Using the security controls reviewed last week (STIG documents, the OWASP-10,

LAB #7: Security Controls (100 pts)

Using the security controls reviewed last week (STIG documents, the OWASP-10, and CIS), select five (5) security controls from at least two of those security control frameworks.  Perform an assessment of their compliance and make as much progress as is practical to implement the control, recognizing that many of the follow-on steps are beyond the scope of our environments; in these cases, make sure to describe what you did to evaluate, what you did to mitigate, and what would still require action to fully comply.  Use the Security Controls Synopsis template for each control.  Each control should get 1-2 pages of attention, resulting in a single PDF that contains 5-10 pages.  Address meaningful controls applicable to your target environment, which for most of you will be your LAMP stack, but if you’re feeling adventurous, you can choose to use a real-world system or a pet project as the target, so long as it is applicable to the type of security controls we’re focusing on within Data & Application Security.  Do not include work done as part of your job, do not include repeats (same topic from two control frameworks), and don’t use more than one control that is mostly “Not Applicable”.  Treat this as a work deliverable: use critical thinking and check your writing/spelling for completeness.

•Do not include work done as part of your job,

•Do not include repeats (same topic from two control frameworks),

•Don’t use more than one control that is mostly “Not Applicable”.

•Treat this as a work deliverable: use critical thinking and check your writing/spelling for completeness. This synthesizes all we’ve studied in this course as well as your prior knowledge and coursework.

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

Week 4 Assignment – Developing the Corporate Strategy for Information Security Overview

  • Week 4 Assignment – Developing the Corporate Strategy for Information Security
    Overview
    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets.Preparation
    Review the following article:

    • National Initiative for Cybersecurity Careers and Studies.
    • 2017 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. U.S. Department of Commerce.
    • Instructions
      Write a 5–7 page paper in which you address the following:
    • The Chief Information Security Officer (CISO) is responsible for several functions within an organization.
    • Examine three specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.
    • Specify at least three competencies that the CISO could perform using the provided websites and articles.
    • The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:
      • Identify at least four functions of the CIO using the EBK as a guide.
      • Provide examples of how the CIO would execute these functions within an organization.
    • Classify at least two security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.
    • Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis.
    • Describe how the digital forensics function complements the overall security efforts of the organization.
    • Evaluate the operational duties of digital forensic personnel and how this helps qualify the integrity of forensic investigations within the enterprise and industry.
    • List at least three technical resources available to the digital forensics professional to perform forensic audits and investigations.
    • Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
    • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:
    • Determine the functions and operational duties of key information security personnel within an organization.

Chat With Us

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

Your team has been assembled to provide Information Technology

The Problem

Your team has been assembled to provide Information Technology consulting services to a newly formed fictitious company.

Your team is to select one the following:

  • A semi-custom designer jewelry company
  • A designer furniture and accessories company
  • A specialty sporting accessories company (hiking, climbing, water sports, etc.)
  • An urgent medical care company
  • An automotive accessories company
  • An upscale cooking supplies company
  • A medical supply company
  • Other (requires instructor approval)

This medium-sized company was formed by combining several smaller companies within the same industry into a single entity. Each of the smaller companies had their own IT system, and some were not so good, usually because the systems were cobbled together from different sources over the years. The new organization intends to avoid that undesirable outcome.

This organization intends to bring all of the disparate systems together into one comprehensive system. The plan is for another team to implement an ERP system such as SAP or PeopleSoft as the core application for managerial control. That part of the transition will be outsourced to another team and is NOT part of your group’s charter.

Your team was assembled by selecting individuals from some of those smaller companies described above, so you have never worked together before. Also, the levels of experience and training for the various team members can be quite variable.

Your mission is to develop an overall systems architecture plan from top to bottom for the new organization. This will involve several different platforms from the data center to the smartphone level including some levels in between. You may or may not be concerned with the specific source or brand name for a platform or subsystem as your team sees fit.

The team needs to consider all the possible roles that need to be supported in this organization that includes light manufacturing, procurement, sales, distribution, and customer support. A good portion of the sales staff will operate from mobile platforms while traveling to customer sites. The primary business channel is wholesale to other businesses but the organization intends to provide some in-house retail operations through brick & mortar facilities as well as online operations.

The overall assignment is to develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management. You may consider this as the means of presenting your conceptual plan.

2. Organization

The purpose of the groups will be to prepare material for a class Group Project Presentation. It simulates an actual group presentation in class.

During the second week of class, the groups will be formed with approximately the same number of students in each group (plus or minus one). For each, a private discussion area has been created in the Discussion area.

3. Format

Each team will prepare a short PowerPoint presentation (in the neighborhood of 20 slides) along with any relevant notes – either as notes on the slides or as a separate Word document.

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

ASSIGNMENT:DUE: Midway through onsite experience 

ASSIGNMENT:DUE: Midway through onsite experience

I DID AN INTERNSHIP BUT I NEVER GOT THE CHANCE TO DO A JOB ANALYSIS ON AN EMPLOYEE. I NEED HELP ON MAKING A FAKE ONE. I ATTACHED THE ACTUAL EXISTING JOB DESCRIPTION ALREADY. IT CANNOT BE THE SAME AS THE DOCUMENT I ATTACHED. YOU DO NOT NEED TO PUT NAMES, I WILL ADD THAT IN AT THE END. THE JOB TITLE: “MEDICAL RECORDS CLERK”

Have the site supervisor assign a position for which you will perform a job analysis by interviewing the appropriate personnel and writing a performance-based job description.(This means it must include measurable criteria against which the employee would be compared to for his/her performance appraisal).This assignment must also be completed without referencing any existing job description for the assigned position. Upon completion, request a copy of the existing job description

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

I need a full Ethical Analysis on the following topic:

  • I need a full Ethical Analysis on the following topic:

 

Right to repair laws.

Scenario:  In California, a bill was passed that outlawed to ability of people to do their own repair work on computers and cars they own.  The rationale was this would reduce pollution, but it would also increase the cost of owning a computer or car.

Dilemma: Is it ethical for Governor Newsome to veto the bill?

I will provide the instructions for the paper below. I will also provide a sample report, and slides on how an ethical analysis should be done.

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

1.Visit the Project Management Institute (PMI) website. Review

1.Visit the Project Management Institute (PMI) website. Review the PMI membership benefits and discuss the two benefits most relevant to your current career or career goals. Review the PMI certification offerings and discuss which of the eight you are most interested in pursuing. Include discussion of how obtaining this certification is relevant to your current career or career goals. At least 300 word

2. Research two project management tools. Compare and contrast the two tools by providing a chart that documents the pros and cons of using each in the project management process. Additionally, include a column that indicates which methodology (Waterfall or Agile) would lend itself to the use of the tool more readily and another column that provides specific examples of how the tool could be employed in managing a project. At least 300 word

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

The Software Development Life Cycle (SDLC) is a process used for designing

The Software Development Life Cycle (SDLC) is a process used for designing, creating, deploying, and testing software.

  1. What are the steps/phases of the SDLC? Provide a graphic that shows how they interrelate. (Cite your source.)
  2. For each step/phase of the SDLC, explain what specific positions and roles are likely to be involved and what their function(s) would likely be.
  3. Given the opportunity to work in a single step/phase of the SDLC, which step/phase would you select, and why?
 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

Review the course learning resources and, as necessary, conduct additional

Review the course learning resources and, as necessary, conduct additional research to complete this assignment. In a 5-page MS Word document, explain each phase of the Software Development Life Cycle (SDLC). Include the following components:

  1. Cover Page (does not count towards the page length requirement)
  2. Explain the SDLC
  3. Explain the benefits and criticisms of the SDLC
  4. For each phase of the SLDC:
    • Describe the purpose
    • Explain inputs and outputs
    • Explain roles and responsibilities
  5. Reference Page (does not count towards the page length requirement)
 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

 The use of augmented reality (AR) and virtual reality (VR) in education provides

The use of augmented reality (AR) and virtual reality (VR) in education provides better student engagement and a fascinating learn by doing instructions It also helps educational institutions in students recruitment and retention. However, using VR/AR may not be always advantageous. For instance, VR and AR technologies can collect far more personal information than traditional systems. Also, VR and AR technologies can collect biometric data used in authentication systems by scanning retinal and Irises of individuals. Design and conduct a study to investigate the following:

1. Investigate and summarize the VR and AR technologies hardware and software components especially the ones used in education.

2. How AR and VR technologies are used by students and educators in Education? e.g., Virtual Classroom, virtual assignments, field trips, etc. Identify all possible scenarios and discuss their impact on learning outcomes.

3. Identify the security, privacy and societal issues of VR and AR in Education including how these technologies can be misused and/or abused. How these affect learning outcomes and student assessment and other aspects? Solution to resolve these issues.

4. What others have done to address this issue? For example, any previous efforts to study the use of VR and AR in education? Any previous efforts to resolve the privacy, security and society issues in using VR an AR in education? (last 3 years)

5. Design and conduct a survey on students and educators to measure the following (1) students and educators’ familiarity with the use of AR/VR in education? (2) students’ and educators’ awareness of the security, privacy and societal implications. (3) students and educators knowledge on how to resolve these issues.

6. Analyze the study results and come up with a list of recommendations for educators and students

Instructions: Your paper should address the topic based on the concepts and techniques learned in the course. Your paper should describe three most important literature and recent sources. Reference should be in APA style.

Paper Outline:

• Abstract (5 pts) •

Introduction [Describe the problem and your paper goal] (5 pts)

• Motivation [Discuss importance of online tools in education] (5 pts)

• Related Work [Question 3] (5 pts)

• Study Approach [Answer Questions 4 here, and list your study method questions] (30 pts)

• Study Method [ What were the details of the study design? Participants? Tasks? Environment? Procedure? Data collected? Analysis method?] (20 pts)

• Study Results [Question 5. What results and/or findings came out of the study?] (20 pts)

• Discussion [Did you find any interesting insights or implications based on this work? Any future work plans? Recommendations?] (5 pts)

• Claims/Conclusion. [ What key claims and findings that support these claims? Also, list other contributions] (5 pts)

Term paper is automatically checked for plagiarism

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"

The purpose of this assignment is to create a final project management plan

The purpose of this assignment is to create a final project management plan and retrospective based upon the IT project management activities students have been developing throughout the course.

Using the feedback you received from your peers and instructor on the assignments in Topics 3-7, make revisions and finalize your project management plan. The final, revised versions of all plan components created in the Topics 3-7 should be included. In addition, include a 250-500 word project retrospective that addresses the following:

  1. Discuss what you learned from completion of the group and individual IT project management activities.
  2. Evaluate the effectiveness of the project management strategies you employed by discussing what you think worked well in the project plan and what you would do differently if you were assigned a similar project. Provide specific examples related to process, tools, and team dynamics to illustrate your ideas.

Submit the final project management plan and retrospective to the instructor.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

MS Information Technology

1.4: Formulate and evaluate IT development projects using industry standards and practices.

 

"WE'VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH SCHOLAR WRITERS AND GET AN AMAZING DISCOUNT"