Discussion 1

 

Introduction to Risk

Individuals, businesses and governments face risk daily. Risk is manifested in different forms and may be described as business, non-business, or financial. Irrespective of the type of risk, it’s important to remember the basic goals of security – to maintain confidentiality and integrity, while also ensuring the availability of data and systems. Organizations and governments usually employ different approaches to mitigating risks, but with a good understanding and consideration for risk elements including (i) vulnerabilities, (ii) threats & threat agents, (iii) impact, and (iv) likelihood. Other considerations include an organization or government’s appetite for risk, business goals, as well as internal and external drivers (laws, regulations, and standards). Proven strategies to deal with risk employ an enterprise risk management approach, and also rely on risk management frameworks including but not limited to: NIST’s risk management framework, ISACA’s risk IT framework, and COBIT 2019.

Overview

Follow these directions to complete the assignment:

Identify a cybersecurity-related attack:

Using scholarly sources and/or the web, research, identify, and share an example of a cybersecurity-related attack. Examples may include cyber warfare such as “Stuxnet” or the “Equifax” data breach. Feel free to use any of these. Once you’ve decided on the example you will share, “claim” it by posting it to the discussion. Do not post about the same type of attack as your classmates.

Create your post:

In a discussion post of approximately 600 to 800 words, explain risk and risk elements related to this attack, including a synopsis, attack type, characteristics, vulnerabilities, threats & threat agents, impact, and likelihood of this attack. You may need to make some assumptions as you write about the risk elements. Clearly state any assumptions that you make. Do not offer a potential solution to the attack;

 

Action Items

  1. Complete all of the reading for this module.
  2. Claim the cybersecurity-related attack you intend to discuss by posting it to the discussion.
  3. Create your discussion post according to the directions in the overview.

EPCA

 Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper should include the following sections. Each explicitly listed with a heading. 

  • Company Overview:  The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function: Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution:  Describe your proposal for moving the function to the cloud. Be specific and detailed. What services would you use? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be 2 pages. For example, indicate the specific services you will consume or subscribe to, (if you are moving to AWS, I would expect to see specific services listed such as EC2, S3, Redshift, Lambda, and others). Indicate where storage is duplicated and failovers may be present.
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success. 

Total 4 pages

Data base and design

 

  1. Application Implementation

You Must write each of the following SQL commands:

Write a set of at least 6 SQL queries that would retrieve relative and important data from your database.

Write a set of at least 5 SQL updates that would modify relative and important data in your database.

Write a set of at least 5 SQL deletes that would delete some data from your database. Write a set of at least 2 SQL views that would define some virtual tables in your database.

 For each of the above SQL commands give a brief explanation of the purpose of each command and the output (if any) for each..Optional (extra credit):

Create forms, reports, queries, menus or navigation forms as needed on top of the tables. In general, a simple data entry form should be created for each table. For example, if the business takes orders from customers, create a form with Orders and Order items with

  1. Write Up Final Report
    The final step is to prepare a formal report and brief presentation. This report should include:

    • A separate cover page indicating the GROUP Number, the title of your project, the full names and IDs of the group members, the course number and course section.
    • An introduction section similar to the proposal.
    • Entity Relationship Model diagram.
    • The collection of normalized relations and functional dependencies, and a brief discussion as to the normal form(s) achieved, the methods used to achieve these normal forms, and reasons why any de-normalization was done.
    • The SQL DDL used to create the tables and add primary key and foreign key constraints.
    • The SQL commands (as required in 5 above) along with their brief explanation of the purpose of each command and the output (if any) for each.
    • Optional (extra credit) An example printout of each of the forms, reports and queries accompanied by a description of the function of each. Along with each form.
    • A narrative conclusion section that describes:
      a) the group’s experience with the project (which steps were the most difficult? Which were the easiest ? what did you learn that you did not imagine you would have? if you had to do it all over again, what would you have done differently?)
      b) if the proposed benefits can be realized by the new system
      c) any final comments and conclusions

ITS-530 – Analyzing & Visualizing Data – Paper

Homework:

Review The Power of Good Design- https://www.vitsoe.com/gb/about/good-design   and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First, note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 

Ensure there is data visualization in the homework and note how it relates to the three principles selected.

Parts of this assignment:

Part 1:  Review the 3 Principles that you are going to use.

Part 2:  Discussion of the Problem.

Part 3:  The dataset (where you got the data)

Part 4:  Explain how you can solve the problem

Part 5:  Make sure you have a data visual (you can create the visual with R-Language)

Note: plagiarism check required, APA7 format, include References, within 8hrs

cybersecurity and AI

 Technical report. It should minimum 10 pages and should be single space. But before technical writing, there should be report outline with references. 

database discussion response

 Please respond to the following discussion below with 150 words or more relating to relational algebra and its relation to SQL. 

From what I have researched, relational algebra is one of a few  different collections of mathematical formulas to manipulate data in a  relation or table. It is a procedural query language that uses relation  instances for input and relation occurrences for output (AskingLot,  2020). It is the formal description of how a database operates and a  means to interface with it to manipulate and utilize raw data (Russell,  2016). Basic relational algebra operators are select, project, union,  set difference, and Cartesian product.

SQL is the query language that is essentially the front end user  interface built upon relational algebra. Relational algebra and  relational calculus together form the base for the SQL language  (AskingLot, 2020). SQL operator inputs are translated to relational  algebra before being applied to the relation. Some basic syntax  operators for SQL are select, insert, delete, update, and create.

Examples of the differences in syntax are below:

SQL:

SELECT *attribute* FROM *table/relation/s* WHERE *condition to be met*

Relational Algebra:

PROJECT *attribute* (SELECT *condition to be met* (table/relation))

or

π *attribute* (σ *condition to be met* (table/relation))

Cyber Defense Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I can think of a few different web based firms that offer online security checks. I personally do trust these types of services. Of course I would only ever use well known software like Norton or MacAfee. I’ve never heard about anything going wrong with utilizing services like these and I have definitely seen things go wrong while operating on a PC or laptop without protection. 

Norton Security offers different security options that range from Plus ($19.99), Standard ($25.99), Deluxe ($29.99), and Select ($99.48). These different options which vary by price also vary by what the plan covers. Mainly, the less expensive options have less levels of protection versus the more expensive plans which get additional benefits or areas of security. Looking at the most expensive plan, the Select Plan, the coverage options seem pretty extensive, it’s a plan I would go with if I chose to use this service. There is security for 5 different devices, PC Cloud Backup, Virus Protection, Parental Controls, Private Browsing with VPN, Stolen Funds Reimbursement, etc. This plan and coverage is pretty in depth. I would say that this type of software is one that I would trust and I would recommend to people, especially with windows computers. There have been many issues over the years with flaws in windows security allowing for data breaches via way of hackers gaining access to networks and devices. I wouldn’t want to risk something like that and I feel that most people have a lot of information stored on their devices these days, probably more information than ever before as the world continues to transform to an all electric operating system. These days most people have thousands of pictures on their devices, important scanned documents, school and medical related documents and paperwork, etc. This puts us all in a very vulnerable position because if anyone were to gain access to these devices they can steal the information, they can lock it, and they can destroy it all together. 

¹ Norton. Cyber Safety. 2021. 

Felicia 

RESPONSE 2:

There have been times in the past were I had to restore to using one of these free services to scan my system. Free tools such as Avast antivirus have been a great help in detecting some of the standard malicious software; however, this protection is limited in its capacity. If you want those additional features, it will cost you. There are many free security options out on the web, but there are even more that have been found to be malicious. Some of these rogue security applications will take names similar to those of respected developers or official-sounding names such as BitDefender 2011 or Windows XP Recovery, which will be used to trick unsuspecting users into installing them on their systems (Prakash & Parameswari, 2016). Typically deployed after a user visits a questionable website which will alert the user to possible infection and offer a link to download the free security software. Once on the system, the user will be bombarded with phony alerts stating that their system has been compromised further and would require a higher level of protection at a cost to the user. Already at this point, the user has opened themselves up to the installation of all forms of nasty malware, including rootkits, trojans, and ransomware. 

I have since moved on to other antivirus options such as McAfee since the service was free through the military. However, McAfee offers a subscription-based service, with multiple tiers, with prices ranging from $19.99 to $39.99. The standard features provided with this security solution range from its standard antivirus protection, VPN licenses, encrypted storage, and password management. Some of these services are unnecessary, such as the 128-bit encryption for storage, which encrypts data on a hard drive to protect against unauthorized viewing. The encrypted storage feature can be found on any modern system. Another feature offered is the password manager, which stores all your passwords in a single repository. It also suggests sufficiently solid passwords and automatically holds them for you. Although this makes password management a breeze, a compromise in this area could reveal all your passwords to an adversary. Luckily all this information is protected with encryption, and if the anti-malware protection is being used, it should block any malware that would capture this data. 

-Joshua

Prakash, G., & Parameswari, M. (2016). On reviewing the implications of rogue antivirus. Journal of Information Ethics, 25(2), 128-139. Retrieved from https://www-proquest-com.ezproxy2.apus.edu/scholarly-journals/on-reviewing-implications-rogue-antivirus/docview/2064887596/se-2?accountid=8289

McAfee. (n.d.). McAfee Total Protection 2021: Beyond Antivirus. McAfee. 

Discuss

  

1. Discuss the differences between external and internal threats as they relate to network security. Which threat is most difficult to defend against and why? What protections would be used specifically related to internal threats? Why is it important for organizations to have a written security policy?

2.Highlight the basic functions and operation of public key cryptography. What is the “Advanced Encryption Standard”? How are digital signatures generated and used? 

3.Discuss “Pretty Good Privacy.” What is it? Why has it stood the test of time, and will it be good enough in the future, why or why not? Compare it to Kerberos encryption. 

4.Identify and compare the two primary and currently used techniques to secure wireless communications. How safe are your data communications when using a typical wireless hotspot (public)? What can you do to improve your data security when using one of these services?

Week 5 – Written Work/ Assignment

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

Chapter 3 & 4 Journal articles