Case Study: Profiling Threats PURPOSE OF ASSIGNMENT This assignment will expose

Case Study: Profiling Threats
PURPOSE OF ASSIGNMENT
This assignment will expose you to current issues and gain insight into present threats to consider appropriate countermeasures. Profiling threats is a core skill for any strategic thinker in cyber security.
The Blackhat USA Conference of 2019 lists a number of different training opportunities. The following is a summary of one such training session:
Achieving Security Awareness Through Social Engineering Attacks
“Learn how to use modern social engineering attack tools and gain a better understanding of physical and network attack vectors. Classroom hands ¬on exercises will include basic open ¬source intelligence (OSINT) skill¬building, risk evaluation of humans, use of the Hak5 Pineapple to conduct WiFi-based spoofing and human attacks, and performing physical computer attacks with the Hak5 Bash Bunny. The emphasis of the class exercises, real¬ world case studies, and demonstrations is on building comprehension of attack techniques that can be used to perform pen testing and create awareness programs. Class activities will introduce students to profiling the online presence of employees and enterprises, as well as performing hands-on attacks against WiFi and physical computers”
ASSIGNMENT DESCRIPTION
Part 1:
Please use 1 pages to create a profile
Based upon what you know about hackers please create a profile of one fake individual named John Jones who would be attending the Blackhat USA Conference and would go to this training session. In your profile be sure to talk about the following assessments regarding the individual.
• Education.
• Background.
• Employment status/description.
• Political affiliation.
• Social movements or interests
• Family/relationship status.
• Activities most likely engaged in.
• List of potential hobbies.
• Social media activities.
• Music and television most likely preferred.
• Sports likely followed (if any).
• What threats does this person pose?
• What are 2 countermeasures you would propose to neutralize the more nefarious actions this person
could take?
REQUIREMENTS
Prepare 1 profile, 1 page long.
The profile should be in the form of a narrative, not a bulleted list. For the profile, address 3 unique threats and 2 unique countermeasures. Make sure you provide a rationale for your assessments of their background.
The countermeasures can be either at the organization or policy level or at the individual level. Make sure to provide a rationale for your choice of countermeasures and supply one piece of external evidence for the efficacy of your solutions.
Also, please describe how you would address the threats posed by this person if they worked for your company. Keep in mind that this person isn’t necessarily a proven or convicted hacker, but simply attended the conference.
Part 2:
Please use 2 pages to evaluate how profiling can help in the strategic planning process for public and private IS programs.
Be sure to address the following:
• Explain how to properly lead the strategic planning and management efforts of private and public sector organizations
• Explain how to evaluate and analyze emerging security issues, and threats
• Explain how to analyze and enhance personnel, and information security
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each area.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

DEAR WRITERS! BEFORE TAKING THE ORDER, CHECK INSTRUCTIONS AND MAKE SURE THAT YOU

DEAR WRITERS! BEFORE TAKING THE ORDER, CHECK INSTRUCTIONS AND MAKE SURE THAT YOU CAN COMPLETE IT.
please see the uploaded “3D Printing Stage 2” order instructions. the case study is also uploaded.
I have also included the completed stage 1 assignment for reference.

I need all 4 documents turned into 1 cohesive document. Written components of pr

I need all 4 documents turned into 1 cohesive document. Written components of projects must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, one-inch margins, and APA citations.
Submit a System Proposal Document. It should be a complete, polished Word document artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course.
Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented.

Complete tasks 1–4 for that mini-case and post your results. Your audience is a

Complete tasks 1–4 for that mini-case and post your results. Your audience is a systems analyst.
Victorian Creations
Victorian Creations specializes in the reproduction of furniture from the Victorian era. Recently the
company updated its payroll software as an in-house development project. Users and IT staff
members have completed comprehensive training sessions. The system has been operational for
about six weeks, and no major problems have occurred. You are responsible for the postimplementation evaluation.
Tasks
1. What are some techniques you might use to obtain an accurate evaluation?
2. What are some specific questions you would include in a questionnaire? Who should receive the
questionnaire?
3. Are there general guidelines that apply to the timing of a post-implementation evaluation? What
are they?
4. Is this the best time to schedule a post-implementation evaluation? Why or why not? Are there
other options? What are they?

test drive the user interfaces for each of the listed sites. Sample test actions

test drive the user interfaces for each of the listed sites. Sample test actions have been provided as a guide, but are not inclusive or required. Using the guidelines presented in Chapter 8, specifically outline and discuss what makes each of your selected sites a quality user interface design or an inferior user interface design for its intended purpose.
Retail and Shopping: Walmart, Amazon
Sample the action prompts below to perform on each of the websites provided above:
Find multiple items and add them to your cart in different quantities
Remove/adjust quantities
Continue shopping
Search for alternate items from the like options
Read the customer reviews

submit a Word document including an ERD with the answers to the following questi

submit a Word document including an ERD with the answers to the following questions:
What is a DBMS? Briefly describe the components of a DBMS.
Describe a primary key, candidate key, secondary key, foreign key, and a combination key. Use your imagination to provide an example of each key that is not in the textbook.
What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative entity? Provide an example. Note: For the purpose of this assignment, you may use an ERD not related to this specific case study.
What to Submit
Homework Activity Module Seven should follow these formatting guidelines: 1–2 pages, double spacing, 3 components of DMBSs are defined, entity-relationship diagram, 12-point Times New Roman font, one-inch margins, and APA citations.

I just placed an Order #LW92245 Therefore, I need a totally different writer for

I just placed an Order #LW92245
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1: Corporate Security Professionals
ASSIGNMENT INSTRUCTION
• What options or opportunities are there for the corporate security professionals to make a significant impact on their organization and the communities in which they work?
• What areas that may need improvement?
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: Professional Security Association
ASSIGNMENT INSTRUCTION
• Describe how joining a professional security related association might be of any benefit to you?
• If you are familiar with any, name them
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

I just placed an Order #LW92245 Therefore, I need a totally different writer for

I just placed an Order #LW92245
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1: Corporate Security Professionals
ASSIGNMENT INSTRUCTION
• What options or opportunities are there for the corporate security professionals to make a significant impact on their organization and the communities in which they work?
• What areas that may need improvement?
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: Professional Security Association
ASSIGNMENT INSTRUCTION
• Describe how joining a professional security related association might be of any benefit to you?
• If you are familiar with any, name them
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

Company – Amazon Business You will submit your Project Plan. The project plan is

Company – Amazon Business
You will submit your Project Plan. The project plan is a Word document that is a combination of a written explanation of the Project Plan and the explanation of the Control Plan. The WBS and timeline are represented with screenshots of the Gantt chart, resource chart, and cost table. Ensure each chart and graph is properly noted and has text explanation.
Specifically the following critical elements must be addressed:
Project Plan: Illustrate your recommended implementation and management strategies. Be sure to include screenshots of all relevant diagrams, charts, and tables.
Work Breakdown Structure: Describe all of the essential roles and functions required for implementing the solution. Who will be doing the work and what, specifically, will they need to do?
Project Monitoring and Control Plan: How are you going to ensure that the project is going smoothly? What is your plan of attack to ensure that all controls are adhered to? What is the defined critical path? Be sure that you frame your response for communicating effectively to your target audiences.
Timeline: What is the estimated amount of time for implementation? Create a visual representation that captures your timeline (e.g., Gantt chart) based on the systems development life cycle.
What to Submit
Milestone Two should follow these formatting guidelines: 2–3 pages, double-spacing, 12-point Times New Roman font, one-inch margins, and citations in APA.

DISCUSSION PART 1: Corporate Security Departments ASSIGNMENT INSTRUCTION • What

DISCUSSION PART 1: Corporate Security Departments
ASSIGNMENT INSTRUCTION
• What are the functions of a corporate security department?
• What skill set is important for security professionals to establish an effective asset protection program?
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: Security Function
ASSIGNMENT INSTRUCTION
How is the security function viewed by most corporations?
Is that view different when looked at internally versus externally?
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***