Information Security Discussion

DUE IN 8 HRS!!!!!!

  

Please answer Each question, and cite any sources used. 

1. Review: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf

How does the the approach of information security implementation, security objective, and potential impact influence the effectiveness and cost management of the task?

2. Question A: 

Describe threats and vulnerabilities and how to address them using a business impact analysis. Scenario: You are pen-testing a financial corporation and have found threats and vulnerabilities and need to explain to the business owner what they are. You must also provide an explanation on how a BIA can help the business secure their confidentiality, Integrity and Availability. 

Question B:

Research a unique news story or article related to Information Technology. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

3. Question A: 

Describe physical and logical access controls when and where would you implement them. Pick a type of physical and logical control i.e. Firewall or CCTV and explain how they work and what type of controls they provide.

Question B: 

Research a unique news story or article related to Access controls. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

4. Question A: 

Describe the risk management process and explain each step in detail. 

Question B: 

Research a unique article on https://www.infosecurity-magazine.com/risk-management/. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

5. Question A: 

Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad.

Question B: 

Research a unique article on encryption techniques. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please fully cite you source.

6. Question A: 

Describe the OSI model and break down each layer, explaining what functions they perform. 

Question B:

Pick an article on https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

7. Question A: 

Pick two US compliance laws and provide a brief description. Then, provide your thoughts on if the laws need to be updated or changed in any way. Describe how these laws relate to the CIA triad. 

Question B: 

Research a unique article on compliance laws. Write a short summary of what you learned, and please also provide a link to the original article. The source is your choice; however, please fully cite your source.

8. What is the most practical and easily-applied lesson you learned after answering the previous questions? What was the hardest to grasp? Why?

Business Requirements

 Business Requirements
Due Week 4 and worth 110 points

This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Your company, which is a data-collection and analysis company that has been operating less than two (2) years, is seeking to create a repository for collected data beyond standard relational databases. Your ten (10) terabyte data warehouse is expected to grow by 20% each year. You are mindful of data warehousing best practices which will aid you immensely in your requirements gathering effort. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered.  

Section 1: Business Requirements Document

  1. Write a four to six (4-6) page original business requirements document for the project plan using the template provided. Note: The template is provided under the Additional Resources in the Student Center tab of the online course shell.
    • Describe the project including the following:
      • Describe and define the scope of the project.
      • Speculate as to how to control the scope.
      • Identify possible risks, constraints, and assumptions.
      • Describe the relationship and integration between systems and infrastructure. Note: Database and Data Warehousing, Analytics, Interfaces and Cloud Technology, and Infrastructure and Security should be considered.
      • Speculate upon potential outsourcing or offshoring needs.
      • Identify and justify the necessary resources including staffing that are necessary.
      • Define relevant terms that will be used throughout project.
    • Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 1: Project Plan Inception, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Disaster Recovery and Business Continuity

 

Disaster Recovery and Business Continuity Scenario:
 

Part 1:
You are the IT lead for a small IT company in Florida that sells computers. The company just received one of the most massive orders from a high school on a government base to ship 500 desktop computers located in VA. A natural disaster occurred (hurricane) has left your location without power; however, you do have cellular service, “most of the roads are not travelable.” Due to the power outage in your area, the U.S. postal service and others will not be delivering. The CEO needs this transaction to occur as this could lead to a long-lasting relationship and will keep the company above water.
 

  1. What procedures would you take to fulfill the order?
  2. Create a short guide to keep business going if the power is disrupted again in the future due to a hurricane.   

Part 2:
The power has been restored, and hackers are attempting to take advantage of the opportunity and crisis, therefore, using Kali Linux (Metasploit) to gain access to company servers. Your company has a Windows-based server, which Windows is prone to attacks. You assume that your company is maybe next in a Ransomware attack as other IT companies are falling victim within your local area.

Q-1 What steps will you take to ensure that you do not become a victim of ransomware?                                         

Guide Information:

  1. Must be in APA
  • Each question does not have a page length requirement, and you will be graded on creativity and the solution quality. In hindsight papers that are longer than 3 pages usually have better creativity and detailed solutions. This assignment is based on your ability to solve a problem that may be a continuous issue.
     
  • By submitting this paper, you agree:   
  • (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy
  • (2) that your institution may use your paper in accordance with your institution’s policies; and 
  • (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Last date of submmission is 06/30/2019 on Sunday 2:00 Afternoon.

Structured Assignment – Preventative Controls

Detection Controls vs. Prevention Controls – CompTIA Security+ SY0-301: 3.6
Duration: (6:06)
User: Professor Messer – Added: 6/9/11
 

 

Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system. Where feasible and cost effective, preventive methods are preferable to actions that may be necessary to recover the system after a disruption. Preventative controls include the identification of effective contingency planning preventive controls and maintaining these controls on an ongoing basis. Identify and incorporate a variety of preventive controls into your BCP. Some of the listed controls are the following:

  • Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls);
  • Gasoline- or diesel-powered generators to provide long-term backup power;
  • Air-conditioning systems with adequate excess capacity to prevent failure of certain components, such as a compressor;
  • Fire suppression systems;
  • Fire and smoke detectors;
  • Water sensors in the computer room ceiling and floor;
  • Heat-resistant and waterproof containers for backup media and vital non electronic records;
  • Emergency master system shutdown switch;
  • Offsite storage of backup media, non-electronic records, and system documentation;
  • Technical security controls, such as cryptographic key management; and
  • Frequent scheduled backups including where the backups are stored (onsite or offsite) and how often they are recirculated and moved to storage.

The rubric for this assignment can be viewed when clicking on the assignment link.

3-2 mat

 

Reply to the students response to the question in 150 words and provide 1 reference

question

 

  • Provide an example of how each of the following technologies can create a competitive advantage for a logistics network : RFID, cloud computing, and the Internet-of-Things. Which do you think will be the greatest advantage for your current employer or your favorite retailer? Support your answer with cost, service and risk issues.

student response

 RFID could create a competitive advantage by reducing the time needed to get a package from a warehouse to a customer. Instead of opening a box and scanning the individual barcode in and out, the RFID would automatically identify when a product is leaving or arriving. The reduction in package handling time reduces shipping times. A small company could use cloud computing to have a competitive advantage over other small companies in the same market place. For example, a small company could impellent software on a user by user basis instead of having to spend on an enterprise-wide system. The cost savings could allow the ability to sell products at a lower cost, leading to a low-cost competitive advantage. The internet of things could provide a competitive advantage by increasing communication of customer’s wants and company delivery. A company that sells chlorine for a pull could put a sensor in a customer’s pool. When the chemical is low, the company would automatically send a new shipment. I think the greatest advantage would be the internet of things. If a sensor could tell my company if the grass were getting enough water, it would save a lot of guessing. On average, the company spends 10 hours a week reviewing sprinkler systems. That $160 could be going toward a capital expenditure instead. However, the risk is that the crew would rely on the sensor and lose their skill. 

Discussion

1q)

 Describe the best practice to employ to mitigate malware effects on a machine.
 

It should be 250 words with APA format and wothout plagrism

2Q)

I Need 150 words response of this below post

 

Malware:

Malware defined as a software program which is specifically designed to damage the system and to do unwanted actions by the unwanted persons referred to as the malware. In short, it referred to as malicious software.  Hackers can gain access to the system and spread malware into your systems. It can be spread through online also, i.e., through downloads from the internet. Malware can also be spread through the USBs also. Malware is of different types namely virus, worms, Trojan horse, spyware are some of the common malware. Ransomware is a kind of malware which was designed to infect the system, and also it encrypts the user data. Malware can perform many activities such as it encodes or it can delete the sensible data from the computer alters and monitors the user activity on the system without their permission. 

The virus is known to be as the most usual malware and it executes itself and infects the other programs on the system. Trojan horse is also one of the most known virus once it is installed into the system it slowly slows the system internally. Here are some of the best practices to top attacking from the malware they are:

•    Most of the attacks have shifted to the browser and the plugins as it makes the browser more comfortable and it is difficult for the attackers to use adobe reader and other applications related to the adobe such as adobe flash player, Internet Explorer, etc., So, the chance of getting the malware into the system is rare. 

•    The other way to be safe from the malware attacks is to educate the users on malware attacks and how to prevent the attacks. The users must be instructed on the social engineering attacks too. Phishing is the most common attack the users must be trained to overcome the attacks.

•    Users must protect their machines from the attacks which were hidden in the PDF files by making them more secure. Use the more enhanced versions of the PDF files.

•    P2P is the simplest method for the distribution of the malware which usually hidden inside the data, which shared on the peer-peer networks. Users must create and enforce a non-P2P policy so that it includes the usage of the home of the organization machine. Users must accomplish the system at the desktop, i.e., by blocking the critical executable files of unwanted applications.  

Discussion

1 Q)

 

Product Idea and Search Engines/Electronic Marketing

After reviewing the assigned reading materials, complete the following activities:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

I need  300 word response.

2q)

I need 150 words reply of below post.

 

I prefer XOOM app which is the money transfer application. 

Xoom is the handy application which is most helpful for the users who mostly prefers to use the online banking service because of its amazing features. I would recommend this application to every user because it charges less for transferring the money through online. When compared to other net banking services like western union money transfer and money gram application this is the better application than those two applications. XOOM application allows transferring the funds almost about 30 different countries; it also includes Philippines and Italy and France and Germany. XOOM headquartered in San Francisco. This application used from any device such as mobile phone or tablet or PC. This application was used by the almost 5million users to send or transfer the money to their friends or the family etc.; This application can be used in the device by following these steps, they are as follows:

1.    Install the app on the machine and register into the device for free and the user should enter the details to log into the account. 

2.    After the completion of entering the details of the customer or maybe the user. The user should select his mode of transferring the funds to the recipients, as the method of transfer includes the recipient details such as the name and country and the amount and which type of transmission which may be either bank deposit or cash.

3.    The user must enter the details of the recipient such as the full name of the recipient along with his address and the bank account number.

4.    After the completion of the above three steps, the user should move forward to the payment information on that module the user can choose the mode of payment which may be by using cheque or by using the debit card or the credit card. 

5.    After completing all the steps, the user must ensure all the details are correct or not then after should proceed to transfer the amount.

In this application, the transferring charges wholly based on the country, i.e., to which country the user is sending the money and also depends on the payout currency. If the customer has an American account, then their transferring charges are quite low compared to other. The maximum transaction time is four days. If the customer uses the debit card or the credit card to transfer the money the transaction time is less, i.e., capital will move faster. 

Advantages of using the XOOM application:

•    Transfer charges are low when compared to the other bank accounts.  

•    This application makes use of the transactions to make money.

•    This app is very secure than compared to other forms as it uses 128-bit encryption process. This application protects the personal information of the customer and the recipient.

Electronically marketing the product service idea:

•    To publish the application, ads must be used and should be posted on the social media sites to know about this application, and the announcement should consist of benefits of the form.

•    The ads displayed on the YouTube, and if the user goes through the commercial and makes use of it, he would be knowing his personal experience and highlight that the charges of transferring the amount in this application are less than other forms.

•    One should personally use this app and promote to other persons this creates the trust and everyone tries to make this app and makes this service idea successful.

3Q) I need 150 word Reply of below post

 

Initially, the soul of all organizations is new products and services. It is vital for business development and benefits, putting resources into their improvement is not a discretionary addition. Parting on the advancement procedure is dangerous in any case. An extensive organization and association it needs. But the vast majority of them are web envelopes or poorly-assembled applications, many sites and applications are used for testing. But still, a natural interface that is anything but difficult to use and take after, as this application would focus not only on the quality of the substance that promises you to pass the exam. For your cruise test or driving test, this app will allow you to be quite organized. In a simple design to see, the app would have the official driver’s manual. For authentic testing, the training tests in the application would be as sensitive as the first test with the training test questions. To handle precarious demands, the app will have clever clues that will allow it (Langan, 2017, p.1).

1) The newest social networking game changer online is the Periscope. This is a cell phone application that allows individuals to stream feed recordings to the faithful, for people who are not recognizable. To improve the situation at this stage at an early stage in the event that it becomes as common as some “specialists” say, it may be useful to add a touch of time. Reflections: Post opportunities once a week where you are facilitating and running a Q & A session. Make up your own individual and answer it, in case you do not get q’s directly to Periscope. About Periscope as a test, I could test an idea. I will report my findings, In case I do. Thinking about ten thoughts is not always too embarrassing, I must be honest. Keeping in touch with them and syndicate them on LinkedIn, Facebook, email and here, sharing them takes a lot of time, in any case between recording recordings.

I share for each day to a thought that I share for every day, I may need to decrease the 10 thoughts. I would transmit a ton of significant value while also being less overwhelming for me and you, my speculation are that, despite everything. Your thoughts on this, I would like to know (webwise.ie, 2016, p.3).

2) To tweet a connection to their live stream, Periscope clients have the choice. To make their video open or separate to certain users, they may also choose. Which prohibits remarks, as Scopes can be LBB. For example, a mobile phone to communicate, despite the fact that the fraudster most often uses a portable gadget. For example, Wirecast or Teradek using Periscope Pro, it is also possible to communicate via Periscope using an expert fusion of vision. By typing on the portable screen as a type of appreciation, Periscope allows watchers to send “hearts” to the Telecaster. A client can take after is 8,000, as the largest number of clients. Together the scoper and the watchers of the degree can watcher pieces. Clients are added to a blocked state and started from the extension, at the point of obstruction by the scoper. They are clogged with the extension, in case a sufficient number of scopers would hinder a client. The client is banned, in case they get more than four squares from four unique extensions (Kavyon, 2017, p.2).

Spreadsheet Design and Basic Utilities

Be sure to download the companion resources using the link provided in the reading assignments.

Spreadsheet attached!

Imagine that you are currently enrolled in three CTU classes: UNIV104, IT254, and MATH102. In this project, you will create a spreadsheet averaging the list of CTU classes that you are currently enrolled in.

  1. You will begin by opining the spreadsheet IT254_week1IP_GradeAverage containing your grade percentages for each assignment in an Excel spreadsheet.
  2. Additionally, you will create a formula to summarize the total average for each class you are currently taking and each assignment.
  3. Finally, you will format your spreadsheet to make it visually appealing.

Instructions

Part 1: Opening the Spreadsheet

  1. Open the Excel workbook titled IT254_week1IP_GradeAverage and save the worksheet as “FirstInital_LastName_GradeAverage.xlsx.”

Part 2: Entering Data and Formulas Into the Spreadsheet

  1. On the Grade Average worksheet, select G7 and type “Average.” Use a formula to generate the average of the contents in Cells B8:F8 in cell G8. Use the fill handle to populate your results through G10. 
    • The syntax for the Excel Average function is the following: AVERAGE(argument1, [argument2],…).
    • Arguments can be numbers, named ranges, cell references that contain numbers, or arrays.
  2. Select Cell A12, and enter “Class Average.” Use a formula to generate the average of IP Assignment 1 in cell B12. Use the fill across handle to populate your results of averaging the other assignments to F12.
  3. On the Class Average worksheet, apply the Number format with zero decimal points to the range B12:F12.
  4. On the Class Average worksheet, change the page setup options so that the data is centered horizontally on the page.
  5. On the Class Average worksheet, create a header that will display your name in the center section of the header area. To preview your Class Average worksheet, click Print Preview. Return to Normal view to continue working on the document.
  6. On the Class Average worksheet, create a footer that will display the Instructor’s name in the center section.
  7. Save the workbook. Close the workbook, and then exit Excel. Submit your Excel spreadsheet.

IS320-3

DUE IN 8 HRS NO PLAGIARISM!!!!!!!!

 

SQL Q&A and Hands-On

Please include the questions with your answers. Answer in complete sentences where applicable.

  1. Does all standard SQL work in Microsoft Access? Explain.
  2. List and describe the four basic SQL data types.
  3. List and describe five SQL built-in functions.The best way to learn SQL is by actually using it. In the following problems, we will use SQL to create, populate, and query a small database. Use SQL in Microsoft Access to complete the problems. Save all queries as instructed in the problem. Submit the database file (save as Pet_Database.accdb and KEEP THIS FILE for use with a later assignment) with all your queries in addition to the Word document containing the questions and answers for numbers 1, 2, and 3.
    Use the following information for problems 4 – 10:
    Tables:
    PET_OWNER (OwnerID, OwnerLastName, OwnerFirstName, OwnerPhone, OwnerEmail)
    PET (PetID, PetName, PetType, PetBreed, PetDOB, OwnerID)
    **Note: OwnerID is italicized to indicate the Foreign Key**
    Data:
    figure 1
  4. Write an SQL CREATE TABLE statement to create the PET_OWNER table, with OwnerID as a surrogate key. Save as CreatePetOwner.
  5. Write a set of SQL INSERT statements to populate the PET_OWNER table with the data given above. Save as PopulatePetOwner.
  6. Write an SQL CREATE TABLE statement to create the PET table, with PetID as a surrogate key. Save as CreatePet.
  7. Write a set of SQL INSERT statements to populate the PET table with the data given above. Save as PopulatePet.
  8. Write an SQL statement to display the breed and type of all pets. Save as AllBreeds.
  9. Write an SQL statement to display the breed, and DOB of all pets having the type Cat. Save as Cats.
  10. Write an SQL statement to display the first name, last name, and email of all owners, sorted in alphabetical order by last name. Save as AlphaOwners.
  11. Write an SQL statement to display all the owners’ names, with the first name in all lower case and the last name in all upper case. Save as UpperLower.
  12. Write an SQL statement to display the total number of pets. Save as TotalPets.
  13. Write an SQL statement to display the last name, first name and email of any owner who has a NULL value for OwnerPhone. (Note: there should be one owner who has a NULL value for OwnerPhone.) Save as PhoneNull.
  14. Write an SQL statement to count the number of distinct breeds. Save as NumberOfBreeds.
  15. Write an SQL statement to display the names of all the dogs. Save as Dogs.

3-1 pet

  

Question 

· What is your company’s Inventory Carrying Cost rate? (Ask your Director of Logistics or the CFO.  If that’s not possible, provide an estimation using all 4 categories presented in class.)  Do you think it’s an accurate computation, a good estimate or a not-even-close estimate?  Recommend one action that should be taken to improve the accuracy of this number.

Reply to the students response in 150 words and provide 1 reference

Students response

Information received from my company is that our Inventory carrying cost is about 22%. In discussion with the VP, he indicated great confidence with the number as we utilize a global ERP system that integrates all information to determine that figure. 

A company’s inventory carrying cost can be described as the computation consisting of all the monetary resources in a company divided by the average annual proceeds. The monetary resources must include taxes and storage space of the inventory. The importance of inventory carrying cost is to determine how low or high the supply value is. This further determines the profitability of a company on an annual basis. Although this computation is not always reliable, a business or organization can ascertain that inventory management is part of company policies to increase sales and profitability.

Last in First Out (LIFO) and First in, First out (FIFO) are two types of inventory management. According to Stickney et al. (2009), companies in the US are always faced with decisions regarding which type of inventory management to use since both have advantages and disadvantages. However, LIFO is better because it computes tax in financial reports. Using either of these methods may provide a company with the required results, but it does not determine whether the inventory-carrying cost is accurate.

A good strategy targeted at mitigating this problem would be to keep the inventory levels as balanced as possible. An article titled, “How to Improve Inventory Carrying Costs and Management in the Supply Chain” states that control systems such as the computation of regular safety stock can also provide precise and reliable results. Another approach would be to have minimal inventory costs to pay off any pending loans and debts. This way, the company’s inventory and profit will increase. In essence, keeping company procedures and processes as simple as possible could also increase the accuracy of inventory cost estimation. As a consequence, this has the potential of also decreasing employee turnover and upsurging work motivation.

In conclusion, the inventory carrying cost provides a wide scope of what goes on in a business or company. For this reason, effective communication among employees and leaders should be paramount. Every worker should identify the needs of the company and deliver quality services. It is important to note that every business must also have a well-developed computer system to calculate the company’s inventory carrying the cost.