Applications in Information Security

  

You are the Information Security Manager for Titan Industries, a Florida based company that provides Information Technology services to several clients all over the world. Your upper management has approached you with concerns that your computer system is vulnerable to an inside or outside attack. You have been tasked to identify ways that the computer systems within your company can be protected from both inside and outside attacks, identify risk mitigations strategies, and to write a white paper for your upper management.

First, you must do an Internet search and identify a computer configuration that you wish to use as the baseline for the computer system at Titan Industries. Second, identify the strengths and weaknesses of this computer system. Third, identify ways that the computer system can be protected from inside and outside attacks. Finally, discuss risk mitigation strategies that would minimize the effects of a successful attack.

Your paper should have the following format:

· Cover Page containing the following information:

o The Title of the paper

o Your Name

o Your Title with the company (e.g. Security Manager or IT Manager)

o The Date

o The Titan Industries Logo (you may create one or modify one you find online)

· Table of Contents

· Introduction – discusses the problem and why you are writing this white paper

· System Description

· System Strengths and Weaknesses

· System Protection Options

· Risk Mitigation Strategies

· Conclusions

· References

Your paper should be in Microsoft Word format, one inch margins, Times New Roman font, size 12, and be double spaced. Your papers should be between 10 to 12 pages in length, not counting the Cover Page. You will be graded on the content, structure, conformity to the guidelines discussed above, and the overall appearance of your white paper. 

Signature Assignment – Security Threat Awareness Infographic & Presentation

  

Imagine you are the Information Systems Security Officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Create a 1-page infographic or job aid of the cyber domain using the DoD or OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation.

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training in your presentation.

Select 3 threats from your infographic or job aid.

Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines. 

Research paper

1) Analytical research paper – Collaboration and Learning in human computer interaction

Prepare a ten (10) page research paper. In the paper, cover the following: 

· Cover Page 

· Abstract 

· Introduction 

· Key Definitions

· Review of Literature Findings

· Future Research Recommendations

· Conclusion

· Bibliography 

The paper should aim to comprehend the topic relative to interaction design, usability, and user experience. Confine the research scope to a specific business domain.

2)   Annotated Bibliography – Collaboration and Learning in human computer interaction

20 references are to be scholarly papers. 

Cited APA citation and a description of the article that is 100-125 words

HW

 

Initial Post

Your initial post should read approximately 250 to 350 words in length and include at least one citation from the bibliography of your textbook chapter, with the accompanying reference in APA format. To receive the maximum points, your post should include a reference from the textbook, an article of your choosing, and one of this week’s ancillary readings.

Prompt

Based on your readings, why is it important to refer to a sports psychologist, and what is the value of having a multidisciplinary team of health professionals?

Parameters

  • Retrieve one article/citation from the chapter bibliography that was referenced to make this point 
  • Apply what you learned from reading this additional article
  • Address how reading this additional article built upon this major point from the text
  • Discuss contradictory information from the article to the text’s main point
  • Follow APA guidelines

 

Compliance Audit

  

It is essential as a cybersecurity professional to have a complete understanding of how a compliance audit is conducted and documented because organizational sustainability often depends on the adequate assessment of information security and privacy management.Using the GCU Virtualization Environment, build either a Windows or Linux server. Then, search the web for technical controls related to HIPAA.Break the technical controls down into technical requirements appropriate for your virtual server with Pass/Fail criteria.Audit the virtual server and report if compliant or not.Once compliance testing has been completed, draft a certification letter for your client or organization highlighting the applicable controls tested along with the compliance model used. 

Refer to the “HIPAA Security Audit Certification Document,” located within the Required Readings, as an example.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-630 Compliance Audit Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

MS ACCESS file

 Part A: Develop an entity-relationship diagram (ERD) and its corresponding database (Microsoft Access) to be used by a product manufacturer to manage the orders it receives from its customers. Part A will be submitted as an MS WORD document. Make sure the ERD diagram shows the relation between entities clearly. Use the attached document to develop ERD for your database.

  • Each customer is identified uniquely by a customer id; include the first name, last name, and address for each customer. 
  • The company has several products that it stocks and for which customers place orders.
  • Each product has a unique id, unique name, unit price, and quantity on hand. At any time, a customer may place an order which will involve possibly many products.
  • For each product ordered the database must know the quantity ordered and the unit price at that point in time. If the customer does this through a phone call then an employee is involved in the call and will be responsible for the order from the company side.
  • Some orders are placed via the Internet. For each order, an order number is generated. For each order, the database must keep track of the order number, the date the order was placed, and the date by which the customer needs to receive the goods.

Part B: Consider the Orders database. This database has several one-to-many relationships.Part B will be submitted as an MS ACCESS file. Make sure one-to-many relationship runs between entities according to the ERD diagram in Part A Create appropriate forms to list:

  • A customer and the customer’s orders
  • Order and its detail lines
  • A product and the order detail lines where the product is referenced
  • A category and the products belonging to the category.

Use the information provided in the  Relational Databases and Microsoft Access Relational Databases and Microsoft Access – Alternative Formats document. Pages 118 and 185.Also, watch the video at the following link https://www.youtube.com/watch?v=57jBdK3YVJo 

You may assign the value o to the elements

You may assign the value o to the elements in your array to initialize the elements — whether you are creating the array or appending to the array. 0 will indicate an “empty” element. • Recall, in pre-allocation, we allocate more space in memory than what is requested by the user. rows and cols are the number of rows and columns the user has requested for in their 2D matrix. For example, if rows is 10 and cols is 10, and the user appends a value such that the number of rows increase by one, then you increase rows to 11. o reserved_rows and reserved_cols are the number of rows and columns that are reserved for the user i.e. this is the capacity of your 2D array. For example, currently, the rows and reserved_rows are 10 and cols and reserved_cols are 10. If the user appends a value such that the number of rows should increase, then you increase rows to 11 and double the size of reserved_rows to 20 along with the number of rows allocated in memory for your 2D array. Review preallocation for more details. These functions would work around the following user defined data structures (see toimgr.h): /* Structure type that encapsulates our image: 2D array. * the rows represent the indices of the main array, * the cols represent the indices of the arrays pointed to by the pointers * in the elements of the main array. */ typedef struct { uint8_t** pixels; unsigned int rows; unsigned int cols; unsigned int reserved_rows; unsigned int reserved_cols; } imgr_t; /* A type for returning status codes */ typedef enum { IMGR_OK, IMGR_BADCOL, IMGR_BADROW, IMGR_BADALLOC, IMGR EMPTY } imgr_result_t; HINTS • Don’t forget to keep adding appropriate function calls to your test driver as you go along. reserved_rows should always represent the amount of memory allocated to all the row arrays in imgr_t. This means that if you doubled the length of one row, you need to do the same for all other rows. reserved_cols should always represent the amount of memory allocated to the main col array. This means that if you double your original array, you also need to double the amount of rows you have in imgr_t. TESTING: you can test your program by running: $ make to # OR gcc -Werror -Wfatal-errors -g -o to to.c toimgr.c (see Makefile) $ ./to (see? Makefiles saves your gcc command so you don’t have to type this long thing over and over again, convenient huh :D) The following is a breakdown of the tasks. REMINDER: • write comments!! Test and debug your code! Prompt the user for what they should enter by printing messages with printf , e.g. “Enter an integer: “, and let the user know what the output is by printing a message, e.g. “Here is the result: Task 01.1 REQUIREMENT: write a function in toimgr.c with the following declaration: imgr_t* imgr_create(unsigned int rows, unsigned int cols); • INPUT: the number of rows and cols of the desired array. • OUTPUT: ingr_create() returns the POINTER to a new instance of data structure imgr_t. • BEHAVIOUR: if malloc() fails (i.e. returns NULL ), imgr_create() returns NULL . o The reserved_rows and reserved_cols should be initialized to be the same as rows and cols respectively. These fields represent the capacity or the available space in your 2D array. In the front end, the user should not have to deal with this. You use them in your functions to perform preallocation. Task 01.2 REQUIREMENT: write a function in toimgr.c with the following declaration: void imgr_destroy(imgr_t* im); • INPUT: the pointer of a imgr_t variable im. • BEHAVIOUR: ingr_destroy() should free() the memory allocated to im.

Advanced Topics in Computer Networking

 Topic: Computer Networking and Machine Learning 

4 pages 

 Introduction Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be

 Introduction This section introduces the reader to the structural content of your Research Report.  

 Problem statement

  In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences. 

  • Relevance and significance  This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature: 

 What is the potential for generalization of your results?  

What is the potential for original work?  

 Research Questions In this section you will define the research questions you expect to answer in your finding / results / conclusion sections. The research question(s) must be directly related to the problem statement and introduce the reader to their respective relationships. The answers to the research question(s) as elaborated in Chapter 3 need to be either qualitative or quantitative. In this section, the research questions should be numbered 

 Barriers and Issues

  In this section, identify how the problem is inherently difficult to solve. You should also show how the solution you propose are difficult to obtain (unlike a book report). You should show the study you propose is of adequate difficulty to warrant a successful grade assignment.  

Need Someone to create a (Narrated Presentation) for me from my given PowerPoint. Also, technical and lab Reports are provided for better understanding. (I need this to be done in 6 hours).

(Your job is to look at the given PowerPoint and create narrated presentation as your presenting from those PowerPoint.Also, added stuff during your narration from those technical and lab reports) You don’t have to speak or (Narrate) on those PowerPoint slides, just write it down below every slide instead. I will do the recording from your created notes. (Once again I need this back in  6 hours.)

Once again, I have completed my PowerPoint from the attached technical report and lab report. Now I just need someone to develop a narrated presentation for the members of the hospital board as well as the CIO and other managers from my given PowerPoint and those two technical and lab reports. My technical report provides an analysis of the infrastructure and the threats, based on the incident that first brought the organization’s security issues to my team’s attention. Technical and lab reports have to be the basis of a presentation that I will have to provide for the hospital board. The board will make decisions concerning what actions are taken and how much money will be allocated for cybersecurity. Therefore, I have created a slide deck that captures the salient points of My research, the results of the lab tests of the password-cracking tools, and the team’s proposals to tighten information security practices. You have to consider the suggestions in the table below to focus your efforts on this narrated presentation.

( Topics to Address in the Narrated Presentation

Keep the primary goals of your presentation in mind as you build your presentation to the board: be credible, be clear, and provide reasoned solution recommendations.

  1. Present your technical findings succinctly to a non-technical audience. Avoid acronyms or slang; opt for clear language and clear explanations.
  2. Provide a high-level summary of the infrastructure, the vulnerabilities that may have enabled the breach, and recommended actions. Explain what happened, the impact on the organization, and your proposed actions with rationale and costs.
  3. You are limited to 12 slides, excluding the cover and references slides. You will choose your best narrator to narrate the presentation for wider distribution. The format should be professional and free from typos or grammatical errors. This is the board’s impression of your team’s performance!)