emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

3 Assignments

Question 1:

Topic: Select a major organization that was located in the Hurricane Katrina disaster area.  Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.

Assignment should follow all APA rules and include a min. of (1) citation/reference.
2 Pages(excluding intro and references).

Question 2:

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages(excluding references and intro)

Self-Assessment Checklist

§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

I followed the submission guidelines 

Question 3:  

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages (Excluding intro and References)

Self-Assessment Checklist

§ I addressed all issues required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

2 Presentations due in 14 hours

 office 365 presentation

Instructions

Create a PowerPoint presentation that is 5 to 10 slides (with speaker notes) based on the following scenario.

Scenario: You work for an organization with about 300 employees. You are in charge of tool selection and procurement for office software. You research options and come to a decision that you will recommend Office365 rather than standard copies of Office 2013 for your organization. You must convince the organization’s leaders that this is the best option.

Include slides that discuss the advantages and disadvantage of Office365 vs the standard Office 2013 for the following topics:

  • Cost
  • Differences in functionality & usability
  • Features and updates
  • Benefits of Cloud Computing
  • Cloud storage options with Microsoft® OneDrive®

 

Topic 11 Activity: Microsoft PowerPoint Basics – 

Instructions:

Create a 3- to 5-slide Microsoft PowerPoint presentation according to the instructions below. Save the changes to the file, and upload to Moodle.

Scenario:

You have been hired as the new intern in the technology department. The organization would like to understand some of the benefits and functionalities of Microsoft® PowerPoint®, as well as how it can be used to increase productivity.

At minimum, address the following core content in your presentation:

  • (6 pts.) Provide an overview of at least 3 general functions and features within Microsoft® PowerPoint®.
  • (6 pts.) Provide a  specific example of how Microsoft® PowerPoint® can be used to enhance productivity in the organization.

Include speaker notes for all slides. Simply submitting slides is not sufficient. 

Security Architecture & Design

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of Security Architecture & Design have been applied, or could be applied, in a practical manner to your current work environment

500 words 

APA format

Cloud_computing_week16_final

  

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a section header with proper APA formatting:

· Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

· Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

· Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

· Recommendations: What recommendations would you provide to this organization to better accomplish the challenge(s)? This is from your opinion not someone else on the Internet.

· Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least six (6) scholarly sources listed on the reference page (with in-text citations). Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 2000 words in length. The Title, Abstract, Table of Contents (if applicable), and Reference pages do not count towards the page count requirements. All references must be scholarly references (NOT WIKIPEDIA). Use one of the methods provided in residency for researching scholarly journals and websites.

DO NOT USE THE FOLLOWING COMPANIES:

· Equifax

· Any Cell Phone Company

· UBER

· Amazon

· Microsoft

· Adobe

· Capital One

· LinkedIn

· eBay

Business Intelligence

Discussion:  

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples. 

Exercise:

1. Go to microstrategy.com. Find information on the five styles of BI. Prepare a summary table for each style.

2. Find information about IBM Watson’s activities in the healthcare field. Write a report.  (limit to one page of analysis) 

 The above assignments should Include an APA cover page and a reference page. 

final project objective alignment

   attached – 

Because this project is a demonstration of the skills that you have learned throughout your time here at Herzing University, your project should have addressed each of the program outcomes. Describe, in detail, how your completed project meets each of these specific course outcomes. Each objective should be addressed in one or two complete paragraphs. 

1. Apply industry standards to the implementation and support of network systems and computer devices. 

2. Demonstrate the principles of information technology security. 

3. Express relevant information to technical and nontechnical audiences

4. Design secure network infrastructures for physical and virtual environments

5. Create information technology solutions based on business needs or requirements. 

Assignment

 Define and describe business continuity.

Define and describe disaster recovery.

Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both

3 pages APA format