NP_EX365_2021_7a_FirstLastName                            New Perspectives Exce

 NP_EX365_2021_7a_FirstLastName 
  
   
                   New Perspectives Excel 365/2021 | Module 7: SAM Project 1a
  
Valerian State College
SUMMARIZING YOUR DATA WITH PIVOTTABLES
· Save the file NP_EX365_2021_7a_FirstLastName_1.xlsx as NP_EX365_2021_7a_FirstLastName_2.xlsx 
o Edit the file name by changing “1” to “2”.
o If you do not see the .xlsx file extension, do not type it. The file extension will be added for you automatically.
· With the file NP_EX365_2021_7a_FirstLastName_2.xlsx open, ensure that your first and last name is displayed in cell B6 of the Documentation worksheet. 
If cell B6 does not display your name, delete the file and download a new copy 

Access control is the granting or denying approval to use a specific resource. P

Access control is the granting or denying approval to use a specific resource. Physical access control consists of mantraps, walls, and door locks that limit physical access to resources, whereas technical access is concerned with allowing or limiting access to data resources. The National Institute of Standards and Technology (NIST) tells us that access control is concerned with determining the allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system.
Compromised privileged credentials, both human and machine, account for the majority of successful cybersecurity attacks. Enterprise credential management and privileged access management are the cornerstones of a company’s cybersecurity defensive posture.
Research and write a 250- to 500-word analysis addressing the following:
Explain what enterprise credential management and privileged access management are, and provide at least one example of each.
Discuss why they are important to a company’s cybersecurity defense posture and describe how the two are connected.
Develop a specific plan for the implementation of access controls in your company.

  Instructions Create a VBScript script (w3_firstname_lastname.vbs) that takes o

 
Instructions
Create a VBScript script (w3_firstname_lastname.vbs) that takes one parameter (folder name) to do the following
1) List all files names, size, date created in the given folder
2) Parameter = Root Folder name
The script should check and validate the folder name
3) Optionally, you can save the list into a file “Results.txt” using the redirection operator “>”
4) Make sure to include comment block (flowerbox) in your code.
5) Sample run:-
C:entd261>cscript.exe w3_sammy_abaza.vbs “c:entd261” >results.txt
Submit your week 3 work in w3_firstname_lastname.txt (Please save the file as a text file and upload the text file here for final review.)
Requirements
Points
Comment block (flowerbox) with Instructions on how to run the code with examples.
20
Code documentation and comments.
10
Assignment code including creating command line parameter
70
TOTAL POINTS
100

  Log in to InfoSec to complete the labs below and take screenshots at the steps

 
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
The Hacker Enters The Network – Step 36 – Telnet Alerts from Alert.ids File
Writing Custom Rules – Step 5 – Third Custom Rule Change
The Hacker Triggers Alerts – Step 13 – Hash Dump
The Hacker Triggers Alerts – Step 17 – Output From alert.ids Showing fgdump Alert
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

Overview The next part of your training manual will focus on intrusion detection

Overview
The next part of your training manual will focus on intrusion detection and prevention. An intrusion detection system (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. Continue the development of your training manual with an overview of the assigned topic and a summary of functions and capabilities. Demonstrate your implementation with corresponding screenshots from your labs (when applicable).
Prompt
Now it is time to create your training manual section on the configuration of detecting intrusions. Network intrusion detection systems are placed at strategic points within the network to monitor traffic to and from all devices on the network. Continue using the Training Manual Template document to develop the section on intrusion detection services.
In each section of the training manual, develop guidelines for employees to select and employ specific software, tools, and methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
Describe the configuration of whitelisting and blacklisting.
Give an overview of IDS placement.
Summarize the key aspects of monitoring, logging (auditing), and alerting using intrusion detection systems.
What to Submit
Fill in Section Three of the Training Manual Template document. This section contains two main parts with additional subtopics related to detecting intrusions. This section should address best practices and tools and methodologies for detecting intrusions. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.

  Prompt In the Case Document, one of the security gap analyses indicated a high

 
Prompt
In the Case Document, one of the security gap analyses indicated a high number of laptop thefts and a high number of security incidents. Because of this recent increase in theft and security incidents, the chief information security officer asks you to develop an incident response plan. Submit a plan including the eight basic elements of an incident response plan, and procedures for sharing information with outside parties. See the Oregon state incident response template as a sample, but all work should be original.
Specifically, the following critical elements must be addressed:
Include the eight basic elements of an incident response plan.
Describe procedures for sharing information with outside parties.
What to Submit
Your paper must be submitted as a 4 to 6 page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.
See attached documents…

  Log in to InfoSec to complete the labs below and take screenshots at the steps

 
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Setting Up The Sniffer – Step 27 – Wireshark Showing TCPDump Capture
Detecting Unwanted Incoming Attacks – Step 14 – Output from Alert.IDS
Detecting Unwanted Outgoing Traffic – Step 32 – Wireshark TCP Stream of Traffic Between Victim and Target
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

  Incident response is an important component in a security awareness program. W

 
Incident response is an important component in a security awareness program. While not all incidents can be prevented, incident response capabilities can promptly detect and reduce the losses resulting from security attacks.
In September 2014, Home Depot stated that over 56 million credit cards had been compromised in a five-month cyber-attack on their payment systems. This attack simply highlighted the vulnerability of the U.S. retail store’s payment systems. Research the Home Depot incident and reflect on the basic elements of an incident response plan and the attack vectors.
In your initial post, answer the following questions:
Was the Home Depot incident handled correctly? Incorrectly?
Could more have been done? If so, what?

All Country Insurance wants to upgrade its network protection based on a string

All Country Insurance wants to upgrade its network protection based on a string of recent breaches. The chief information officer (CIO) boasts that his business network has never had security issues and already has a properly configured firewall. All Country has a number of field service representatives selling various insurance policies that require different levels of network access. The ability to meet the requests for information and control network access of information has become difficult. For your main post, develop a resolution summary describing how you can provide access to the network based on user credentials, maintain control over access points, and detect access attempts by unauthorized users. Your main post needs to address network access, tracking, and alerts that relate to the concerns of this situation.