Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.Select one of the scenarios below, which involve making ethical decisions in IT.In your initial post for this week, answer the following questions:State which scenario you have selected
Describe the legal and ethical considerations in the scenario
Explain what you would do, given the scenario
Scenario 1: You are a new employee in the role of senior solutions architect. You have over 10 years of experience as a solutions architect in a large company known for its cutting-edge technology. Your new company asks you about the tools and content that were in the information technology infrastructure library (ITIL) at your previous company. Your new company’s leadership is wondering if you can embed some of your previous company’s best practices into the ITIL to ensure that IT practices are up to date. After all, you were hired to help your current employer stand out among its competitors.Scenario 2: You work in the IT department for an institution of higher education. You complete a routine security audit for one of its systems that contains confidential student information. During the audit, you notice several areas of vulnerability, such as a lack of encryption on certain files and no password protections for searching student information. You bring these concerns up to your supervisor, who says that the department’s budget is too tight right now and they don’t have enough personnel to update the system. There are also a lot of staffing switches taking place across departments, and there is a concern that job responsibilities will quickly change among leadership positions.
Requirements: 1-3 paragraph | .doc file
Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.his project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports.Please see the attached requirements.Project Part 1: Risk Management Plan Outline and ResearchFor the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:Research risk management plans.
Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
Write an introduction to the plan by explaining its purpose and importance.
Define the scope and boundaries of the plan.
Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
Develop a proposed schedule for the risk management planning process.
Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Estimated length: 4–6 pagesNOTE: Complete Information is provided in the attachment risk management project part 1.docx
Requirements: 4-6 pages | .doc file
Learning Goal: I’m working on a cyber security writing question and need an explanation and answer to help me learn.Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Requirements: 7 pages
Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Requirements: 7 pages
Learning Goal: I’m working on a cyber security writing question and need support to help me learn.1 Paragraph Answer – Listen to the podcast below and answer the following question briefly.https://malicious.life/episode/episode-98/1- What is your takeaway from this story?
Requirements: 1 Paragraph Answer | .doc file
Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.*******PLEASE BID IF YOU ARE FAMILIAR WITH GNS3 *ASA firewall and VPN implementation for an IT company in GNS3 and at last perform an attack to show how efficient they are 1) IntroductionFIRST YOU HAVE TO CREAT A TOPOLOGY FOR AN IT COMPANY in GNS3, you have to assume an IT organization named VARSH, where you have to implement ASA firewall and VPN for network security of that organization, so after creating a topology, describe a scenario of that company why the company needed Firewall and VPN in the terms of security (*add the screen short of the topology), at the last (in result and analysis, section 6) we have to perform any attack(EG: DDOS, DNS POISONING, ARP SPOOFING, DHCP STARVATION, SYN flood attacks etc. (select anyone attack and explain about that)) to show how the network of the organization was secured with Firewall and VPN2) Problem statement 3) Technical Specifications (Describe whatever software and hardware devices used(eg: GNS3,wireshark,OS’s) and Add clear screenshot’s while explaining)4) IP Allocation table ( IP allocation for the routers, switches, pc, ASA, VPN tunnel etc, #you can use DHCP to generate IP’s but please mention in table)5) Configuration and verifying the connectivity (After configuration check the connectivity and Add clear screenshot’s while explaining)6)Result and Analysis (we have to perform any attack(EG: DDOS, DNS POISONING, ARP SPOOFING, DHCP STARVATION, SYN flood attacks etc. (select anyone attack and explain about that)) to show how the network of the organization was secured with Firewall and VPN)7)Conclusion and Further Work
Requirements: no word limt
Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.Describe in 500 words discuss the scope of a cloud computing audit for business. Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph. Stand-alone quotes will not count toward the 3 required quotes.3 APA Citations
Requirements: 500 words
Learning Goal: I’m working on a cyber security multi-part question and need an explanation and answer to help me learn.1.What is the difference between an event, alert and incident? 2.What is the difference between a threat, a vulnerability and a risk? 3.List two types of encryptions you are familiar with, and what are they used for?4.What is the difference between on premise and in the Cloud?5.What sorts of anomalies would you look for to identify a compromised system? 6.What are the more common alert types you’ve dealt within your experience? 7.Explain direction flow on network and security devices?8.Describe how you solved a technical solution where you did not previously know the solution. 9.Describe your experience developing documentation (e.g., Playbooks, system configurations, incident reports, status reports, training material). 10.What is on your home network PS.Please be precise and straight to the point woth examples
Requirements: Precise points
Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.Please Answer all seven questions without plagiarism percent because the doctor will upload it to Turnitin!Assignment 1ReadingElectronic CommerceAssignment/DiscussionE-commerce Security, After reading E-commerce Security, read these articles:What Cybersecurity Threats Should Most Worry You?5 Data Breach Threats Your Small Business Should Prepare ForThe most popular way to pay for goods or services online is with credit cards. That means as an E-commerce business owner you will need to collect personal information from your customers, especially credit card information. As you can tell from the articles above, this information is a major target of unscrupulous thieves. Your customers are putting their trust in you to protect that information. If you lose that trust you will lose their business.The attached file describes a number of security threats you could face. Among them are: Secrecy Threats, Web Server Threats, and Database Threats. In addition to a number of measures mentioned in your textbook, there is an organization established by some of the major credit card providers that are gaining popularity, the PCI Security Standards Council. They agreed upon 12 PCI Security Standards.After reading the attached file, do the following:Copy and paste the questions below into the PCI Standards section your E-commerce plan. Then write your answers.1- Describe your reaction to one or both of the security threat articles. Include one or more direct quotes from the article(s) in your response (Three sentences).2- Briefly describe the relation between security and cost in computer security (One or two sentences each).3- Name three measures mentioned in your textbook you would take to prevent these threats. Why?4- Would you adopt the digital certificate? Why or why not?5- How would you adopt the encryption algorithms and Hash Coding(be specific)? why?6- What are the differences between Public-key encryption, Private-key encryption, Data Encryption Standard (DES), and Advanced Encryption Standard (AES)? 7- What are the primary purposes of Ethical Hacking, Firewalls, Access Control and Authentication, and SSL Protocol?
Requirements: 250 | .doc file
Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.A relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link:Secure Quick Reliable Login (Links to an external site.)
Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication. Provide the benefits and identify any possible security issues with SQRL.Your well-written paper should meet the following requirements:Paper length: 2-3 pages
Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
Format according to the CSU Global Writing Center (Links to an external site.).
Requirements: 2-3 pages