Students are required to write 800-word report analyzing various methodologies and techniques used to protect data, systems, and networks. The report should include the following components: • Data Protection: Provide an explanation and analysis of encryption techniques and access control systems used to secure data. • System Security: Explain endpoint protection solution and vulnerability management employed to secure systems. • Network Defense: Explain firewall, intrusion detection system (IDS), and other network security strategies. Additionally, students must incorporate a minimum of five peer-reviewed research papers into their report. The report should follow either the APA or IEEE reference style.
Category: Computer science : Cybersecurity
The presentation must meet the following requirements: 11 to 15 slides of easy-t
The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
voice script notes for every slide (excluding the reference slide)
at least two references
Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.
The presentation should address your recommendations for the following items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
the ability to restore system files and settings without affecting the user’s personal files and data.
the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.
The presentation must meet the following requirements: 11 to 15 slides of easy-t
The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
voice script notes for every slide (excluding the reference slide)
at least two references
Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.
The presentation should address your recommendations for the following items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
the ability to restore system files and settings without affecting the user’s personal files and data.
the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.
This document is based on web application attacks. Assuming the role of a SOC an
This document is based on web application attacks. Assuming the role of a SOC analyst in the data center at Night dragon, it is “all systems go” and “green light” status throughout the network. Then suddenly, an alert of some sort indicating a vulnerability scan is taking place (you pick which type). The website below may be of assistance.
Considering this, please respond to the following questions:
• What is the alert that is coming in and from what device(s), tool(s), or software? What is it indicating?
• How should you proceed to determine if the alert is real or a false alarm?
• What tool(s) are used in the process?
• What framework(s) are used in the process?
• What data is collected during the initial stages and where are they being recorded?
https://www.darkreading.com/attacks-breaches/-night-dragon-attacks-threaten-major-energy-firms
C. Create a network topology diagram with details of the proposed merged networ
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
• the name of the regulatory compliance requirement
• why the regulatory requirement is relevant to the newly merged company
• how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are appliable to the merged organization, including the following in the description:
• potential network security risks of implementing the topology
• potential performance impacts on the merged network after implementation of the proposed design
• how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
• a cost-benefit analysis for on-premises and cloud infrastructure solutions
• a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission.
C. Create a network topology diagram with details of the proposed merged networ
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
• the name of the regulatory compliance requirement
• why the regulatory requirement is relevant to the newly merged company
• how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are appliable to the merged organization, including the following in the description:
• potential network security risks of implementing the topology
• potential performance impacts on the merged network after implementation of the proposed design
• how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
• a cost-benefit analysis for on-premises and cloud infrastructure solutions
• a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission.
C. Create a network topology diagram with details of the proposed merged networ
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
• the name of the regulatory compliance requirement
• why the regulatory requirement is relevant to the newly merged company
• how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are appliable to the merged organization, including the following in the description:
• potential network security risks of implementing the topology
• potential performance impacts on the merged network after implementation of the proposed design
• how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
• a cost-benefit analysis for on-premises and cloud infrastructure solutions
• a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission.
This document is based on web application attacks for the MyHeritage data breach
This document is based on web application attacks for the MyHeritage data breach. Assuming the role of a SOC analyst in the data center, it is “all systems go” and “green light” status throughout the network. Then suddenly, you get an alert of some sort indicating a vulnerability scan is taking place (you pick which type).
Considering this, respond to the following questions for your:
• What is the alert that is coming in and from what device(s), tool(s), or software? What is it indicating?
• How should one proceed to determine if the alert is real or a false alarm?
• What tool(s) should be used in the process?
• What framework(s) should be used in the process?
• What data should be collected during the initial stages and where should it be recorded?
Write on one topic in this week’s reading you find most interesting. This discus
Write on one topic in this week’s reading you find most interesting. This discussion will be graded on creativity.
Readings:
https://www.appknox.com/blog/united-states-cyber-security-laws#four
https://www.cisa.gov/sites/default/files/publications/CIRCIA_07.21.2022_Factsheet_FINAL_508%20c.pdf
Research and report on a current or recent malware (e.g., Trojan, virus, or worm
Research and report on a current or recent malware (e.g., Trojan, virus, or worm) attack. Describe its method and effects. Be sure to indicate the source of your information. Also break down writing in a introduction, analysis and summary format