1- 2 pages for each question. Read more about phishing scams and write a report

1- 2 pages for each question. Read more about phishing scams and write a report with a series of guidelines to recognize them and other fraudulent e-mails.
read more about the Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm and write a report summarizing explaining how it works. Use the following link as a starting point: http://csrc.nist.gov/groups/ST/toolkit/block_ciphers.html.
read more about SSL and TLS and write a report explaining how they work. Use the following link as a starting point: http://computer.howstuffworks.com/encryption4.htm.
Complete the paper in APA format
Paper should include at least 3 references

  Purpose In this assignment, you will be provided a scenario in which you need

 
Purpose
In this assignment, you will be provided a scenario in which you need to prepare for a HIPAA audit using materials found on the healthIT.gov website and using a government-provided online or downloadable tool to perform a risk assessment.
Assignment Instructions
You are the IT and Security Manager for a small five-physician medical practice that uses electronic medical records (EMR) but has never performed a HIPAA security risk assessment. You need to prepare for the upcoming HIPAA Audit, and the healthIT.gov site recommends performing a security risk assessment using their Security Risk Assessment (SRA) tool (downloadable or paper).
Based on the scenario above, review the questions in the Administrative Safeguards portion of the tool. This private practice has many written policies, but the policies are often not updated, and training new personnel on HIPAA requirements is a bit haphazard and poorly coordinated. The practice does not have a formally appointed security contact, although the office general manager is the one that most people go to. The one-person IT professional tries to protect the patient’s information and access to that information as best that is possible, but people that leave the organization are often not immediately removed from having that access. Physical access to the building does require a key card access, but the building entrance is not monitored by cameras or the need to sign in. The company has not formally documented and mapped relevant business associates and has not secured business associate agreements related to patient information security. Although the receptionist area has a high counter, and patients typically cannot see the receptionist’s computer screen, patients can hear the phone conversations in the receptionist area. Access to the medical records is password protected but not encrypted, and not all computer screens have automatic locks when the screens are idle.
Identify at least 10 Administrative Safeguard questions from the tool that are particularly relevant to this organization. Identify each by number and the specific wording of the question.
Discuss at least five identified threats or vulnerabilities and discuss the likelihood and overall impact of each of these vulnerabilities in a table like the one below for each threat/vulnerability (you should have five tables).
Likelihood
Impact
Low
Medium
High
Low
Low Risk
Low Risk
Low Risk
Medium
Low Risk
Medium Risk
Medium Risk
High
Low Risk
Medium Risk
High Risk
For each threat/vulnerability, describe one or more safeguards that could be implemented against the threat/vulnerability. Suggested safeguards can be found in the SRA tool.
Write a summary that discusses what you learned by participating in this exercise. Discuss how difficult and costly completing this assessment might be for the small medical practice described in this case. Recommend possible solutions to make this assessment process possible for this small practice.
Assignment Requirements
5–6 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
At least 1 credible source cited and referenced
No spelling errors
No grammar errors
No APA errors

  Purpose This assignment allows you to define cybercrime and the categories in

 
Purpose
This assignment allows you to define cybercrime and the categories included under cybercrime. You will then examine laws related to cybercrime from three different countries and compare and contrast those laws. You will discuss the ethical dilemmas that can arise from these differences.
Assignment Instructions
Define cybercrime and the categories of cybercrime.
Research how cybercrime (either in general or with respect to certain crimes — e.g., hacking, identity theft, cyberstalking) is handled in at least three different countries (one can be the United States).
Compare and contrast each country’s laws. What ethical issues arise as a result of differences in cybercriminal prosecution across cultures?
How will your understanding of the differences among cultures affect your ability to make decisions within your company?
Assignment Requirements
Your paper should be a minimum of 3 double-spaced pages.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.

  IT591-3: Apply auditing processes within a technical scenario. Purpose  This

 
IT591-3: Apply auditing processes within a technical scenario.
Purpose 
This assignment helps you learn how to prepare for a specific audit, in this case, the PCI-DSS audit. You will use the PCI-DSS Self-Assessment Questionnaire D for Merchants (Version 4.0 (Available in your readings) and become familiar with the various sections that the audit will cover, and what preparation must occur to ensure compliance within each section.
Assignment Instructions 
Use the link to the PCI-DSS self-assessment questionnaire (SQA-D) for Vendors (V. 4.0) provided in this week’s readings and use this information to complete the assignment.
Consider the PCI-DSS self-assessment questionnaire D for Merchants (V. 4.0) which a typical retail merchant would have to show compliance in order to continue doing business with credit cards.
Review the questions associated with four different requirements of the twelve covered by the assessment questions (specifically sections 3, 8, 9, and one other section of your choice)
For each section explain:
The purpose of that section, why it is important, and what these questions seek to achieve.
Pick any three questions in that section and explain:

What the question means
What evidence would be needed to show compliance
Whether it would be easy or difficult to achieve compliance and why

Do not pick three that are all easy
Summarize your impressions of the questions for this section and discuss how a merchant would establish or maintain compliance.
For any question that you examined in item 2 above, (which was deemed hard to comply with) assume that you cannot fully meet the requirement and draft up a half-page compensating control (Refer to Appendix B) that would substitute for a fully compliant response.
Write a 1-paragraph summary about what you learned from this exercise.
Assignment Requirements
5–6 pages of content (exclusive of the cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s).
At least 1 credible source cited and referenced
No more than 1 table or figure
No spelling errors
No grammar errors
No APA errors

  IT590-2: Discuss recent legislation related to ethical computing. Purpose Thi

 
IT590-2: Discuss recent legislation related to ethical computing.
Purpose
This assignment allows you to place yourself in an ethical dilemma related to data security and privacy. You will analyze the scenario from a number of ethical perspectives, identify laws that are relevant for this scenario, and decide how you would respond to the situation.
Assignment Instructions
Select from one of the following scenarios:
You are the IT administrator for your company. One of the employees discovers a loophole in the security whereby the employees may access the personnel records of other employees in the company. Personnel records include names, addresses, Social Security numbers, disciplinary actions, annual reviews, and salary information. You are working on a time-sensitive project and do not fix the problem for 2 weeks. As you are fixing the problem, you note that several employees have accessed personnel records using the loophole.
You are the CIO of a large national auto retailer. As a part of your service, you offer auto loans through your dealerships. This requires your company to collect and store personally identifiable information on your customers. Additionally, you store customer bank account and credit card information so that customers can use automatic payment options for their loans. Recently, your company has been hacked, and a significant number of client accounts have been breached. The CEO is demanding that the IT group handle this privately rather than reporting the breach for fear that publicizing the information will have a negative effect on quarterly earnings.
Complete the following for your chosen scenario:
Analyze your chosen scenario from the aspect of computing ethics and privacy ethics.
Discuss the ethical dilemma from the perspective of societal ethics, organizational ethics, and individual ethics.
Research on the Internet to determine what data security and privacy laws are relevant in this scenario.
Describe each law and consequences for violation of the law.
Discuss the reputational and financial impact this scenario might have on the organization.
From the perspective of the IT administrator in Scenario 1, or the perspective of the CIO in Scenario 2, how would you respond to the situation? Justify your response from an ethical and legal perspective.
Assignment Requirements
Your paper should be 2–3 double spaced pages in length.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.

Using either the Wall Street Journal or U.S. Newsstream, search for the term “ph

Using either the Wall Street Journal or U.S. Newsstream, search for the term “physical security breach.” Select two news articles on the search topic that were posted within the last six months.
For each of the articles answer the following questions
Summarize, concisely, the key details of the physical security breach described in the articles
Describe, clearly and accurately, the steps that were taken in the articles, or are being taken, to alleviate the effects of the breaches after the fact or to resolve each issue
Explain whether the physical security breaches were preventable, why or why not, and if preventable, what preventive steps could have been taken
Describe physical access security best practices that could have been used to prevent the breaches, citing specific, credible sources of best practices

  Perhaps one of the business areas that faces the greatest risk each day is th

 
Perhaps one of the business areas that faces the greatest risk each day is the lending industry. Banks, mortgage companies, and other types of lenders face one specific risk many times every day: Are they going to be paid back when they make a loan? Organizations that make their money by lending money must be able to anticipate risk and predict the likelihood that they will be paid back, with interest, or else their business model will fail and they will have to close their doors. In this Assignment, you will use R with two data sets to predict the risk of loan default for a lender, and then report and explain your results. 
Assignment Instructions 
Complete the following steps: 
Using the university’s online Library and Internet resources, research the lending industry. In a Word document, prepare a risk management plan outline for loan default risk faced by lenders. Include all five parts of risk management planning: Identification, Understanding, Data Preparation, Modeling and Application. Cite all sources used to prepare your risk management plan. 
Download the Loans.csv and Applicants.csv files. Import both of these as data frames into RStudio. Give each a descriptive name. Show this in your Word document.
Using the Loans.csv file, build a logistic regression model to predict the “Good Risk” dependent variable (use family=binomial() in the glm function in R). In this column, ‘1’ indicates that making the loan is a good risk for the lender; ‘0’ indicates that making the loan is a bad risk. Make sure that you do not use the Applicant ID as an independent variable! You will need to load the MASS package in R by issuing library(MASS), before using the glm function to build your model. Show the creation of the model in your Word document. 
In your Word document, document your logistic model’s output, and specifically explain which independent variables have the most predictive power and which have the least. Make sure you identify how you know, and explain why it matters. 
Apply your logistic regression model to the data in Applicants.csv to generate predictions of “Good Risk” for each loan applicant. If your glm model is stored in an R object called ‘LoanModel’, for example, and your Applicants.csv data is in a frame called ‘Appl’, then you would issue a command that looks like this: LoanPredictions <- predict(LoanModel, Appl, type=“response”). Document the application of your model to the Applications data in your Word document.  In your Word document, interpret your predictions for the Applicants.csv data. Specifically address the following:  How many loans do you predict to be a good risk for the lender? How many are predicted to be a bad risk? What are your highest and lowest post-probability percentages for predictions? How many loans have at least a 75% post-probability percentage and what does that mean for the lender? How many loans have less than a 25% post-probability percentage and what does that mean for the lender? Suppose that the lender is willing to accept a little higher risk and has decided they will make loans to applicants who have post-probability percentages between 40% and 65%. List two things the lender could do to mitigate risk when lending to this group, and explain how these will help.  Make sure that you cite at least five supporting sources beyond the textbook in support of your writing and explanations. Cite correctly in APA format. Assignment Requirements  Prepare your Assignment submission in Microsoft Word following standard APA formatting guidelines: Double spaced, Times New Roman 12-point font, one inch margins on all sides. Include a title page, table of contents and references page. You do not need to write an abstract. Label all tables and figures. Cite sources appropriately both in the text of your writing (parenthetical citations) and on your references page (full APA citation format).  For more information on APA style formatting, refer to the resources in the Academic Tools section of this course. 

  Purpose In this assignment, you will analyze recent legislation related to pr

 
Purpose
In this assignment, you will analyze recent legislation related to privacy and evaluate the impact of that legislation on an organization.
Assignment Instructions
Assume you are an IT security specialist for a large U.S. online retail organization that does business internationally. Your CIO has asked you to thoroughly review the General Data Protection Regulation (GDPR) in the European Union. He wants to understand exactly what the organization must do to comply with this regulation when doing business with EU customers.
Provide a detailed discussion about the rules for businesses and the rights of EU citizens.
Include a discussion of the following:
What does the GDPR govern?
What rights do EU citizens have with regard to their data?
What is considered personal data under this regulation?
What is considered data processing under this regulation?
Describe the role of the data protection authorities (DPAs).
Discuss, in detail, how the GDPR will change business and security operations for your organization. Provide the CIO with a recommended checklist for GDPR compliance, and discuss processes and policies that may need to be changed in order to comply with GDPR.
In your conclusion, address what you think will be the financial impact to the organization, both in terms of compliance and any lack of compliance. 
Assignment Requirements
The paper should be 3–4 pages.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.