Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats against WLANs and the weaknesses of the IEEE 802.11 security protocols. Also, include information about the more secure WPA2. Your presentation should contain at least 10 slides” (Ciampa 368-369).

You will create a PowerPoint presentation for a fictitious company regarding wireless security. Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to Tech Republic Article about Powerpoint (Links to an external site.) for proper use of developing presentations in PowerPoint. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

4 pages Critical review except

Find one peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article. The review should be at least 4 pages (1000 words) long from introduction through conclusion. Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Writing Requirements for all Written Work:

References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with ALL submissions (even initial discussion posts)

Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write MORE than the minimum requirement of the word count assigned

As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Bid Response Proposal Presentation

  

Bid Response Proposal

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

  1. Deliver      a Bid Response Proposal to provide a business security solution to      prevent malicious or unauthorized use of digital assets
  2. Create      and implement effective policies to mitigate risks
  3. Deliver      a detailed list of security products and pricing
  4. Provide      safeguards for the information assets

Format:

Format for the project should be a 15 PowerPoint presentation with a budget sheet.

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Investment Firm cybercrime risk assesment

 

  • As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Risk Assessment.  The overall cybercrime risk assessment can be outlined with a minimum of two to three sentence descriptions of what the outline will cover under each section.
  • Ensure that you provide information for three specific risks for each section. For example, three High, three Medium, and three Low.
  • You will want to take into consideration that HU Financial Firm is a legal firm. 
  • Items to think about would be the possibility of a natural disaster occurring or a cybercrime attack. 
  • You will want to rank the possibility of an incident happening from high to low as identified in the sample template in this section, which has been provided for you.
  • Additional information can be reviewed under the course reference links and research on the internet.

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400–500 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear and use examples to reinforce your ideas.

There are numerous times when the information collected from a real organization will not conform to the requirements of a parametric analysis. That is, a practitioner would not be able to analyze the data with a t-test or F-test (ANOVA).

Presume that a young professional has read about tests—such as the Chi-Square, the Mann-Whitney U test, the Wilcoxon Signed-Rank test, and the Kruskal-Wallis one-way analysis of variance—and wants to know when it is appropriate to use each test, what the test is used for, and why each would be used instead of the t-tests and ANOVA. How would you address this young person’s concerns?