d6 reply

The formation of computer security information response teams by businesses need immediate action and it is highly suggested approach for dealing with the issues around the system vulnerabilities and incident. There are many ways to creating a team by assembling internal staff members for various roles and outsourcing the team members to be call for CSIRT team. However, the common problem for many companies that follow with the theoretical worst-case incident that train a team based on the sort of incident happen. Another way on focusing on CSIRT team is to treat an entire company as an CSIRT team and train and educate all the staff and employees on how to handle emergency. To maximize the viability of the team few members can respond in a short amount of the time.

Educating team members on the time of emergency events and how to respond accordingly are the main components of the building an effective and successful CSIRT team. To put the CSIRT team in the operation we need a CSIRT team deploy and handle the situations, implement plan to get started moment notice. There are the most crucial steps and overall efforts to create CSIRT team. In the creation of CSIRT team education and planning stages can take months to gather resources and create documentation on the possible incident situations. It also includes how to educate their staff and team on such efforts. During the time of assembling of CSIRT team, they require to plan and prepare them for variety of possible disaster situations. Due to this they can become more effective in the time of disaster comes.

References:

Husmann, D. (2004). Global Information Assurance Certification Paper. End Users: Assets or Liabilities When Handling a Cyber Incident?1(4b), 1-20. Retrieved March 20, 2019, from: https://www.giac.org/paper/gsec/3783/users-assets-liabilities-handling-cyber-incident/106090.

Creating and Managing Computer Security Incident Response Teams. (1988, November). Retrieved March 20, 2019, from: https://www.apricot.net/apricot2004/doc/cd_content/23rd%20February%202004/06%20-%20MTF%20-%20Creating%20and%20Managing%20CSIRTS%20-%20Mark%20Zajicek/Creating-and-Managing-CSIRTs-notes.pdf

REPLY TO CLASSMATE’S POST IN 4 HOURS

When you started your small business, you managed all business processes on your own. Now, your business is expanding and you have hired employees to help. Would you consider implementing an enterprise resource planning (ERP) system, or would you continue to use applications, such as Microsoft Office (e.g., Word, Excel, Access), to manage your business processes? Be sure to explain the reasons behind your choice.

PLEASE EXPLAIN WHY YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS? (A MININUM OF 150 WORDS)

                                                     CLASSMATE’S POST

I would use Microsoft office to manage businesses processes as long as possible. However, I would consider implementing an ERP system if my business was steadily expanding. ERP systems save a lot of time. Plus, the employees doing things manually with Microsoft office etc, could be doing other things. One of the most important things to me is being efficient. An ERP solution eliminates repetitive processes and reduces the need to manually enter information. The ERP system will also streamline business processes and make it easier and more efficient for companies to collect data, no matter what department that they work in. Stored data is also really important so with an ERP system, you would not need to worry about data security when you have an enterprise resource planning solution in place. The system would improve accuracy, consistency, and security of data, all through built-in resources and firewalls. Lastly, integration is also very helpful. Instead of having data spread across all different databases, integration with an ERP system will have all data and information in one place. 

REPLY TO CLASSMATE’S RESPONSE

                             PLEASE NUMBER EACH QUESTION

Question 1

How can outsourcing be helpful in your personal life? What outsourcing do you do in your personal life? How do you manage the results of personal outsourcing?

PLEASE EXPLAIN WHY YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS? (A MINIMUM OF 100 WORDS)

                                  CLASSMATE’S RESPONSE

Outsourcing can be very helpful in your personal life. It can free up time, that for most is already scarce to do other things. Currently in my personal life I use outsourcing for cooking, laundry and yard work. When I do not feel like cooking, I will go to a meal prep company and have my meals prepped for the week. The sane with laundry, sometimes it becomes too much, so I send them to a wash and fold company. In this Texas heat, I refuse to do yard work, and to stay compliant with HOA rules, I have someone come and do it for me. Cost is one major factor that drives people when deciding to outsource, but there are advantages that in my personal opinion override the cost factor. Outsourcing frees up my time and is less stressful.

Question 2

Identify a skill or knowledge that you learned in this course, and explain how you can apply it to increase success in your career in a real-world scenario. 

PLEASE EXPLAIN WHY YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS? (A MINIMUM OF 100 WORDS)

                                       CLASSMATE’S RESPONSE

The lesson in Unit IV about the ERP systems really stuck with me, and I think that this knowledge will be applicable to my own personal success in personal life and business/career in a real world scenario, because it talked about a specific skill that business owners need to weigh out. When I get to the point that I will have employees and different departments, I will have to decide on many things, and ERP system means that I can rely on it to integrate data and make the work flow smoothly through the different departments. I would like to think that touching up on this knowledge will help me when I get to that point of growth in my own business. 

Cryptography

 

A Brief History of Cryptography

In this essay, discuss what you have learned on cryptography and how this method to secure information has changed over the decades. Provide a few examples of how cryptography actually secures data. In addition to the video, choose one other scholarly reference to support your discussion.

Requirements:

  • Submit in a Word document.
  • Include cover page
  • Must be a minimum of two pages (excluding references and cover page)
  • Appropriate APA format is required.
  • Properly cite and reference any borrowed resource(s)

Rubric

Content

Proficient
81 – 100 points

Acceptable
61 – 80 points

Below Standard
0 – 60 points

Total

Content is relevant, well-selected, and demonstrates good understanding of technologies that are required for this course.

Content is somewhat relevant, well-selected, and demonstrates a general understanding of technologies that are required for this course.

Content is not relevant, not well-selected, and does not demonstrate a general understanding of technologies that are required for this course.

Grammar and Format

Proficient
81 – 100 points

Acceptable
61 – 80 points

Below Standard
0 – 60 points

Content demonstrates exceptional spelling and grammar. Content flows well and to enhance communication. Few or no errors that they do not impede overall readability.

Content demonstrates acceptable spelling and grammar. Content flows well and to enhance communication. Few or no errors that they do not impede overall readability.

Content does not demonstrate acceptable spelling and grammar. Content does not flow well and does not enhance communication. Multiple errors impede overall readability.

Practical Connection Assignment

 

  1. Here at UC, it is our priority to provide students with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will be expected to demonstrate how this course research has connected and put into practice knowledge you have acquired within your career and/or area of interest.
    Assignment:
    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

    Requirements:
    Provide a 500 word (or 2 pages double spaced) minimum reflection.
    Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
    Share a personal connection that identifies specific knowledge and theories from this course.
    Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
    You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

contemporary issues in homeland security

1)      Select one of the four primary categories of terrorist hazards (Chemical, Biological, Radiological/Nuclear, Explosives). Provide a history of its use as a weapon of mass destruction (WMD); describe how it is made and dispersed, signs and symptoms of its use; circumstance where it would be the weapon of choice; actions the public can take to prepare for such an attack; Cite an incident where the hazard was recently used.

Paper Submission Requirements:

·         Your response should be 3-5 pages in length (double spaced).

·         Paper must include a “reference page” not included in the 3-5-page minimum.

·         Use APA format.

 

Recourses

http://strategicstudiesinstitute.army.mil/pubs/parameters/Articles/04spring/morgan.pdf

Textbook Reading: Introduction to Homeland Security, chapters 3, 8, and 9

 

2)       Experts believe that many of today’s new terrorist groups are more concerned with continuity rather than change, religious vs. political change. For example, they no longer want a seat at the table, they would rather blow up the table! Do you agree with philosophy? Cite recent examples to support your position.Experts believe that many of today’s new terrorist groups are more concerned with continuity rather than change, religious vs. political change. For example, they no longer want a seat at the table, they would rather blow up the table! Do you agree with philosophy? Cite recent examples to support your position. (Answer should be 300 to 400 words)

 

3)      When it comes to CIKR protection, public and private security concerns often differ. Do you agree or disagree with this statement? What are the differences? Please support your opinion with real-world examples.When it comes to CIKR protection, public and private security concerns often differ. Do you agree or disagree with this statement? What are the differences? Please support your opinion with real-world examples.

 

(Answer should be 300 to 400 words)

Assignment

 

  1. Due DateMonday, September 10, 20183:00 AMPoints Possible50
  2. Having a clear vision of what we are trying to achieve before we take action is a key factor in reaching and accomplishing any goals we set. Do you have a mental image or a vision of who you will be in your career or in your future? Articulating or setting goals for yourself and your career is the first step in helping you eventually reaching those goals. This course is not only to allow the opportunity  for you to apply essential professional applications to your respective academic coursework, but we also want to provide you with resources to be a successful employee and meet your career goals.
    For this assignment you will complete a 500 word written assignment discussing your current career path and employment goals. Below you will find the questions to be answered for this assignment.

    1. If you are currently employed is it in your desired career? If you are not currently working what is your designed career?
    2. What has been your career path up until now?
    3. What do you like most about your job? Explain. If you are not currently employed, what has been your favorite job that you’ve had in the past?  Explain.
    4. If absolutely no obstacles stood in the way of your achieving it, what would you most like to attain in your career?
    5. Where would you like to be in your career in 5 years? In 10 years? In 15 years?
  3. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Week-5 Assignments

 

  1. Scenario:
    You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

    1. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email 
    2. Trace the IP   try to get a physical address if not the city and state will work (starting point)
    3. Share any other information you find that may be relevant to law enforcement
    4. Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
      Mac
      Outlook (Windows)

      Week 5 – trace IP Physical Location.rtf

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Dadeline of this assignments is 06/08/2019.

2-1

 

I currently work as the Accounting Manager of a four star hotel in my town. One opportunity for data analysis in a hotel is the analysis of guest reviews and survey responses. While at my current job, past hotel jobs, and I am sure most other hotels, reviews are always read and responded to, I think much more analysis of reviews would be beneficial. If I were the director of research and analytics I would begin by collecting all of the data regarding our hotel reviews. This would included our internal surveys, and social media reviews that are public. We would want to read all of the reviews and begin to create a data sheet that included the date of stay, the room type, the rate, the problem the guest had and/or the positive feedback. From this data we would want to analyze any trends that occur. Sorting the data by problem type would show if the problem occurs over time or on a specific date range — maybe it only occurs on Thursdays, we can then see which employees always work on Thursdays. This type of detailed analysis would allow the hotel to dig deeper into the problems that cause them to loose future guests and revenue, and begin fixing the issues so that the problems don’t continue to happen. 

 

I currently work as the Accounting Manager of a four star hotel in my town. One opportunity for data analysis in a hotel is the analysis of guest reviews and survey responses. While at my current job, past hotel jobs, and I am sure most other hotels, reviews are always read and responded to, I think much more analysis of reviews would be beneficial. If I were the director of research and analytics I would begin by collecting all of the data regarding our hotel reviews. This would included our internal surveys, and social media reviews that are public. We would want to read all of the reviews and begin to create a data sheet that included the date of stay, the room type, the rate, the problem the guest had and/or the positive feedback. From this data we would want to analyze any trends that occur. Sorting the data by problem type would show if the problem occurs over time or on a specific date range — maybe it only occurs on Thursdays, we can then see which employees always work on Thursdays. This type of detailed analysis would allow the hotel to dig deeper into the problems that cause them to loose future guests and revenue, and begin fixing the issues so that the problems don’t continue to happen. 

Week 1 Exercise Please read and review the following article and video: Article: Read CREST “Cyber Security Incident Response Guide” Video(s): 2014 Cyber Security Session 24 – Cyber Security Incident Response Watch Video 2014 Cyber Security Session 24

  • Please read and review the following article and video:

    Watch Video

    2014 Cyber Security Session 24 – Cyber Security Incident Response
    Duration: (39:46)
    User: n/a – Added: 10/11/14
     

    Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, thinkabout the following Lockheed-Martin’s Cyber Kill Chain:

    • Reconnaissance
    • Weaponization
    • Delivery
    • Exploitation
    • Installation
    • Command and Control (C2)
    • Actions on Objectives

    Your assignment is as follows:

    1. Define and discuss the three steps to Cyber Security Incident Response.
    2. Research recent cyber breaches and discuss the cyber “kill” chain for one of the breaches.
    3. For the company involved in step 2, make at least three (3) recommendations to senior leadership that could avoid breaches in the future.

    Feel free to use the Cyber Threat Intelligence and Incident Response Report template for your assignment.  Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment link.