The process of implementing security frequently opens one’s eyes to other for

 
The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.
The specific course learning outcome associated with this assignment is:
Recommend best security practices to achieve business objectives based on risk assumptions.
Instructions
Design a network that incorporates the following:
One corporate site (Chicago).

All servers exist here (web server, file server, print server, mail server, FTP server).
Connection to the Internet (50 MBps).
300 employees who only need access to local corporate resources and the Internet.

One remote site (8 miles away).

20 employees who need access to all resources at corporate, plus the Internet.
Connection to the Internet (3 MBps).

Part 1
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:
Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:

All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
The interconnections between network devices.
Connections to end-user (client) devices (desktops, laptops).
Connections from the Internet cloud to the network input.

Part 2
Write a 6-10 page paper in which you:
Describe the flow of data through the network, citing specific, credible sources.

Assume data begins at the remote site.
Data flow may be monitored by an IDS.

Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Cite each source listed on your source page at least one time within your assignment.
For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.
Submission Requirements
Import completed diagrams or charts into your paper before submitting your work.
View Rubric
 

  In order to successfully manage risk, one must understand risk itself and the

 
In order to successfully manage risk, one must understand risk itself and the assets at risk. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.
Instructions
Write a 3-4 page paper in which you:
Discuss at least three rationales for performing an information systems security risk assessment.
Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
Describe at least five common tasks that should be performed in an information systems security risk assessment.
Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good source for resources.
Your assignment must follow these formatting requirements:
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Evaluate risk analysis methodologies to determine the optimal methodology based on needs, advantages, and disadvantages.

  The process of implementing security frequently opens one’s eyes to other for

 
The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.
The specific course learning outcome associated with this assignment is:
Recommend best security practices to achieve business objectives based on risk assumptions.
Instructions
Design a network that incorporates the following:
One corporate site (Chicago).

All servers exist here (web server, file server, print server, mail server, FTP server).
Connection to the Internet (50 MBps).
300 employees who only need access to local corporate resources and the Internet.

One remote site (8 miles away).

20 employees who need access to all resources at corporate, plus the Internet.
Connection to the Internet (3 MBps).

Part 1
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:
Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:

All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
The interconnections between network devices.
Connections to end-user (client) devices (desktops, laptops).
Connections from the Internet cloud to the network input.

Part 2
Write a 6-10 page paper in which you:
Describe the flow of data through the network, citing specific, credible sources.

Assume data begins at the remote site.
Data flow may be monitored by an IDS.

Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Cite each source listed on your source page at least one time within your assignment.
For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.
Submission Requirements
Import completed diagrams or charts into your paper before submitting your work.
View Rubric
 

  Instructions Your assignment this week is to see how unique you really are wh

 
Instructions
Your assignment this week is to see how unique you really are when it comes to the internet and your browsing. Cookies are a thing of the past in tracking your identity. So, this week, you are going to make use of the sites listed below to understand your uniqueness online, and make sure to read the full results. This should be done on your personal computer and not on your work computer.
https://amiunique.org/
https://panopticlick.eff.org/
https://browserleaks.com/canvas

Analyzer


https://www.deviceinfo.me/
For your assignment submission, you need to
1. Screenshot each of the five pages showing that you have completed the task on each of the pages;
2. Paste the screenshots into a word document;
3. Provide a wrap-up of approximately 1-2 pages, describing your thoughts about the information you received in the results from each of the sites. Have the results of these websites and the data found in each of them affected your habits at all?

 week 1 assignment: Complete the following assignment in “one MS Word document”

 week 1 assignment: Complete the following assignment in “one MS Word document”:
Chapter 1:
discussion question #1 – Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources.
exercise 15 (limit to one page of analysis for question 15) – Find information about IBM Watson’s activities in the healthcare field. Write a report.
Chapter 2:
discussion question #1 – Discuss the difficulties in measuring the intelligence of machines.
Exercise 4 – In 2017, McKinsey & Company created a five-part video  titled “Ask the AI Experts: What Advice Would You Give  to Executives About AI?” View the video and summarize the advice given to the major issues discussed.
Exercise 5 – Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 
Exercise15(limit to one page of analysis for question 15) – Explore the AI-related products and services of NuanceInc. (nuance.com). Explore the Dragon voice recognition product.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Textbook:  
Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support Dursun Delen 
Note: within 8hrs, no plagiarism, with references, APA format

  Instructions General Instructions for your Website: During Week 1 through Wee

 
Instructions
General Instructions for your Website:
During Week 1 through Week 7 of this course, you will be building a personal website on a topic of your choice. Choose a topic about which you are both knowledgeable and enthusiastic, so that you will be able to easily write about the topic and share your knowledge of the topic through your website. During Week 1, you will create the home page of your website. Make sure that you write the content (the paragraphs of information about your topic) yourself. Do not copy content from other web pages. Your website should contain at least 4-6 paragraphs of information, arranged in a logical manner (using headings and sub-headings appropriately). During Week 2, you will add an external style sheet to your website. During Week 3 through Week 7, you will either add additional pages to your website or you will add new functionality to your home page, as directed in the instructions for each assignment.
You must write the code files by hand for all assignments in this class. A simple text editor, such as Notepad or Notepad++ will suffice (or TextEdit on the Mac). DO NOT use GUI editors, such as FrontPage, Dreamweaver, etc. You must write the code for your web pages yourself. If you are using a PC, it is strongly recommended that you download the free Notepad++ text editor because it contains extra features which assist with debugging, such as line numbering and color coding of different elements of syntax. Mac users should use the TextEdit text editor that comes with the Mac OS. However, if you are a Mac user, make sure you set TextEdit to use Plain Text by default. You can find instructions for this here.
Make sure all of your web pages comply with the HTML 5 standards and CSS standards. DO NOT use obsolete HTML elements and attributes from previous versions of HTML. By including the HTML 5 DOCTYPE declaration in your webpages, and validating all of your HTML files here, you can be sure that your code complies with HTML 5. Starting Week 2, your external style sheet (.css file) must pass validation at the W3C CSS Validation Service. Make sure you use the “Validate by File Upload” option (and NOT the “Validate by Direct Input” option), on both of these validators since this is the way your instructor will check your pages when grading your assignments.
The home page of your website must be named “LastFirstHomePage.html” where “Last” is your last name and “First” is your first name. For example, if your name is John Smith, you would name your home page file SmithJohnHomePage.html Starting with Week 2, you will also have a CSS file linked into every HTML page on your website. Name your CSS file “LastFirstStyleSheet.css” where “Last” is your last name and “First” is your first name. Your website must only have 1 CSS file and that file should be linked into all HTML pages on your website. Additional HTML pages created for your website (During Week 3 through Week 5) should be hyperlinked together through a navigation menu that appears on all pages of your website. Naming conventions for each additional page on your website will be included in each assignment description that requires a new HTML page.
Specific Instructions for Assignment 3:
For this assignment, you will add a second page to your website and create a navigation menu that links the two pages together.
1) You will create an “about” page for your website. This will be a second HTML page. Since the basic structure of an HTML file is the same for all pages, you can reuse some of the code from your home page (created in Assignment 1). Create a new HTML file in your text editor and name the file “about.html”. It should contain all of the same basic code that is in the head section of your home page. The body section should contain additional content. Your “about” page should contain information about your website and/or information about you including any applicable civic or cultural activities (the author of the website). You can move some of the content from your home page to your “about” page, if it would be more appropriate on this new page, or you can write new content for this new page (or a combination of some existing content and some new content). Save your new file and validate it using the HTML validator. Debug and fix any errors identified by the validator until your file passes validation.
2) Make sure the external CSS style sheet you created in Assignment 2 is linked into both your home page and your new “about” page with the tag in the head section of each file. Your website should only have 1 CSS file, and that same file should be linked into all HTML pages on your website.
3) Create a navigation menu for your website. Your navigation menu can be as simple as a list of links, or you can explore some more advanced ways of creating a navigation menu if you wish. Make sure your navigation menu appears on all pages of your website (i.e., your home page and your “about” page). Your navigation menu must appear at the top of each page. For this week, your menu (on each page of your website) must include a link to your Home page and your About page. In future weeks of this course, as you add more pages to your website, you will need to edit your navigation menu on each page of your website to add links to the new pages you add to your website. Hint: Sample code for a simple navigation menu can be found in the Week 3 module in the Content area. At a minimum, you must model your navigation menu after the example I gave you in the Content area (a menu with a link for your Home and About pages on the top of each page of your website). You can also find links there to more advanced examples, if you wish to experiment with them.
Validation Requirements:
Before submitting your web site:
Validate all HTML files here, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
Validate your CSS file here, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
Note: It is critical that you debug and fix ALL errors identified by these two code validators before submitting your assignments. Contact your instructor for assistance if you are having difficulty debugging and fixing your errors because it is imperative that your code files pass validation.
Submission Instructions: Create a zip file containing all files related to your web page (.html files, .css file, image files, and/or multimedia files). Make sure you maintain the necessary directory structure in your zip file so that your webpages will view correctly when unzipped. In other words, if your images are in a sub-folder on your computer, in relation to the folder containing your .html file, then you need to maintain that same directory structure in your zip file, too. Submit only the zip file for grading.
——————————————————————————————————————-
The videos below will walk you through each of the steps of the assignment:
Week 3, Part 1: About Page:
Week 3, Part 2: Navigation Menus:
Rubric for Grading Assignment
Rubric for Grading Assignment
Exemplary
Accomplished
Developing
Beginning
Points Available
Webpages (all HTML files) validate without errors here
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Style sheet (CSS file) validates without errors here
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Website contains well-written, well-thought-out, creative, attractive, and well-organized content (uses paragraph, line break, heading tags, and horizontal rules appropriately to organize content)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Correct use of all basic elements in a webpage document (Ex: DOCTYPE, html, head, body, meta, title, link, etc.) on every HTML page
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
CSS style sheet containing appropriate formatting for your website, linked into all HTML pages of your website
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Website contains a minimum of 2 HTML pages — your home page (created for Assignment 1) and an additional “about” page
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
30
Consistent navigation menu on all pages of your website, using local hyperlinks (coded with relative paths)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Correctly created zip file that contains all files for webpage (maintaining original folder structure)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Total
100
***Note: Your website must include a minimum of 2 HTML pages, linked together via a navigation menu, as specified in the instructions above, to receive any credit for this assignment. Websites submitted without 2 HTML pages and a functional navigation menu will not receive any credit.

n this discussion, you will reflect on your course experience and think about i

n this discussion, you will reflect on your course experience and think about industry certifications and what they can do for you. In your initial post, make sure that you address at least one reflection question, as well as the certification question.
Course Reflection Questions:
What is your the biggest course takeaway?
What do you feel was the most important aspect of the course?
Is this course what you anticipated or what you thought it would be? Are assumptions you had about the industry or the work different now?
Certification Question:
Now that you have thought about your career aspirations in Module One and learned about certifications here in Module Eight, what certifications are targeted toward your desired job role?
Make sure you respond to at least two of your peers for full credit.
To complete this assignment, review the Discussion Rubric.

  IT592-2: Synthesize financial and business risk in order to develop long- and

 
IT592-2: Synthesize financial and business risk in order to develop long- and short-term strategic plans.
Purpose
Information assets are constantly being attacked, and information security has become a high priority for organizations. The big question that many organizations are asking is how much security do they need? In short, organizations are struggling to find the right financial resources to invest in cybersecurity. What is the right investment for cybersecurity? Is more necessarily better when it involves protecting digital assets? Overinvesting in cybersecurity will reduce revenue and create unhappy shareholders, and underinvesting can have negative effects on the organization. In this assignment, you will evaluate risk and use financial tools to invest in security solutions. You will use several financial formulas.
Assignment Instructions
For this assignment, you will work through four mini-scenarios that consist of financial investing and risk identification.
Scenario 1: Return on Investment (ROI)
ROI is used to decide where to invest financial assets. The finance group of a company may use ROI to decide whether to fund project A or project B. The formula for calculating ROI is given below.
ArmCPU company manufactures memory chips. The company wants to expand production to a faster memory chip which will cost $2M. This new chip is expected to bring $6M over the next 3 years. What is the ROI? Use approximately 100 words to explain your answer.
Scenario 2: Return on Security Investment (ROSI)
Security investment is a little more complex. There are no tangible gains in investment directed at information security. The return is measured on risk avoidance. The formula for calculating ROSI is given below.
ArmCPU has been attacked by the BAD-VIRUS before. The damage resulting from the BAD-VIRUS in 2022 was $68,000 for all occurrences and all users. Implementing an anti-virus solution was $32,000 for all its users. The anti-virus solution worked 75% of the time on BAD-VIRUS.
Identify the following from the data given:
What is the risk exposure?
What is the percentage of risk mitigated?
How much did the solution cost?
Compute the ROSI.
Do you think that an anti-virus solution is worth the investment? Use approximately 150 words to explain your answer.
Scenario 3: Quantifying Risk Exposure
Before looking at an equation to calculate risk exposure (RE) on an annual basis (ALE), please note that the equation for risk exposure uses two variables: single lost exposure (SLE) and annual rate of occurrence (ARO). ALE is the product of these two variables. The equation for ALE is given below.
Suppose the ARO is 0.5 (once in 2 years), and the SLE is $12,500. Compute the ALE. Use approximately 50 words to explain what this value means.
Scenario 4: Complex Problem Using ALE
Definition of vulnerability, threat, and risk of problem 4:
Vulnerability: No backup
Threat: A server failure
Risk: Data Loss
What is the asset in this problem?
Suppose the asset is worth $48,000. The single lost expectancy (SLE) is computed by multiplying the actual value by the exposure factor.
In this case, the SLE = Actual Value (AV) X Exposure Factor (EF). The exposure factor is the loss that can occur as a result of the threat. For problem 4, you are going to assume that the SLE is $10,000.
What is EF?
You are going to keep the ARO (the frequency of the threat every year) as .5, assuming that the server crashes once every 2 years.
Compute the ALE. Remember  
Generally, the equation below is used to decide whether to implement a particular mitigation strategy.
Mitigation investment (M1) = ALE1 (before the mitigation investment) – ALE2 (after the mitigation investment) – Total cost of implementing the mitigation strategy (TC).
Suppose the cost of completing and maintaining a backup for the server is $500, and the ALE2 is $1100. What should be the allowable investment for this security risk? Use approximately 200 words to explain your answer.
Assignment Requirements
In a Word® document, supply all of your answers for the scenarios given. Be sure to answer all questions. Cite all sources in APA style where applicable.

  Scenario You work for a consulting firm as a cybersecurity strategist special

 
Scenario
You work for a consulting firm as a cybersecurity strategist specializing in software companies. You have been assigned to a new project. The board of directors of an organization mandated that security become a part of the software development life cycle used at the organization. The organization creates a software development system to build mobile applications for multiple mobile platforms. You will be presenting your strategy for implementing a secure software development life cycle (S-SDLC) to the research and development team.
Some assumptions you can make as you do this Assignment:
Leadership and personnel are on board with the idea of incorporating security in every phase of the software development life cycle.
The research and development teams are affected by this change. This includes the business analysts, software engineers, system test engineers, software quality assurance engineers, and technical support.
The mobile software development system the software company builds has been in the market for three years.
The mobile software development system the software company builds was developed in C#.
The mobile software development system runs on the two latest major versions of Microsoft Windows and currently targets the latest version of Apple® iOS (handhelds and tablets) and Google™ Android™ (handhelds and tablets).
Assignment Instructions
In this assignment, you will
Prepare an introduction that explains the importance of implementing secure software development.
Define a secure software development life cycle (S-SDLC) the software company should adopt. There are several examples provided in this week’s readings and videos or you can find examples of your own through internet research.

Discuss how security must be addressed in every phase of the S-SDLC and sufficiently explain how security is implemented in each phase of the SDLC.
Provide a diagram of the secure software development life cycle (S-SDLC) that you are proposing.

In addition to addressing adding security to the SDLC, discuss ongoing activities for threat assessment and vulnerability management in a software development environment.
Create a high-level rollout plan to fully implement the S-SDLC.
As you complete this Assignment, be sure to outline any assumptions or constraints you may have.
Your Assignment will be in the form of a PowerPoint® presentation that includes embedded audio narration for each slide. In addition, each slide should have notes in APA form, as there is one person on the research and development team who is hearing impaired.
Assignment Requirements
5–8 slides, including embedded audio narration on each slide.
Your final slide should present a list of resources you used (in APA format).
At least 3 credible sources.
Correct spelling and grammar
Correct APA formatting

  Instructions Your assignment this week is to put together an argument either

 
Instructions
Your assignment this week is to put together an argument either for or against the concept of a surveillance state. Your paper can take on either side, but your grade is going to be based on the persuasiveness of your argument. Can you defend your choice? Can you showcase why your choice is the right choice? Can you defend the ethics of your choice? Can you defend the legality of your choice? These are just a few of the questions you will want to answer. Your paper should be between 4-6 pages in length of content, i.e. excluding cover page and references.