Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.
Need help! due in 3 hours!
Assignment Content
- The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the IDS solution. Therefore, you will provide him with the following information to consider in his planning:
Part A
Create 1- to 2-page summary, and do the following:- Identify the number of additional employees necessary to rollout and support an IDS desktop solution.
- Explain how individuals will work with the existing desktop support and malware teams.
- Identify the job title for those who normally perform rollout and support functions for the IDS desktop solution.
- Outline the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution.
- Part B
Create an infographic displaying an organization chart, and do the following: - Identify job titles provided in your summary and how they fit in with the existing cybersecurity team.
- Indicate the industry certifications the new IDS rollout-and-support-function employees should have or can work toward.
- Format your citations according to APA guidelines.
Submit your assignment.
Demonstrating the Gap
Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network.
Using Microsoft Visio or another online network diagramming tool, diagram the network that was analyzed in the Topic 1 “Quantify the System” assignment.
Then, create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.
Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.
Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
APA style is not required, but solid academic writing is expected.
Refer to “Demonstrating the Gap Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
ALSO PLEASE READ INSTRUCTOR ASSIGNMENT TIP
Hi Class, the link below can help you with week 4 assignment. The link is not an endorsement or affiliated in any way to GCU. However, you are welcome to use whatever application or site that will produce the end results for what is being asked.
Also, I don’t except to see 50-100 servers on your diagram. However, your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
This is an assignment that many students forget to label or include what is required. That said, I want everyone to do their best and get the best possible grade.
Project Assignment
Write a 6-8 page paper (deliverable length does not include the title and reference pages)
- What are the principles and limitations to an individual’s right to privacy?
- What are the trade offs between security and privacy?
- What is the issue of freedom of speech versus the protection of children online?
Due: Assignment is due on the day stated in the Course Schedule
- Provide three articles to substantiate the above three questions.
- Use APA format to provide a citation for each of the articles you read.
- Suggestion: Use a search engine (Google) and keywords.
Write in 500 words or more from the link provided.
Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more :
- Summarize the case
- Give your opinion of the decision.
C++ code
Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.
Check the attached files of “OS Security II,” for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.
If you are not familiar with measuring execution time in C++, see the following website:
https://www.geeksforgeeks.org/measure-execution-time-function-cpp/
If you are not familiar with measuring execution time in Python, see the following website:
https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
cc-17
Write a brief reflection on this Cloud Computing and on how it will aid your professional career and development.
- How will this Cloud Computing impact your professional objectives?
- What were the major work-related lessons that you learned?
- How will this Cloud Computing prepare you for further studies related to your chosen Software career?
Research project on k-d trees
K-dimensional trees or k-d trees organize and represent spatial data. These data structures have several applications, particularly in multi-dimensional key searches like nearest neighbor and range searches. Here is how k-d trees operate:
- Every leaf node of the binary tree is a k-dimensional point
- Every non-leaf node splits the hyperplane (which is perpendicular to that dimension) into two half-spaces
- The left subtree of a particular node represents the points to the left of the hyperplane. Similarly, the right subtree of that node denotes the points in the right half.
You can probe one step further and construct a self-balanced k-d tree where each leaf node would have the same distance from the root. Also, you can test it to find whether such balanced trees would prove optimal for a particular kind of application.
project 7
write a paper of one and a half EACH question
- Conduct research on the future directions for external storage technologies.
- Compile a list of the various flash memory devices available today on the market. Include key features and approximate prices for each type
Discussion AC
Please go through question document completely before providing the answer