The purpose of this assignment is for students to write a case study based on a common information security scenario.
Prompt
You are the senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 20 cases with Social Security numbers of individuals he has been assisting. How would you handle this security incident? What is the first thing you should do? How would you retrieve/destroy the data? You may have an internal thief—what would you do to find out who stole the laptop? What security violations have been committed? How would you prevent this from happening again? Write a report summarizing the issue and addressing all questions.
Specifically, the following critical elements must be addressed:
Discuss how the situation would be handled and what steps to begin with.
Examine how data would be retrieved and/or destroyed.
Address what steps would be taken to determine the culprit.
Name what security violations have been committed.
Determine what steps could be taken in order to prevent this from happening again.
What to Submit
Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.
Category: Computer Science homework help
In Module Eight, you will submit a communication plan that addresses and summari
In Module Eight, you will submit a communication plan that addresses and summarizes the importance of a security awareness program. How can it enhance the success of the organization? The goal of the communication plan is to find and implement messaging strategies to gain senior management’s buy-in and support of the security program. Cyber laws, personally identifiable information breaches and implications, costs of security breaches, and advantages of awareness programs should be addressed. The plan should also include how the awareness training and security policies and procedures will improve the security posture and culture throughout the organization.
Specifically, the following critical elements must be addressed:
What messaging strategies should be used to ensure that stakeholders understand, buy into, and support the continuous improvement of your proposed security awareness program? Provide specific examples of the types of communication you are proposing.
In a broader sense, how would you convince diverse stakeholders of the overall need for a healthy security culture? How do you make it real and relevant for nontechnical audiences?
What to Submit
Your paper should be submitted as a four- to five-page Microsoft Word document, with double spacing, 12-point Times New Roman font, and one-inch margins, in APA format.
Operating systems typically offer some native log-management functionality. But
Operating systems typically offer some native log-management functionality. But these log- and event-management mechanisms fall short of consolidating the data in any meaningful way, leaving bits and pieces of event logs scattered across a network. For your main post, identify examples of data that should be included on an audit log, and explain the reasons these should be included on the log. Support your reasoning with specific examples, and explain how the data should be logged and organized. Conclude your post by identifying the person(s) likely to view the information you have gathered.
Log in to InfoSec to complete the labs below and take screenshots at the steps
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Nmap Analysis Using Grep – Parsing Nmap Reports With CLI – Step 10 – grep with Open ports
NMAP ANALYSIS USING GREP – Parsing Nmap Reports With Scripts – Step 7- Parsing Report
Log Analysis Using Grep – Step 9 – Access Log File and Curl
Log Analysis Using Gawk – Using gawk With Logs – Step 6 – Names of New Users
FTP Log Analysis – FTP Access Analysis – Step 5 – Log Output of Failed Attempts
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.
Log in to InfoSec to complete the labs below and take screenshots at the steps
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Disabling Default Ruleset – Step 4 – Output
Enabling IPS – Step 9 – Configuration Verification
Configuring the Syslog Server – Step 13 – Verify Log Creation
Synchronized Logging – Step 9 – Verify Time Source
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.
You are working for a national clothing chain. Several of the buyers have been
You are working for a national clothing chain. Several of the buyers have been having a lot of problems obtaining well-designed reports from your organization’s sales and marketing departments on their activities by state over the past year. They want to be able to create reports as needed and access them anytime, anywhere. The buyers need this knowledge to help them plan future purchases and think that a knowledge management system would help improve the retrieval of information from the company’s data warehouse. You have been asked to research KM software packages and to report back to your colleagues. View a list of the top 10 KM software packages at the Capterra website (List of the top 10 KM software packagesLinks to an external site.). Choose at least three KM software tools from the list and go to their websites and take the demo. Write a report describing and comparing the KM tools that you demoed. Discuss the pros and cons of each of them and identify your favorite. Explain your choice.
Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.
The next part of your training manual will focus on network scanning and assessm
The next part of your training manual will focus on network scanning and assessment. The goal of running a vulnerability scanner or conducting an external vulnerability assessment is to identify devices on your network that are open to known vulnerabilities without compromising your systems. Continue the development of your training manual with an overview of the assigned topic and a summary of functions and capabilities. Demonstrate your implementation with corresponding screenshots from your labs (when applicable).
Prompt
Now it is time to create your training manual section on network scanning and assessment. This process may involve automated and manual techniques with varying degrees using a risk-based approach. Continue using the Training Manual Template document to develop the section on network scanning and assessment.
For each section of the training manual, develop guidelines for employees to select and employ specific software, tools, and methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
Illustrate the processes of detecting rogue devices, detecting malicious connections, and viewing network topologies to identify network weakness.
Explain how to interpret the output of network scans to identify weaknesses.
What to Submit
Fill in Section Five of the Training Manual Template document. This section contains two main parts with additional subtopics related to detecting intrusions. This section should address best practices and tools and methodologies for scanning your network and assessing its security. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.
See attached
Personal factors, such as anger, revenge, and lack of rewards and recognition,
Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security screening to select new employees, as well as providing a reward and recognition system to motivate employees and increase morale.
Review the recent insider theft cases PDF. Analyze your findings about one identified thief. How can you learn from your chosen thief to acknowledge and recognize the motives and behavioral indicators that someone might be spying against the company you work for?
Log in to InfoSec to complete the labs below and take screenshots at the steps b
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Verifying It Works – Step 8 – Alert Log Output
Alerting an Admin – Step 8 – Alert E-Mail
Alerting an Admin – Step 11 – Alert Log Output
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.
Log in to InfoSec to complete the labs below and take screenshots at the steps
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Ethical Hacking and System Defense
Scanning – Step 9 – Challenge #2 and #3 Complete
Scanning – Step 11 – Challenge #4 Complete
Scanning With Metasploit And Armitage – Step 23 – Armitage Scan Complete
Exploitation – Step 7 – /etc/shadow Output
Exploitation – Step 25 – Showing All 4 systems Compromised
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.