Perimeter defense techniques
Evaluate the types of assessments, select one that you might use, and explain why it is important.
Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way.
Active Assessment
Passive Assessment
External Assessment
Internal Assessment
Host-based assessment
Application
Wireless network assessment
Vulnerability Assessment
Category: Computer Science homework help
The Windows Virtual Desktop provides a way to access your computer-based reso
The Windows Virtual Desktop provides a way to access your computer-based resources on multiple computers without having to have them stored on the computer you are sitting at.
Explain why this method could be a good choice for some businesses or may not be ideal for others.
Consider things like availability, troubleshooting, licensing costs, et cetera.
200-250 words
Length 3-4 pgs – Use APA 7 style, and cite references published within the la
Length 3-4 pgs – Use APA 7 style, and cite references published within the last 5 years.
Only working on Section 3 for this assignment add to the file attached (the first part, including Section 1 & 2, has been completed).
Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.
Description
Create the following section for Week 3:
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?
In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.
Complete the following section for Week 3:
Week 3: Access Controls and Security Mechanisms
For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Describe how the new expanded network can be protected through access control.
Describe SSO and VPN technology, and discuss whether they can be used in the company.
Name the document “CS651_FirstnameLastname_IP3.doc.”
The template document should follow this format:
Security Management Document shell
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.
Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
Section headings (create each heading on a new page with “TBD” as content, except for Week 1)
Week 1: Introduction to Information Security
This section will describe the organization and establish the security model that it will use.
Week 2: Security Assessment
This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
Week 3: Access Controls and Security Mechanisms
This section examines how to control access and implement sound security controls to ensure restricted access to data.
Week 4: Security Policies, Procedures, and Regulatory Compliance
This section will focus on the protection of data and regulatory requirements that the company needs to implement.
Week 5: Network Security
This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.
For this assignment, given what we have discussed about waterfall and agile dev
For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…
IT543-4: Design an implementation of cryptographic methods for an organizatio
IT543-4: Design an implementation of cryptographic methods for an organization.
Assignment Instructions:
This assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:
The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and design the school’s yearbook, including the ability to import additional photographs and lay out each yearbook page. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each yearbook page.
Note: Their previous product used CD ROMSs, and there was no Internet access for development, viewing, or purchase.
The company uses this data set to produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record-keeping or for direct sale to students to accompany their hard copies.
The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.
The Internet-based product should include the following additional features:
Allow all yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
Allow the desktop product to be used to edit the yearbook and any new Internet version of the product.
Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
Allow people to purchase copies of the completed yearbook using a credit card.
Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also, make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.
Security concerns include:
Licensing of the application client on school PCs.
Security for the output designs on the cloud and on CDs.
Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
Online purchasing of electronic copies of yearbooks.
Communications security.
You must do the following:
Identify and list RISKS to be addressed.
Design a solution or a solution set.
You do not have to address all of the items below, but here are some possible topics to consider:
Email
Remote access (VPN)
Whole disk encryption
Encrypted flash sticks
E-commerce transactions
Database encryption
Use of hashes (e.g., for checksums, passwords, perhaps even credit card information)
Cloud access security
Digital certificates (at various levels)
DRM for electronic copies of yearbooks
Acceptable use policies regarding the use of company computers, personal computers, and perhaps even use of personal encryption
Identify potential vulnerabilities with your proposed solution. (Note: Not all vulnerabilities can be solved with encryption.)
Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.
Your design should take into consideration the data storage, data processing, and data communication needs of the system.
It is anticipated that the length of the paper will be 10–12 pages.
Attached two files , one for the data you will work on in excel file and file
Attached two files , one for the data you will work on in excel file and file discription for the data in PDF
As a data scientist please study the data and answer the following questions
1- what is the primerly diagnosis ?
2- What potential risk factors were there?
3- Make a statistical description of the data ( primely diagnosis, risk factors, gender, age ,…etc.)
4- is there a statistal relationship between the primely diagnosis and its risk factors?
please show your work in excel file and pdf file Including tables and graphs with explanation
Your job is to: 1) implement the one algorithm in these files that is not alr
Your job is to:
1) implement the one algorithm in these files that is not already implemented (merge sort),
2) Tell me in a comment in your code three things:
what the runtime of this algorithm is
whether it is “destructive”
whether it is “in-place”
3) submit timing data along with your code to show that your code actually has the runtime you claim it does.
Your submission will be:
– A zipped copy of all the files I’m providing, with the unimplemented algorithm implemented and the comments attached to taht algorithm indicating its properties (see above).
– And, in your zip file, you should include some kind of graph showing the growth of the runtime of your implementation of the algorithm, as determined by running it under different conditions and timing it, along with the raw timing data you used to make the graph.You can make the graph however you like (hand-drawn is fine).
A privacy impact assessment (PIA) is a process to help you identify and minimiz
A privacy impact assessment (PIA) is a process to help you identify and minimize data privacy risk. Specifically, this type of assessment helps identify the risks to an individual when an organization collects personal information for a business purpose. There are many reasons an organization might collect personal data. For example, all businesses must collect personal information from employees to process payroll taxes. Many businesses collect personal information from customers to ship goods and services or conduct research to create new products.An organization should complete a PIA any time it intends to collect a new data element from an individual, such as name, date of birth, age, race, sex, address, biometric identifier, or any other element of personal data. Completing a PIA helps an organization think deeply about privacy issues and risks related to collecting specific types of data. To complete a PIA, an organization should:
Clearly specify the data that it wishes to collect from a person.
Clearly document why it must collect that data.
Describe how the data will be collected, used, and stored.
Document the risks of collecting, using, and storing, the data.
Describe the measures that the organization will take to reduce the risks of collecting, using, and storing the data.
Organizational leaders will use the information provided in a PIA to determine whether the need for collecting the data outweighs the risks to the organization that are posed by collecting it. This is a business decision. Stakeholders such as legal counsel, human resources professionals, and information security and privacy professionals will often help prepare and review the PIA. An organization usually does not need to share its PIA with other entities.In this lab, you will learn about and prepare a privacy impact assessment for a fictitious organization.Lab OverviewThis lab has three parts, which should be completed in the order specified.
In the first part of the lab, you will document the personal information that a company seeks to collect.
In the second part of the lab, you will document the risks of data collection.
In the third part of the lab, you will explain why (or why not) the company should collect the personal information specified in Part 1.
Finally, if assigned by your instructor, you will complete a challenge exercise that allows you to use the skills you learned in the lab to conduct independent, unguided work – similar to what you will encounter in a real-world situation.Learning ObjectivesUpon completing this lab, you will be able to:
Identify personal data elements.
Describe risks to the collection of personal data.
Justify data collection activities.
Prepare the peer’s presentation topic by finding and reviewing the Internet
Prepare the peer’s presentation topic by finding and reviewing the Internet resources and documents about the topic that you are assigned to review.
Prepare for your feedback and questions that you will raise throughout the presentation.
provide feedback to your peer.
Ask your questions, critique the presentation, and make your contributions to the presentation.
The Enterprise Architecture Repository is an online, web-based platform desig
The Enterprise Architecture Repository is an online, web-based platform designed to store and organize Enterprise Architecture artifacts produced by EA software tools. You work as a developer for CMS and want to protect the security of the organization. You have developed a level of trust with the development team, and they see that your skills and personality are a match to their organization. Now they have requested your opinions on this application development project.
Your research has shown that many organizations have formulated methods to implement greater security principles by incorporating two-factor authentication.
Develop a proposal that will incorporate two-factor authentication for this development project. You have already had a plan to create an internal certificate and use this as the two-factor check for any devices that have already authenticated once.
Please be sure to include the following into your documentation:
Recommendation of why an updated certificate is needed and your rational for your recommendation.
Description of two-factor authentication and how it is becoming more widely used within the industry.
Explanation of the plan for two-factor authentication in the first login. Include screen shots within this section as proof of how this will work. Then include a brief explanation of how an internal certificate will be used thereafter for that device.