Threat Model

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (” Do not copy and paste images from the Internet, I need 100% original work, no plagiarism is encouraged or tolerated” ). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately 2 to 3 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Home work 4

 

Each student will conduct a search online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relates to Power as it relates to negotiation. Your submission must include the following information in the following format:

Key Term:

  • Power as it Relates to Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: 

 Write a full paragraph responding to each of the following questions:

1. Explain why you selected this particular article among all the articles you could have chosen on your selected term.

2. Explain why you agree or disagree with the author’s key positions in the article. 

3. Explain how the article was easy or difficult to understand and why? 

4. What did the author do well in your opinion? Explain.

5. Describe what you believe the author could have done better in your opinion?

6. What else should the author have included in the article and would the article benefit from a different perspective (such as from a different nationality or different industry or experience perspective). Explain. 

7. What other sources or methods could the author have used to improve the research in the article?  (Hint: look up the types of qualitative and types of quantitative research methods). 

8. What information / in-depth study / or further research should the author focus on as a follow up to this article and why? 

9. Explain what audience would gain the most benefit from your selected article and how they could apply it in their professional lives. 

10. What did you personally gain from this article and how has it shaped your thinking on the topic? 

11. What are the conflicting or alternative viewpoint to the author’s position? Or  What additional research backs up and confirms or adds to the author’s position?  (Hint: this will require you to find another peer-reviewed article that challenges, confirms, or adds to, or provides a different perspective to your chosen article.   

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Automation Testing Script using Celenium Java

Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link

 1. Selenium WebDriver – Page Object Model:

1. Visit amazon.com Page

2. Search for Book ‘qa testing for beginners’

3. Click on 1st item in the listed results.

 

4. Before Click on add to cart Add to Cart asset price from Step3. 

5. Click on Add to Cart.

6. Before Click on Proceed to Checkout asset price from Step3.

7. Click on proceed to checkout

5. On the checkout page assert price from Step3.

 2. API automation using Rest-assured or Karate API Test

 1. Use any 2 methods(Get, and Delete) from end-points listed in

http://dummy.restapiexample.com/

2. Perform assertions for 

   – Get & Delete – Status code to be Successful.

   – Get – Return specific Employee details(Any).

   – Delete – “message”: “successfully! deleted Records”.

CSIA 459 disc

Before you begin read the following articles:

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

19 Mirai Botnet Authors Avoid Jail Time

You have been asked to provide a short presentation for Business Leaders Round Table meeting in your community. The topic of the meeting is Emerging Cybersecurity Threats and What Businesses Need to Know. Your presentation will be part of a series of talks about the risks associated with unsecured cyber-physical systems. The organizers have asked you to begin by presenting an overview of the Mirai Botnet attacks followed by a discussion of threats and vulnerabilities which have been found in cyber-physical systems used to manage buildings and utilities.

For this briefing, you will need to find and use three additional authoritative sources that provide information about threats, attacks, and vulnerabilities affecting cyber-physical systems.

Format your presentation as a background paper to be shared with attendees. The target length as specified by the meeting organizers is 5 to 7 paragraphs in length.

Post your paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.

Organ Leader and decision making PHDIT-

 

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

Topic 9 and 10 due in 12 hours

  topic 9:

  

Instructions:

Answer all the below questions, save the changes to this file, and upload to Moodle.

topic 10:

Instructions:

Create an Excel file according to the instructions below. Save the changes to the file, and upload to Moodle.

Owning a dominion name

  

Instructions

In order to complete assignment #5, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 8

Review Question #4 on page 261 and then answer the following question:

The new age of technology presents many opportunities for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.

The plaintiff, in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants, in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.

Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Weather Underground Inc. v. Navigation Catalyst Sys. Inc., No. 09–10756, 2009 WL 3818191 (E.D. Mich. Nov. 13, 2009).

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Chapter 9

Apple, Inc., and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to blackout restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement.

computer forensic

Discuss how email has impacted members of an organization’s expectation of privacy, communication, confidentiality and its use as evidence.  After reading the article titled “Your E-mail Trail: Where Ethics Meets Forensics”, discuss your findings 

Writing Requirements

  • The Essay must be at least 4-5 pages long.
  • Must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • (Use at least 2 academic books and 3 scholarly articles from a library database)
  • Use APA Style for in-text citations, and references
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.