mod 3

 

Module 03 Content

  1. Select a company you are familiar with or that you can readily find information on and do a risk assessment of that company.

    Be sure to provide specific results and actions to be taken.

    Your assignment should meet the following requirements:

    • 6-8 pages long, not including the cover page and reference page.
    • Conform to APA Style.
    • Support your answers with at least two current scholarly journal articles (not more than five years old). The Rasmussen Library is a great place to find resources.
    • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

Build a formalized list(s) (XLS) that will identify, categorize, weigh, and details of the many assets of a theoretical organization, describe the different types of vulnerability, existing controls, likelihood, consequence, and level of risk.

Build a formalized list(s) (XLS) that will identify, categorize, weigh, and details of the many assets of a theoretical organization, describe the different types of vulnerability, existing controls, likelihood, consequence, and level of risk. 

Intro To Networking: Assignment 2

  

Must be one full page. At least (2) APA reference. 100% original work. no plagiarism. Attached is the assignment instructions for better viewing.

· Congratulations, you have been chosen to build out a network for a new facility for your company, ACME, Inc.

· Office Schematic, (ATTACHED) each office is approximately a 10’x10′ space with 10′ ceilings. Building is roughly 125’x150′.

· Each office should contain two network ports minimum, one for Voice and one for Data. Room B will serve as your network closet.

· You will need to provide the following items in your submission:

o Estimated Purchases list (some examples below)

§ Switches

§ Cable

§ Port plates

§ Punch Boards

§ UPS and Power

§ Etc.

o A timeline of installation (*estimated)

o Chosen Typology (*estimated)

o Basic Network configuration (*estimated)

o Remember to justify your choices

o Your proposal should answer the questions above. If you have experience in networking, there are additional things you would “want”, but hold on those till later assignments, as the assignments build upon one another. *NOTE* This means you may reuse information from this assignment in future assignments as well, and I am granting you a waiver of not citing yourself in those assignments.

· Assignment must be in a Word document. The numbers are going to be rough estimates, that is understood. Pricing for purchases and labor can be based off of pricing from online resources.

· Required Format

· A timeline of installation (*estimated) ANSWER

· Chosen Typology (*estimated) ANSWER

· Basic Network configuration (*estimated) ANSWER

· Remember to justify your choices

Backup Strategy for protecting data loss

Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:

  • Daily full server backups with hourly incremental backups
  • Redundant array of independent disks (RAID) with periodic full backups
  • Replicated databases and folders on high-availability alternate servers

Answer the following question(s):

  1. Which backup strategy would you adopt? Why?

Project for secure E commerce

Part 1 need it by 30th September 5:00 PM CST and Part 2 can be given in 10 to 15 days.

Part 1:

To write a proposal, you need to attention to the following points: Generally, start with an overview or a background about the problem that you want to solve. But before writing a background, you need to understand the problem then try to find an answer or a solution for that.

Background: Security issues in eCommerce are causing a lot of damage to businesses such as financial and their reputation. the attacks on e-commerce website are gowning gradually for more that 30% of the total e-commerce websites from small to large businesses.So, the first step would be:  

Step-1: Finding a problem (what is the function of the writing the proposal)We need to have a problem then we can suggest various ways to answers it or suggest a method to resolve the issue. In this case, you need to answer, that means for example, we have a security problem on client-server architecture based on E-commerce structure, such as the security and privacy of online transactions, including

  • Denial of Service, (DoS) 
  • Unauthorized access,
  • Malicious Alterations to websites,
  • Theft of customer information, 
  • Damage to computer networks,
  • Creation of counterfeit sites. 

Step-2: Method and SolutionWe need to focus on the problem and find a solution or a way to answer to the problem, that means for example, my method is to design a secure client and server architecture, so we can create or use an exiting model then find a solution for the above problems and how to minimize the vulnerability of this structure. That means to find a solution for each part of the problem.for example, in terms of DoS, the attackers stop authorized users from accessing a website, resulting in reduced functioning of the website.How the attackers doing DoS, or what’s the type of DoS attacks? the DoS attacks are based on Network, Protocol, Storage, Processor,…. We can consider using a password management, password encryption techniques, using multi-factor authentication, using security questions, creating a uniquid accessing for each device.In case of secure network, all we want to stop or to access or make a requests to a service. then, we need to think about each DoS simulation and the method (for example in the network layer) that we want to work on it. 

Step-3: Result and Analysis and outcome expectationAt this stage, we want to know , and ? So I expect to see your proposal that can present a problem and be able to write the answer to above questions and above steps in any format. You can write or make a flowchart and/or demonstrate step-by-step work actions, also creating a job duties for each member (optional).Let me know if you have any other questions,

Part 2:

Development and execution of the above said project proposal in any preferred language. 

Paper and Powerpoint Eric

The paper has to be four to five pages.  Please do not write more than four to five pages.  I will stop reading on the fifth page and you will get graded off what I read.  For each page over five pages I will take off 10 points for each page.  The font size of the paper must be 12 in Time New Roman.   Please do not try to use a bigger font size to make your paper four or five pages.  Please double space the whole document.  If the paper not four to five pages, I will not read the paper and you will receive a zero on the project part.  Please use MLA formatting for reference page.  Please make sure you have a reference page and cite all sources.   Please have the paper in APA formatting.  Please google an example of APA formatting.  No plagiarism. Make sure you cite all your sources.  Paper Outline

  • History (Who created it, What year, Who uses it?  General History)
  • Definition
  • Advantages and Disadvantages
  • Interesting Facts
  • Example of where it is used.
  • What audience uses this product?
  • And many more information you think is important.
  • Conclusion

Note:  Please make sure you have lead in sentences

  • The research papers are to be written in your words.  Copy and paste is unacceptable unless it is cited.
  • Must include the following:
    • Cover page with title and your name
    • Introduction/overview of topic and issues to be discussed
    • Background, description, and/or history 
    • Advantages, Disadvantages, etc.
    • Summary (your comments or evaluation)
    • List of at least three references.
  • Library, Internet sites, Topics from Class

Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:• Be approximately four to six pages in length, not including the required cover page and reference page.• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.