Responses week 1

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

ISSC 471

1. What is IT Security Auditing? What does it involve?

An IT security audit is a comprehensive examination and assessment of an information security system. By conducting regular audits, organizations can identify weak spots and vulnerabilities in their IT infrastructure, verify security controls, ensure regulatory compliance, and more. It involves running scans on IT resources like file-sharing services, database servers and SaaS applications to assess network security, data access levels, user access rights and other system configurations. It includes physically inspecting data centers for resilience to fires, floods, and power surges as part of a disaster recovery evaluation. Finally, it involves interviewing employees outside the IT team to assess their knowledge of security concerns and adherence to company security policy.

2. Why are Governance and Compliance Important?

To ensure that businesses protect their information, have consistent cohesion departmentally, and follow all governmental regulations, a governance, risk, and compliance program is important. This helps to minimize the threats and risks that companies are exposed to on a daily basis.

3. Explain in detail the roles and responsibilities in an organization associated with the following:

According to our lesson, the risk manager, auditor, and executive manager have the following responsibilities:

  • Risk Manager – responsible      for identifying organizational risk.
  • Auditor – responsible for      conducting information assurance audit and applying frameworks to the      seven domains to align with compliance.
  • Executive Manager – responsible      for aligning external or internal compliance with governance requirements.

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.

It is my understanding that the C&A process is outdated, and we now use assessment and authorization (A&A) to follow terminology in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). In my job, we follow NIST guidelines, and all of our accreditation processes follow the RMF process. The C& process was initiation and planning, certification, accreditation, and then continuous monitoring. Though I never worked with the C&A process, I have been working with RMF for about 2 years now, and it is very involved.

References:

Tierney, M. (2020, Aug 5) IT Security Audits: The Key to Success. Retrieved from: https://blog.netwrix.com/2020/04/09/it-security-audit/

Hall, K.T. (n.d.) Why a Governance, Risk, and Compliance Program is Important for Your Business. Retrieved from: https://www.scripted.com/writing-samples/why-a-governance-risk-and-compliance-program-is-important-for-your-business

Sengupta, S. (2018, Apr 13) Cyber Security – Certification and Accreditation. Retrieved from: https://www.nxtkey.com/cyber-security-certification-and-accreditation

-JAMIE

RESPONSE 2:

1. What is IT Security Auditing? What does it involve?

According to the reading this week an IT Security Audit is an internal assessment of an organizations policies, controls, and activities. An audit ensures that an organization is in compliance with legal regulations and that their security controls are adequate. Audits can involve any number of aspects within a business’ activities including finances, compliance, operations, investigations and information technology. An IT Security Audit also involves three goals, providing an objective and review of policies, providing reasonable assurance controls are in place, and recommendations for improvement.

 2. Why are Governance and Compliance Important?

As businesses become ever more reliant on technology governance and compliance become a more integral part of business function. Governance of IT systems ensures proper use as well as compliance and risk management, all vital to the success in a business environment. Compliance is important and beneficial to all aspects of a business, it ensures the reliability as well as public trust of a business which is vital to the business’ success.

 3. Explain in details the roles and responsibilities in an organization associated with the following:

   Risk Manager- A risk manager is familiar with the risks and vulnerabilities that an organization faces, as well as creating and evaluating risk management procedures. They are also responsible for knowing auditing controls as well as reporting procedures (Patel, 2016)
    Auditor- The roles and responsibilities of an auditor include assessing current security controls and risk management procedures, advise management on how to improve security controls, evaluate risks, and analyze internal operations (Kumar, 2017)
    Executive Manager- The Executive Manager is responsible for ensuring their department is aligned with company vision and goals. They help to create and implement policies and procedures, and they make business decisions, such as security policy changes, based on the information received from the risk manager and auditor (Woodman, 2018)

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.

The Certification and Accreditation process is a standardized process, activities, and management to validate, implement and ensure security. The phases of the C&A process include Phase I Initiation and Planning: Which defines the C&A effort, it documents the steps needed to achieve the desired accreditation. Phase II Certification: This phase verifies system compliance with the identified security standards. Phase III Accreditation: Here validation is made that the system is compliant and security accreditation is achieved. Phase IV Post Accreditation: This phase continuously monitors the system to ensure it remains compliant with accreditation standards (QTS, 2019).

Alysha Macleod

Kumar N. (2017) Roles and Responsibilities of an Internal Auditor. EnterSlice

https://enterslice.com/learning/roles-and-responsibilities-of-internal-auditor/

Patel N. (2016) A Risk Manager’s Role in Strategic Leadership. NIC State.

https://erm.ncsu.edu/library/article/risk-manager-strategic-leadership

QTS. (2019) The Four Phases of the Certification and Accreditation Process. QTS

https://www.qtsdatacenters.com/resources/articles/the-four-phases-of-the-certification-and-accreditation-process

Woodman C. (2018) Job Description of an Executive Manager. Career Trend

https://careertrend.com/about-6507018-executive-manager-job-description.html

ISSC 341

RESPONSE 3:

There are 7 layers to the Open Systems Interconnection (OSI) model, but I will be discussing layers one and two. The first layer, physical layer, is responsible for the physical cable or wireless connection between the network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of raw data (Os and 1s). The second layer, data link layer, establishes and terminates a connection between two physically connected nodes on a network. It is comprised of two parts, Logical Link Control (LLC) which identifies protocols and performs error checking/synchronizes frames. Media Access Control (MAC) uses MAC addresses to connect devices and define permissions to transmit and receive data.

           IPv6 is the latest version of internet protocol and was introduced in 1998 by the Internet Engineering Task Force (IETF) to solve address space exhaustion. IPv6 uses 128-bit addressing instead of IPv4 32-bit addressing scheme. What that means is IPv4 address method uses four sets of one-to-three-digit number (192.0.2.146), and IPv6 uses eight groups of four hexadecimal digits (2001:0db8:85a3:0000:0000:8a2e:0370:7334). While IPv6 may seem more secure and will eventually replace IPv4 one day, the adoption of it has been delayed because there’s a dual stack requirement. IPv6 is not backwards compatible with IPv4. There is a problem with the network address translation (NAT), which takes private IP address and turns them into public IP addresses.

           IPv4 allows for a variation of the network and host segments of an IP address, known as subnetting. It can be used to design a network physically and logically. Subnetwork addresses enhance local routing capabilities, while reducing number of address required. The subnet mask is used to show what part of the addresses is the network portion and what part is the host portion. In IPv4, there are 3 default subnet masks corresponding to three classes of IP address.

           Hope everyone is having a great start to their week!

Regards,

Al

Works Cited:

McKeever, G., Sillam, Y., R.M., Hathaway, M., Houcheime, W., P.W., Kerman, D., Lynch, B., Hewitt, N., & Ray, T. (2020, June 10). What is OSI Model | 7 Layers Explained | Imperva. Learning Center. https://www.imperva.com/learn/application-security/osi-model/

Fruhlinger, K. S. A. J. (2020, August 26). What is IPv6, and why aren’t we there yet? Network World. https://www.networkworld.com/article/3254575/what-is-ipv6-and-why-aren-t-we-there-yet.html

Google IPv6 adoption Statistics. (2020). IPv6. https://nfware.com/blog-what-is-ipv6

IPv4 subnetting. (2021). IPv4 Subnetting. https://www.ibm.com/docs/en/zos/2.4.0?topic=internetworking-ipv4-subnetting

-ALI

RESPONSE 4:

1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer. 

The Open Systems Interconnection (OSI) Reference Model consist of 7 layers and they are from top to bottom application, presentation, session, transport, network, data link and physical. The architecture of the OSI reference model is separated into 7 layers so it aids in development, design, and troubleshooting and provides changes in one layer without effecting the other therefor all layers are equally important. These 7 layers of OSI reference model are divided into 2 groups upper (top 3 layers) and lower layers (bottom 4 layers). The upper layers define communication between the applications of the end users and the lower layers define how the data is transmitted between the two applications. Common protocols used in the layers are TCP, IP/IPX and Ethernet for the lower group and for the upper group HTPP, SSL and RPC just to name a few. 

2. What was the reason that IPv6 was introduced? Why do you think many organizations are not

upgrading their network solely to IPv6 and run that protocol instead of running IPv4?

IPv6 was introduced for its capacity over the IPv4, IPv4 is out of IP addresses and holds 4.3 billion addresses. With the growing devices like the smartphone, tablets, computer and other devices IPv4 was not able to support which gave birth to IPv6 which supports 128 bit addressing. Many organizations are not upgrading because IPv4 is enough for the company and because the internet at large doesn’t support IPv6 end to end there is a need to encapsulate IPv6 traffic into IPv4.

3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?

Subnetting provides network security, better performance while providing clean separation for troubleshooting. Subnet mask plays important part of masking the IP address. Looking forward to reading other post and learning the role of IPv4 and 6 as my knowledge on the subject is limited. Have a good rest of the week.

References:

Imperva. (n.d.). What is OSI Model | 7 Layers Explained | Imperva? Learning Center. Retrieved from https://www.imperva.com/learn/application-security/osi-model/

PARR, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved March 05, 2019, from Mashable:

https://mashable.com/2011/02/03/ipv4-ipv6-guide/#MFRFxeOnk

-TAVEN

building secure web applications week 9

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students. 

Marketing Strategies – Final Project Material

 

Please remember that your final paper is to be constructed from your Milestone papers, with additional items as listed in the assignment. It is imperative that you incorporate any feedback on the Milestone papers and make changes as necessary. If I have pointed out a problem, and I see it again in your final paper, it will dramatically lower your grade. Don’t just cut and paste the Milestones as-is. I suggest you get them up on screen or print them out, so that as you write the final paper you don’t miss anything. Here is the assignment:

  • The final paper should be approximately 10-12 pages.
  • It should consist of the information from your milestone papers along with information from our discussion board postings.
  • Feedback from the Milestone papers must be incorporated
  • All key components of a marketing plan must be represented:
  • Cover Page
  • Table of Contents
  • Company Overview/Executive Summary
  • New Product or Redefined Product Summary (why is this important to introduce now?  How does it support the mission, vision and core values?
  • Competitor Analysis and Identifiable Gaps
  • Target Market Determination
  • The use of e-commerce and social media
  • The marketing mix
  • The promotional mix
  • Consumer buying behavior
  • The impact of the pandemic on the company’s approach to sales and marketing
  • Product Lifecycle including the graph
  • Measurements of success, metrics
  • Summary
  • References

Feedback from Professor:

2nd paper feedback:  

You have three entries in your References but you don’t cite them in your text. If you used them and didn’t cite them, that’s a problem. It’s also a problem if you didn’t use any sources except Wikipedia. To be very clear:

Wikipedia is an unacceptable source in my classes.

Feedback for paper 3:  

Looking back at Milestone 1, which preceded me, I don’t see what the new or revised product or service is that you are proposing. Remember that when you complete your final paper, it must meet the criteria in the assignment. And, it must incorporate all the changes resulting from feedback on the Milestones.  When you cite an academic source like your textbook, a direct quote and page number are required. 

 

Need to solve the Word Count program using Hadoop Streaming following the below instructions

1. In class we wrote a MapReduce program in Java to compute the word counts for any given input. In this assignment, you will repeat solving the same problem but using Hadoop streaming. 

2. Create two scripts in Python namely wordcount_map.py and wordcount_reduce.py to be used by the mappers and reducers of the streaming job. 

3. Your script files must be executable (consider chmod command), and must include the necessary shebang (like in the attached script files).

 4. Attached are the script files we used in class to demonstrate Hadoop streaming, namely: maxtemp_map.py and maxtemp_reduce.py. They can help you to get started. 

5. Recall the streaming command:

 $ mapred streaming    

 -files ,   

  -mapper    

 -reducer   

  -input    

 -output  

(extra options: -combiner, -numReduceTasks, etc.)

MaxTemperature Example file is the program file discussed in Class.

zero days vulnerability

 Zero days vulnerabilities in Digital Forensics…  Please, discuss your views and ideas on how can we be prepared for zero day vulnerabilities and attacks.  Share your views with your classmates and comment on at least two of your classmates’ posts. 

Mobile Human Computer Interaction

Prepare a Research Paper for the topic – Mobile Human Computer Interaction. Please write only for the following given topics:

Literature Review (300 words)

Future Research Recommendations (1 Full Page without extra spaces). Along with 2-3 References.

Exp22_Word_AppCapstone_IntroAssessment – Research 1.1

Exp22_Word_AppCapstone_IntroAssessment – Research 1.1

  

Exp22_Word_AppCapstone_IntroAssessment – Research 1.1

Project Description:

As you near graduation from college, you plan to apply to various graduate schools. You have prepared a draft of a statement of purpose that you will include in an application packet to each university to which you apply. You modify the statement of purpose so that it is attractive and error free. In addition, you include such items as a table, picture, header, footer, and footnote, formatting text in columns where appropriate. Finally, you use mail merge to prepare personalized copies.

     

Start Word. Download and open   the file named Exp22_Word_AppCapstone_IntroAssessment_Research.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Apply the Slice document theme.   Select all text in the document and change the font to Bookman Old Style.   Change the font size to 12. Adjust the right and left margins to 1.5″.
 

  If the theme is not available, click or select Browse for Themes, and then   select the downloaded theme file Slice.thmx.

 

Insert a header (select Edit   Header) that includes a left-aligned page number. Close the header.

 

Insert a manual page break   before the second paragraph on the second page, beginning with On behalf of the faculty and staff.

 

Select all text that displays   before the newly inserted page break and double-space the selected text.   Remove any paragraph spacing from the selected text.

 

Move to the beginning of the   document and press ENTER. Remove the First line indent from the newly   inserted blank paragraph. At the new paragraph, type Statement of Purpose and apply bold formatting to the   title. Center the title.

 

In the second paragraph on the   first page, place the insertion point after the period at the end of the   sentence that ends with by the   University of Arizona. Insert a footnote that reads The Three Minute Thesis Competition is open to all   academic disciplines at the university. (include the period).

 

Modify the Footnote Text style,   changing the font to Bookman Old Style and the font size to 12.

 

Find all occurrences of the word   sophomore in   the document and change the word to student.

 

Insert a footer (select Edit   Footer) and type 2024 Fall in the footer space. Change the   footer font to Bookman Old Style and change the footer font size to 12. Close   the footer.

 

Select all text on pages 4 and 5   and format it in two columns. Insert a Continuous section break before the   words On behalf of the faculty and   staff at the top of the fourth page.

 

Click or position the insertion   point before the newly inserted section break at the top of the fourth page   and change the column setting to One. Type Welcome to   the College of Business and press ENTER twice. Select Welcome to   the College of Business and apply the Title style. Reduce the font size   to 22. Center the newsletter title.

 

Add a bottom border with a   weight of 1 1/2 to the text Welcome to   the College of Business.

 

Place the insertion point before   the words The College of Business at   the beginning of the second body paragraph on the fourth page. Insert the University.jpg picture, downloaded with this   project. Change the picture style to Reflected Rounded Rectangle. Resize the   picture height to 1″ and select Square text wrapping.

 

Place the insertion point after   the period ending the first paragraph on the second page (ending in upon graduation). Press ENTER. Remove   the First line indent. Insert a 2-column by 6-row table. Change the width of   the second column to 1″.

 

Type Course in the top left cell and press TAB. Type Grade in the next cell on the first   row. Press TAB. Complete the table as shown below:
 

  Course Grade
Int.   Microeconomics A
Int.   Macroeconomics  B
Public   Finance B
Business   Calculus A
Contemporary   Economics A

 

Insert a row above the first row in the table. Merge all cells in row   1 and type Major Courses   Completed in row 1. Apply Align Center   alignment to row 1. Apply a table style of Grid Table 4 – Accent 6 (row 4,   column 7 under Grid Tables). Center the table horizontally.

 

Add a caption below the table.   The caption should read Table 1: Major Courses Completed at the University of Arizona. (Do not include the period.) Center the caption.

 

Create a custom watermark to   display at a diagonal, with the text Copy in Blue (column 8 in Standard colors). 

 

Check spelling and grammar in   the document. Correct the misspelling of analyzed   and the hyphenation of first-time.   If the check does not suggest a change for   first time, manually correct it in the second to last paragraph in the   left column on page 5, changing first   time to first-time. Ignore all   other grammatical and clarity concerns.

 

Replace the dash dividing the   words organization and Fortune 500 in the first paragraph on   the fourth page with an Em Dash symbol. In the same paragraph, replace the   dash following the word restaurants   with an Em Dash symbol.

 

Select the paragraph beginning   with I hope you will accept the   challenge on the last page (including the paragraph mark). Apply shading   of Red, Accent 6, Lighter 60% (last column, third row under Theme Colors) to   the selected paragraph.

 

Click or select the References   tab and ensure that the writing style is MLA. Place the insertion point after   the words 600 graduate students and before the ending   punctuation mark at the end of the first sentence in the right column on page   4. Insert a citation to a new source, selecting Report as the type of source.   Complete the entry as follows:
  Corporate Author: University of Arizona
  Title: State   of the University
  Publisher: University Press
  City: Peoria
  Year: 2024

 

Begin a mail merge based on   Letters, selecting recipients from an existing list—Graduate_Schools.xlsx, using Sheet1$. Filter to select only those   universities with an Area equal to W.

 

Replace [University Name] in the first paragraph on the third page with   the merge field of University. Be   sure to include the brackets with text to be replaced. Ensure that a space   precedes and follows the newly inserted University placeholder. Preview the   results and then finish the merge, choosing to edit individual documents and   merging all records.

 

Select the entire 10-page merged   document and copy it. Switch to Exp22_Word_AppCapstone_IntroAssessment_Research,   move the insertion point to the end of the document, and insert a manual page   break. At the top of the new page, paste the copied text. The original   document to which you pasted the merged data now contains 15 pages. Save Exp22_Word_AppCapstone_IntroAssessment_Research   and close all open documents without saving.

 

Save and close Exp22_Word_AppCapstone_IntroAssessment_Research.docx. Exit Word. Submit the file as directed.

cloud computing

 How is Cloud Computing different from a simple Client-Server architecture? How is Virtualization different from Cloud Computing? Which is the best to use and why?