security architecture assignment

 

For this assignment, I would like you to dive into the STRIDE model and apply it to your home internet connection.  Using your home internet connection example, explain all of the elements of STRIDE that apply in order to identify potential vulnerabilities and threats that you should be concerned about.

For example, the S of STRIDE is spoofing.  How could spoofing be used to compromise your home internet connection?  Use the same example for the rest of the STRIDE model.

Your written assignment should be 2-3 pages in length.  Follow APA format.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Project Demonstration and Detailed Status Update

Task Networking / Systems Administration StudentsTaskBased on your specific project charter and management plan you will have an agreement with your client about the functionality available and demonstrable at this point in the project. Your project will be assessed on having achieved these agreed goals. You will also be assessed on the quality of visual and verbal communication in your presentation including a clear statement regarding

 

For students completing the Globex project, functionality that must be demonstrated at this point is:

 

Wagga – demonstrate logs can be securely collected / retrieved for a 2 hour period (obviously you will have to pause your recording while the actual collection occurs, this is fine) from all network devices on the local site and at least one remote site

 

Albury – demonstrate that an end user at another physical site is able to download a virus test file from http://www.eicar.org/download/eicar.com and that this action results in a secure alert being generated by the IDS

 

Griffith – demonstrate that at least one other server from an external site can be taken offline (simulating a disaster) and fully recovered in a secure manner to an alternative site meeting RTO/RPO objectives.

 

Cloud – demonstrate an encrypted VoIP conversation can occur between two sites using soft phones.

 Submission instructions: record a short screencast or video and upload to Youtube or Vimeo. You may submit as a group (with a single 10-12 minute recording) or individually (2-3 minute recording). All students will be marked individually. A link to your recording should be submitted to EASTS. Business Analysis / IT Management Students Word count: 2000 words. This does not include MS Project file, tables, calculations, references or appendices. TaskThere are four elements to this assessment. 1.      You are to provide a detailed status update report for the project’s budget and schedule to demonstrate the monitoring and controlling of the project. Utilising MS Project, you must demonstrate actual vs planned work and any variances, as well as a plan to ensure the remainder of the project meets agreed milestones. 2.      Calculate the project’s earned value (see reading – Kloppenborg ) and discuss how this affects your project. 3.      Develop a form to capture the lessons learned from this project, to be completed by all project team members 4.      Globex is looking to outsource some software development work and are seeking advice on the most appropriate type of contract to use in terms of risk to the company. In 1000 words compare and contrast available contract types and recommend the most suitable for Globex to use in this scenario. 

 Rationale This assessment item is designed to assess your progress towards the following learning outcomes and writing skills

Networking / Systems Administration Students

Learning outcomes:
Be able to implement standard testing parameters and evaluate system performance.

 

Business Analysis / IT Management Students

Learning outcomes:
Be able to apply project management tools to assist in timely completion of milestones.Marking criteria  Networking / Systems Administration Students TaskHDDICRPSFLDemonstration of completion of the agreed functionality implementation and testing(25 Marks)All agreed functions demonstrated. No caveats.All agreed functions demonstrated, some with minor caveats.

 

e.g. not shown to be secure /encrypted where required.All agreed functions demonstrated. Some with major caveats.

 

e.g. only worked on LAN. Doesn’t work reliably.Most agreed functions demonstrated, some with caveats.

 

e.g. Only worked on LAN, not secure yetMost agreed functions aren’t demonstrated. Verbal communication

(5 marks) Excellent use of allocated time to verbally communicate status of agreed functionality including any caveats. Clearly communicates status of agreed functionality including any caveats with minimal inclusion of irrelevant information.Clearly communicates status of agreed functionality.Clearly communicates status of agreed functionality.No verbal communication

Inaccurate or inconsistent information presented.

Presentation exceeds length Visual communication

(5 marks) Visual communication enhances audience understanding, complements verbal communication with clear display at start and finish conveying key points (i.e. level of functionality that has been met including caveats)Visual communication enhances audience understanding and complements verbal communication.Visual communication enhances audience understanding of presentation but is not always relevant to verbal communication.Very basic visual communication used to convey critical informationNo use of visual aids

Inaccurate or inconsistent information presented.

Presentation exceeds length   Business Analysis / IT Management Students
 Task Networking / Systems Administration StudentsTaskBased on your specific project charter and management plan you will have an agreement with your client about the functionality available and demonstrable at this point in the project. Your project will be assessed on having achieved these agreed goals. You will also be assessed on the quality of visual and verbal communication in your presentation including a clear statement regarding

 

For students completing the Globex project, functionality that must be demonstrated at this point is:

 

Wagga – demonstrate logs can be securely collected / retrieved for a 2 hour period (obviously you will have to pause your recording while the actual collection occurs, this is fine) from all network devices on the local site and at least one remote site

 

Albury – demonstrate that an end user at another physical site is able to download a virus test file from http://www.eicar.org/download/eicar.com and that this action results in a secure alert being generated by the IDS

 

Griffith – demonstrate that at least one other server from an external site can be taken offline (simulating a disaster) and fully recovered in a secure manner to an alternative site meeting RTO/RPO objectives.

 

Cloud – demonstrate an encrypted VoIP conversation can occur between two sites using soft phones.

 Submission instructions: record a short screencast or video and upload to Youtube or Vimeo. You may submit as a group (with a single 10-12 minute recording) or individually (2-3 minute recording). All students will be marked individually. A link to your recording should be submitted to EASTS. Business Analysis / IT Management Students Word count: 2000 words. This does not include MS Project file, tables, calculations, references or appendices. TaskThere are four elements to this assessment. 1.      You are to provide a detailed status update report for the project’s budget and schedule to demonstrate the monitoring and controlling of the project. Utilising MS Project, you must demonstrate actual vs planned work and any variances, as well as a plan to ensure the remainder of the project meets agreed milestones. 2.      Calculate the project’s earned value (see reading – Kloppenborg ) and discuss how this affects your project. 3.      Develop a form to capture the lessons learned from this project, to be completed by all project team members 4.      Globex is looking to outsource some software development work and are seeking advice on the most appropriate type of contract to use in terms of risk to the company. In 1000 words compare and contrast available contract types and recommend the most suitable for Globex to use in this scenario. 

 Rationale This assessment item is designed to assess your progress towards the following learning outcomes and writing skills

Networking / Systems Administration Students

Learning outcomes:
Be able to implement standard testing parameters and evaluate system performance.

 

Business Analysis / IT Management Students

Learning outcomes:
Be able to apply project management tools to assist in timely completion of milestones.Marking criteria  Networking / Systems Administration Students TaskHDDICRPSFLDemonstration of completion of the agreed functionality implementation and testing(25 Marks)All agreed functions demonstrated. No caveats.All agreed functions demonstrated, some with minor caveats.

 

e.g. not shown to be secure /encrypted where required.All agreed functions demonstrated. Some with major caveats.

 

e.g. only worked on LAN. Doesn’t work reliably.Most agreed functions demonstrated, some with caveats.

 

e.g. Only worked on LAN, not secure yetMost agreed functions aren’t demonstrated. Verbal communication

(5 marks) Excellent use of allocated time to verbally communicate status of agreed functionality including any caveats. Clearly communicates status of agreed functionality including any caveats with minimal inclusion of irrelevant information.Clearly communicates status of agreed functionality.Clearly communicates status of agreed functionality.No verbal communication

Inaccurate or inconsistent information presented.

Presentation exceeds length Visual communication

(5 marks) Visual communication enhances audience understanding, complements verbal communication with clear display at start and finish conveying key points (i.e. level of functionality that has been met including caveats)Visual communication enhances audience understanding and complements verbal communication.Visual communication enhances audience understanding of presentation but is not always relevant to verbal communication.Very basic visual communication used to convey critical informationNo use of visual aids

Inaccurate or inconsistent information presented.

Presentation exceeds length   Business Analysis / IT Management Students
 CriteriaHDDICRPSFLAbility to apply the skills and tools needed in project management(20 marks)Demonstrated high level project management skills, integrating and applying project management tools in meaningful and purposeful ways towards completion of project tasks.Demonstrated competent management skills, applying project management tools in meaningful and purposeful ways towards completion of project tasks.Demonstrates appropriate management skills with some evidence of applying management tools in the completion of project tasks.Project management skills need improvement; use of appropriate project management tools is minimal and not directly linked to completion of project tasks.No evidence of project management skills and use of tools.Demonstration of logical flow arguments and issues in the reports(10 marks)Well organised and demonstrates logical sequencing and structure of arguments. The status update is introduced and the direction of the project is fully explained.Well organised and demonstrates quite logical sequencing or structure of argument. Readers are aware of overall project status.Well organised, but demonstrates illogical sequencing or lack of arguments in some places. Readers are aware of overall project status.Organisation, sequencing or structure of arguments need refinement. The status update is briefly discussed but lack of clarity due to omission of some explanations.No logical explanation of project status provided.Demonstration of critical thinking and well investigated direction and development of project status elements(30 marks)Elements of the status update report illustrates detailed findings and conclusions are reached from the evidence gathered. All facts and information presented was accurate and opinions informative. Elements of the status update report illustrate a good coverage of findings and conclusions with some evidence offered. Most facts and information presented was accurate and opinions informative.There is some indication of conclusion from the evidence and findings offered. Some facts and information presented was accurate and some opinions were useful to consider.No findings or formal conclusions are made clear from the evidence offered. Few facts and information presented was accurate and there is little or no opinions expressed.No findings, evidence or conclusions offered.Length, format and writing style(10 marks)Adheres to word length criteria, correct use of report format and language; all referencing correct.Exceeded word length criteria, appropriate reporting format and language used; all referencing correct.Exceeded word length criteria, reporting format and language mostly correct; some referencing used.Exceeded word length criteria, requires reporting language refinement; incorrect or no referencing used.Did not follow length, format and writing style criteria.

 Presentation Please see Appendix 1 for presentation guidelines.

 Requirements

All assessments must be referenced using the APA style.  Please refer to the guidelines in the following linkhttp://student.csu.edu.au/study/referencing-at-csuCriteriaHDDICRPSFLAbility to apply the skills and tools needed in project management(20 marks)Demonstrated high level project management skills, integrating and applying project management tools in meaningful and purposeful ways towards completion of project tasks.Demonstrated competent management skills, applying project management tools in meaningful and purposeful ways towards completion of project tasks.Demonstrates appropriate management skills with some evidence of applying management tools in the completion of project tasks.Project management skills need improvement; use of appropriate project management tools is minimal and not directly linked to completion of project tasks.No evidence of project management skills and use of tools.Demonstration of logical flow arguments and issues in the reports(10 marks)Well organised and demonstrates logical sequencing and structure of arguments. The status update is introduced and the direction of the project is fully explained.Well organised and demonstrates quite logical sequencing or structure of argument. Readers are aware of overall project status.Well organised, but demonstrates illogical sequencing or lack of arguments in some places. Readers are aware of overall project status.Organisation, sequencing or structure of arguments need refinement. The status update is briefly discussed but lack of clarity due to omission of some explanations.No logical explanation of project status provided.Demonstration of critical thinking and well investigated direction and development of project status elements(30 marks)Elements of the status update report illustrates detailed findings and conclusions are reached from the evidence gathered. All facts and information presented was accurate and opinions informative. Elements of the status update report illustrate a good coverage of findings and conclusions with some evidence offered. Most facts and information presented was accurate and opinions informative.There is some indication of conclusion from the evidence and findings offered. Some facts and information presented was accurate and some opinions were useful to consider.No findings or formal conclusions are made clear from the evidence offered. Few facts and information presented was accurate and there is little or no opinions expressed.No findings, evidence or conclusions offered.Length, format and writing style(10 marks)Adheres to word length criteria, correct use of report format and language; all referencing correct.Exceeded word length criteria, appropriate reporting format and language used; all referencing correct.Exceeded word length criteria, reporting format and language mostly correct; some referencing used.Exceeded word length criteria, requires reporting language refinement; incorrect or no referencing used.Did not follow length, format and writing style criteria.

 Presentation Please see Appendix 1 for presentation guidelines.

 Requirements

All assessments must be referenced using the APA style.  Please refer to the guidelines in the following linkhttp://student.csu.edu.au/study/referencing-at-csu

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Roles in cyber domain

I am trying to figure out how to set up this paper for class. Should I write our a paper first then create the chart and submit them both or should I do everything on one paper?

 The instructions are below :

 

The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning:

Part A:

Create 1- to 1.5-page summary including the following: The number of additional employees necessary to rollout and support an IDS desktop solution An explanation as to how individuals work with the existing desktop support and malware teams The job title for those who normally perform rollout and support functions for the IDS desktop solution An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution

Part B:

Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following: The job titles provided in your summary and how they fit in with the existing cybersecurity team A list of the industry certifications the new IDS rollout-and-support-function employees should have or can work  toward

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

CIS 126 create a text-based

create a text-based, menu-driven program that allows the user to choose whether to add, subtract, multiply or divide two numbers. The program should then input two double values from the use, perform the appropriate calculation, and display the result. Use an array of function pointers in which each pointer represents a function that returns void and receives two double parameters. The corresponding functions should each display messages indicating which calculation was performed, the values of the parameters, and the result of the calculation.

Requirements:

Use proper naming convention, spacing and indentation in your source code
Your code should be well commented, with proper naming conventions and spacing
Utilization of the following structures: arrays, functions, and pointers.
Include flowcharts with your project. The flowcharts must match your code. Note each function (module) should have its own specific flowchart.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Module 4

Although you are not required to submit an actual dashboard for this project, it is worthwhile to develop a document that could guide you in designing a dashboard.

To begin this project read the following two presentations (along with any additional research you may need): Dashboard Design Best Practices The Nine Principles of Killer Dashboards

In an actual dashboard design project, you would meet with management stakeholders to define and agree on the metrics that you wish to track with, but for this exercise, you will need to define those metrics based on your familiarity with the Adventure Works business case. Using these principles and your knowledge of Adventure Works and their business processes, you will now draw up a design document for a business dashboard for the company. Remember to address these elements in your dashboard design: Include the types and sources of data you will be using and create at least one diagram showing the dashboard layout. (NOTE: Your dashboard may have different screens so feel free to add additional diagrams as needed.) Make sure each component in a dashboard represents one report. Your dashboard should only include data that are relevant to the specific business goal(s) it was designed to support. Your dashboard should have at least three columns with up to 20 total components. Make sure you dashboard is organized to allow the user to ‘drill down’ and access lower level, more detailed data. Your dashboard should be clearly formatted, professional looking and easy to interpret.

Adventure Works –  https://docs.microsoft.com/en-us/previous-versions/sql/sql-server-2008/ms124825(v=sql.100) 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

VDI

Discussion on how virtualizing the desktop and now backend infrastructure are complementary and related.

o Use additional sources of information but also describe the concept in layman terms.

o Use visuals.

2 pages with atleast 6 reference. APA format

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

discussion 1

 Chapter 17 introduced some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational and Analytical Center, explain how you would use data available to you to prepare a report for the Governor for the State Program “Combating Proliferation of Drugs.” Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Individual project

 

Fennelly (2017) stated that the key to risk management is to knowingly determine an acceptable level, rather than unwittingly accepting it. In security risk management, these decisions are based on the consequence of loss of the asset, the defined threat, and the risk tolerance of the enterprise.

 

For this assignment, you will research and expound on the following questions..

What is risk management?

What is Vulnerability assessment?

What is the relationship between risk management and vulnerability assessment?

What is the difference between security and safety?

Assignment Requirements

Your reading assignment for this week is chapter two of the Fennelly text. Please write a minimum of two paragraphs on each question. Every paragraph must be indented, have at least four complete sentences, subtitled, and a different in-text citation. Do not continuously cite at the end of each paragraph. You are required to write and cite according to APA 6th Edition format.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Data auditing – SOX compliance

 

Discuss SOX in 500 words or more. How do logging and separation of duties help comply with SOX? How might database auditing and monitoring be utilized in SOX compliance? How can a dba use  automation to comply with SOX frameworks?

Cite your sources in-line and at the end. Provide a URL for your citations.  Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Be aware of your Safeassign score. Over 20 is too high. Use quotes to indicate where you have used other’s words. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything.

  Overview
This week, we will be examining the Sarbanes Oxley Act which was passed in 2002 to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to securities laws.
The Security Technical Implementation Guides (STIGs) are the configuration standards for US Department of Defense IA and IA- enabled devices/systems.  The STIGs contain technical guidance to “lock down” information systems/software that might otherwise be vulnerable to a malicious computer attack.
Required ReadingsReview the SQL Server STIG’s here:
https://iase.disa.mil/stigs/app-security/database/Pages/sql.aspx Required Videoshttps://www.youtube.com/watch?v=eeQagPytR-o

https://www.youtube.com/watch?v=OxusD0fMWOw

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

1. Discuss, in detail, the two states laws on data and security breach notifications that you researched. 2. How does state government data security breach notification laws relate to individual privacy.

  

Lab Assessment #6 – Lab Report File

You must complete the assignment in a Word document. Remember, you must cite and reference sources. Your answer must be a minimum of 2 full pages in length following APA guidelines. 

For this assignment you will need to review state data and security breach notification laws that define what organizations must do if they have had a data or security breach that impacted citizen privacy data. The National Conference of State Legislatures (NCSL) Web site traces telecommunication and information technology state legislation. Please click the below link and review two states data and security privacy breach notification laws and answer the below questions. 

http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/SecurityBreachNotificationLaws/tabid/13489/Default.aspx

1. Discuss, in detail, the two states laws on data and security breach notifications that you researched. 

2. How does state government data security breach notification laws relate to individual privacy. 

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.