Data Recovery

 Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved. 

Cyber project

  

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Assignment

 

Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences.

 What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?

How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation—add up to a system’s particular risk posture?

In addition, how do all the systems’ risks sum up to an organization’s computer security risk posture?

ERP System

You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two or three alternative strategies, and explore related examples of situations for which each approach would be preferred and required.
500 words 

Testing Hypotheses

 

In this assignment, you will test for a significant difference between the average resting heart rate of males and the average resting heart rate of females in your heart rate data.  You have observed that the mean rates are not exactly the same but are they significantly different?  You may use either of the two methods for testing a hypothesis illustrated in Realizeit:  compare the two confidence intervals or use the data analysis tool to run a two-sample test with unequal variances as shown in the topic of testing two-samples.

Steps

  1. Write the null hypotheses being tested
  2. Run the analysis either by using data analysis and the two-sample test or by comparing the two confidence intervals
  3. Interpret your data to determine if the resting male heart rate is the same as the resting female heart rate. Remember we are looking for whether the difference is a significant one, not just whether they are not the same.

Additional Instructions:

Your assignment should be typed into a Word or other word processing document, formatted in APA style. 

Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

ITS 350-1 Portfolio project

 

Option #1: XYZ Corporation

XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

  1. A plan to provide secure Access Control Methods for all user access
  2. A viable Password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to the CSU Global Writing Center (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU Global Library is a good place to find these references.

Java Programming

Please read the instruction from these pictures.

You can use these codes below. 

game.java (The codes of the picture below) : 

https://drive.google.com/file/d/1vggE2dDlb9d7PdE1vB6_AIa2bxytc3Um/view?usp=sharing

Game.java : 

https://drive.google.com/file/d/1Ax_n-lW65wCPXgelFctKGnx93i1KNFdc/view?usp=sharing

GameObject.java : 

https://drive.google.com/file/d/1M3nbQUVt9FjY_aco5YtAN_g-moXgfYhk/view?usp=sharing

Enemy.java : 

https://drive.google.com/file/d/12ZmBwbsH5ltgSI18gWcZJX5DHwgEqYoi/view?usp=sharing

Player.java

https://drive.google.com/file/d/1Kn1PAXE3NONPyYPaeHBBH3gCdjcwaN6l/view?usp=sharing

Migration from local to Cloud Infrastructure

  

Deliverables

You company has been allocated an unlimited budget to move to a virtualization infrastructure. The current IT infrastructure exists on bare metal with no virtualization implemented at all. 

The current infrastructure contains the following components:

2 x Windows 2008 R2 Domain Controllers

2 x Exchange 2013 Servers

1 x SQL 2012 Server

1 x Red Hat 7.0 Apache Server

2 x Windows 2008 R2 Servers as File Servers

Your task is to do the following:

1) Provide a cost and description of the new hardware you will be implementing

2) Develop a migration plan to move all current infrastructure to virtualization (this also means 0 downtime)

3) Identify and Upgrade the old operating systems and software in the current infrastructure

4) Expand the current infrastructure to include new technologies (eg. An MDM solution)

Please create a detailed report on the tasks above.