Archive for February 2nd, 2018

Assignment 3: Outline a New IT Security Policy

Assignment 3: Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.  RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues.  RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

  1. Briefly explain the current state of Web application security to the Board of Directors.
  2. Describe the major potential security risks associated with maintaining the organization’s Web presence, protecting its assets, and promoting e-Commerce.
  3. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.
  4. Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.
  5. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
  6. Use at least four (4) quality references in this assignment. Note: Wikipediaand similar Websites do not qualify as quality references.
  7. Format your assignment according to the following formatting requirements:
    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

  • Analyze the impact of the Internet and Web applications on the business world.
  • Analyze the evolution of social media, social networking, and the ethical issues they raise.
  • Compare and contrast Web-based risks.
  • Analyze common Website attacks, weaknesses, and security best practices.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills

 

CIS 560 Week 10 Term Paper: The Human Element

CIS 560 Week 10 Term Paper: The Human Element

Human nature is the single greatest vulnerability in any control system and cannot be ignored. Organizations should always take human behavior into account when designing access plans and strategies. Human beings can pose unintentional threats when they accidentally delete data. Hackers may be motivated by financial data when they attack a system or use social engineering skills to gain access to restricted data. Consider human nature and organizational behavior in this term paper.

Write an eight to ten (8-10) page paper in which you:

Propose five (5) techniques that organizations should apply to mitigate the threats arising from human nature.

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place.

Examine what an organization could possibly learn when a policy is implemented to observe personnel in an ongoing manner.

Propose five (5) best practices that you would use to handle human nature and organizational behavior.

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Define proper security controls within the User Domain to mitigate risks and threats caused by human behavior.

Use technology and information resources to research issues in access control.

Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions

 

CIS 560 Week 9 Assignment 3: Secure Encrypted Communications

CIS 560 Week 9 Assignment 3: Secure Encrypted Communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbers, online purchases, business orders, and so on must all be transmitted over secure communication channels. The Public Key Infrastructure (PKI) provides the most widely used secure communications technology. PKI relies on encryption.

Write a four to five (4-5) page paper in which you:

1.   Compare and contrast symmetric encryption to asymmetric encryption.

2.   PKI uses digital certificates to encrypt / decrypt data. Analyze the process of encrypting and decrypting data using a digital certificate.

3.   Evaluate the advantages and disadvantages of using digital certificates.

4.   Evaluate the challenges related to public and private key management when using PKI.

5.   Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

§  Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

§  Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

CIS 560 Assignment 2: Single Sign-On Access

CIS 560 Assignment 2: Single Sign-On Access

Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization.

Write a four to five (4-5) page paper in which you:

Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access.

Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of:

configurability

established standards

implementation challenges

cost

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

CIS 359 Week 6 Assignment 3 Incident Response (IR) Strategic Decisions

CIS 359 Week 6 Assignment 3 Incident Response (IR) Strategic Decisions

Suppose that you have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS Web servers. As the IR Team leader, it is your responsibility to determine the next steps.

 

Write a two to three (2-3) page paper in which you:

1. Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.

2. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

3. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

4. Detail the incident recovery processes for the resolution of this incident.

5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

• Summarize the various types of disasters, response and recovery methods.

• Develop techniques for different disaster scenarios.

• Use technology and information resources to research issues in disaster recovery.

• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

CIS 560 Case Study 2: Cisco’s Remote Access

 

CIS 560 Case Study 2: Cisco’s Remote Access

Cisco’s Remote Access

Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client, automate and simplify router provisioning and updates, and enable a scalable VPN solution to support up to 30,000 workers.

Write a four to five (4-5) page paper in which you:

Evaluate the deployment cost savings realized by Cisco, and determine if it was significant.
Analyze how the solution deployed by Cisco improved:employee productivity
satisfaction
retention
Discuss how Cisco was able to achieve VPN scalability to support thousands of users.
When thousands of employees telecommute and work in virtual offices, there are benefits to the environment. Discuss the environmental impact of the Cisco telecommuting and virtual offices solution.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:

Define proper security controls within the User Domain to mitigate risks and threats caused by human behavior.
Use technology and information resources to research issues in access control.
Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions.

CIS 359 Week 7 Case Study 2 Disaster Recovery (DR) Lessons Learned September 11th

CIS 359 Week 7 Case Study 2 Disaster Recovery (DR) Lessons Learned September 11th

Write a two to four (2-4) page paper in which you:

  1. Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
  2. Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
  3. Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
  4. Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations.
  5. Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
  6. Use at least four (4) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

  • Explain risk management in the context of information security.
  • Summarize the various types of disasters, response and recovery methods.
  • Compare and contrast the methods of disaster recovery and business continuity.
  • Explain and develop a business continuity plan to address unforeseen incidents.
  • Develop techniques for different disaster scenarios.
  • Use technology and information resources to research issues in disaster recovery.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

ENG316 Assignment 5: “Sample Instructions – Draft”

ENG316 Assignment 5: "Sample Instructions – Draft"

Write one to two (1-2) pages of instructions on how to fix the snack you picked. Imagine your audience is third grade Girl Scouts who have little or no experience in a kitchen. Along with your instructions (in the same document), write a 1-page explanation of the steps you took to create the document and the rationale for your approach. In your document, you should: 

  1. Write instructions and explanations clearly and briefly.
  2. Use appropriate tone and language for the intended purpose and audience.
  3. Organize the instructions and the document.
  4. Provide an explanation and rationale of the approach.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain ideas in proper format using accurate details and relevant examples.
  • Design effective graphics for visual presentations.
  • Use syntax, tone, and word choice appropriate to technical communications.
  • Prepare reports, project requirements, and other various technical writing genres.
  • Organize ideas logically.
  • Use technology and information resources to research issues in technical writing.
  • Write clearly and concisely about technical writing using proper writing mechanics.

ECO 550 Assignment 3: Long-Term Investment Decisions

ECO 550 Assignment 3: Long-Term Investment Decisions

Assume that the low-calorie frozen, microwavable food company from Assignments 1 and 2 wants to
expand and has to make some long-term capital budgeting decisions. The company is currently facing
increases in the costs of major ingredients.

Use the Internet and Strayer databases to research government policies and regulation.
Write a six to eight (6-8) page paper in which you:

1. Outline a plan that managers in the low-calorie, frozen microwaveable food company could follow
in anticipation of raising prices when selecting pricing strategies for making their products
response to a change in price less elastic. Provide a rationale for your response.

2. Examine the major effects that government policies have on production and employment. Predict
the potential effects that government policies could have on your company.

3. Determine whether or not government regulation to ensure fairness in the low-calorie, frozen
microwavable food industry is needed. Cite the major reasons for government involvement in a
market economy. Provide two (2) examples of government involvement in a similar market
economy to support your response.

4. Examine the major complexities that would arise under expansion via capital projects. Propose
key actions that the company could take in order to prevent or address these complexities.

5. Suggest the substantive manner in which the company could create a convergence between the
interests of stockholders and managers. Indicate the most likely impact to profitability of such a
convergence. Provide two (2) examples of instances that support your response.

6. Use at least five (5) quality academic resources in this assignment. Note: Wikipedia does not
qualify as an academic resource.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Propose how differences in demand and elasticity lead managers to develop various pricing
strategies.

• Analyze the economic impact of contracting, governance and organizational form within
organizations.

• Use technology and information resources to research issues in managerial economics and
globalization.

• Write clearly and concisely about managerial economics and globalization using proper writing
mechanics.

CIS 336 Week 6 Assignment 3 – IT Support for Virtual Teams

 

CIS 336 Week 6 Assignment 3 – IT Support for Virtual Teams

Global organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations.

Write a two to three (4-5) page paper in which you:

  1. Examine five (5) issues that the IT department is likely to face when it comes to supporting virtual teams.
  2. Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities. Use Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.
  3. Describe five (5) advantages and five (5) disadvantages of using virtual teams for the organizations described in the scenario.
  4. Describe challenges imposed by:
  5. IT / IS national standards and propose how they could be handled or resolved.
  6. Protocols and propose how they could be handled or resolved.
  7. Procedures on virtual teams and propose how they could be handled or resolved.
  8. Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity.
  9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  10.  

  11.  
  12.  
  13.  

 Your assignment must follow these formatting requirements:
 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. 

The specific course learning outcomes associated with this assignment are:
 

  • Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues.
  • Use technology and information resources to research issues in enterprise architecture.
  • Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.
  • Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Click here to view the grading rubric for this assignment.

error: Content is protected !!