better decisions for purchasing through vendors. 

Discuss the need for a Request for Proposal (RFP). When would you need to create a Request for Proposal? 

Note: As part of this week’s individual assignment, you will create a Request for Proposal.