This week there are three requirements.
1. Mr. Scott would like for you to apply what you have learned about perimeters on the physical building to a single computer.
2. Zero Trust Architecture (ZTA)
3. Using the NICE challenge framework, complete a new challenge.
Week 4 discussion topic
1. Read/Review Security in the Digital World Chapter 1-11Links to an external site. (This is more a starting point for those that might not have a lot of IT/Computer experience, This is certainly not an assignment to read all 11 chapters. Not all of this material will apply.)
2. Review Defense in Depth concepts Download Defense in Depth concepts
3. Review the NICE challenges student guide found here: https://docs.google.com/document/d/108gn4WCV5IhNHueZfhcTKfUPdXbm3cYUtkQKH7NPCQw/edit?usp=sharingLinks to an external site.
4. Optional networking basics refresher: https://www.geeksforgeeks.org/basics-computer-networking/Links to an external site.
Assignment Part 1:
How would we define the perimeters (outer, inner, and interior) of a computer as we did with the Techworx building?
Define and justify the perimeters of a computer you have chosen.
What technology, software, or hardware exists that could protect each perimeter? No more than two examples per perimeter. In other words, I do not want a list of 10 examples. Explain your choices.
Assignment Part 2: Mr. Scott attended a meeting about a new concept called Zero Trust. Please provide a short summary of this
Read
Zero Trust Architecture Explained: A Step-by-Step Approach (comparitech.com)Links to an external site.
Browse NIST SP 800-207 Framework on Zero Trust ArchitectureLinks to an external site.
Key terms to consider
Multi-Factor authentication (MFA)
Least Privilege Access
Segmentation
Assignment Part 3: Play with and familiarize yourself with the NICE challenges. I will discuss this during the live session. There are three times that you are available for you to complete this week’s challenge. (M-T, Wed-Thurs Fri-SAT). You only need to solve the nice challenge one time.
Dangerous Drives
Please do include any solutions in the public discussion but include a screenshot of the green checks. The Technical Tutorial challenge is also available if you did not complete that in week 2.
Grading Late Submission (attached)
Category: Computer Science homework help
Instructions Format: Complete the assignment in a Word document and then upl
Instructions
Format:
Complete the assignment in a Word document and then upload the assignment for grading.
When assigning a name to your document, use the following format: Lastname-Assignment#.
Make sure to include a title page (with your name and date) and a reference page (with your sources).
Double-space paper, 1-inch margins, 12-point font.
When submitting the paper, it will automatically be processed through Turnitin for review.
This assignment is due by 2355 EST on Sunday.
Instructions: Use examples from the readings, lecture notes, and outside research to support your answers. Use high-quality sources (no Wikis, blogs, or anonymously authored articles). Be sure to follow APA guidelines for citing and referencing source material. Answer the below questions (250 words for each question):
1. (250 words + 1 reputable source)
Read Chapter 8. Review Question #4 on page 261 and then answer the following question: The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?
2. (250 words + 1 reputable source, which can be the case itself on page 275)
Read Chapter 9. Answer the following question: Apple Inc. and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to black-out restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Read the case, and describe how DRM can help protect Apple, MLB, or both. WARNING: Do not simply state your opinion without support.
Research Topic (Successful implementation and operation of a biometric security
Research Topic (Successful implementation and operation of a biometric security system)
Class:
The assignment for this week is to flesh out your Week # 8 Research Paper Outline. Please see below for the details:
Week 2: Research Paper Topic Selection
Week 5: Research Paper Outline due (i.e. this week by Sunday at 11:59 p.m.)
Week 8: Research Paper Due
Research Paper Outline: For this assignment – create your research paper outline and include the following all in APA format:
Title page with the title of your paper, name, date, class, professor, and university info.
Top level headers which outline what you will be talking about in your paper.
Second level headers (sub-headers) which outline detail for each of your top level headers
A reference section list with at least 5 sources that you have researched (you will need a total of ten for the final paper).
Submit your outline in a word file with the following file naming convention: ISSC325_Outline_First_Last.doc(x)
Project: Business Impact Analysis (BIA) and Business Continuity Plan (BCP) Senio
Project: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)
Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP. Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and a remote virtual private network (VPN) exists between each production data center and the corporate locations. The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested. For this part of the project:
Research BIAs and BCPs.
Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
Critical business functions
Critical resources
Maximum acceptable outage (MAO) and impact
Recovery point objective (RPO) and recovery time objective (RTO)
Develop a draft BCP that could recover business operations while efforts are ongoing to restart previous operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-spaced
Citation style: Your school’s preferred style guide
Estimated length: 6–10 pages
1) Explain the relationship between motivation and job performance. Can you iden
1) Explain the relationship between motivation and job performance. Can you identify a situation in which a factor other than your skill or motivation level affected your performance?
2) Review the characteristics of transformational leadership (Exhibit 8-6), adaptive leadership, and servant leadership (Exhibit 8-9). Which characteristics apply to Kenny?
What does it mean to say that a database displays both entity integrity and refe
What does it mean to say that a database displays both entity integrity and referential integrity? And why entity integrity and referential integrity important in a database? Provide an application example to support your discussion.
1. What are the elements of goal-setting theory? Explain and provides personal
1. What are the elements of goal-setting theory? Explain and provides personal Reflections
2. What are some important characteristics of each of the following generations?
Traditionalist
Baby Boomer
Generation X
Generation Y
. I would expect 4 to 5 page discussion plus cover page and reference page.
You are designing a multi-tier architecture for a web application on AWS. The a
You are designing a multi-tier architecture for a web application on AWS. The application requires high availability and fault tolerance. Which AWS service or feature would you use to achieve this for the web servers?
Scenario The project manager for GDS is in the process of developing the Proje
Scenario
The project manager for GDS is in the process of developing the Project Scope Statement for the PMO Cloud Implementation Project. You were chosen to assist the project manager in creating the schedule and updating the Project Scope Statement.
Your first duty in preparing the schedule is to create the WBS in outline format, identifying activities and tasks to complete the project. After validating the project tasks to develop the WBS in outline format, you will transfer the WBS outline to your Project Management Information System (PMIS) software, Microsoft Project to establish Gantt chart and project milestones. The software tool Microsoft Project will make it easier for the project manager to monitor and control each phase of the project.
High- level, tasks for this project include, but not limited to the following:
Project Management
Local and Online Configuration
Unit and Integrated Testing
Client and Web application training
Develop User Manuals
Software Deployment
Business Impact Analysis (BIA) and Business Continuity Plan (BCP) Senior managem
Business Impact Analysis (BIA) and Business Continuity Plan (BCP)
Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.For this part of the project:
Research BIAs and BCPs.
Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
Critical business functions
Critical resources
Maximum acceptable outage (MAO) and impact
Recovery point objective (RPO) and recovery time objective (RTO)
Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.