Explain what a hash value is, why it is considered to be a highly unique

  1. What is a Domain Controller, what purpose does it serve in an enterprise environment, what software/hardware combination does it run on, and why would an attacker be interested in compromising a Domain Controller? Additionally, what is the name of the file that stores the user credentials and associations and where is it located on the system? What ways could an attack acquire the file or its content and what dependencies, tools, and techniques would be required?
  2. Kerberos is the primary system used for authorization and authentication in Windows Domains. Explain how Kerberos works, which information security services does it provide, and any limitations/security considerations/vulnerabilitiesassociated with Kerberos, the way it issues tickets, or the tickets themselves that an attacker could exploit? Provide the names of the different types of attacks and a short explanation of how they work and what the attacker achieves by performing them
  3. Explain what a hash value is, why it is considered to be a highly unique, and at least three examples of how it is used in information security with a short explanation for each.
  4. What is an indicator of compromise (IOC)? Provide at least four examples of different kinds of actionable indicators of compromise and explain how they are implemented by enterprise cyber security teams. Note: Much like in the discussion board posting, I am not looking for behavioral indicators
  5. Explain the role of Group Policy, how it works, what purpose it serves in an enterprise environment, and why we would want to use it. Assuming we wanted to push an update to the client machines on a network immediately, explain the process for doing so using Group Policy on both the server and client machines.
  6. Explain the purpose of Active Directory (AD), the name of the server active directory resides on, its naming schema and organizational structure, how it is implemented by organizations, and the relationship between AD and LDAP.
  7. Explain how a user’s password is stored on a local Windows system, how it is stored on a domain, the location for both, and then the authentication process for each to log a user onto the system. If an attacker is able to acquire the stored passwords, identify what an attacker would need to do to use them to move laterally in the network. Provide the specific name for each of the two attacks

Explain how you will ensure HIPAA, HITECH Act, Affordable Care Act, (and other) compliance of protected health information with EMR systems.

The Relationship Between HIPAA and Electronic Medical Records
Write a 1,500-word essay addressing each of the following questions. Be sure to completely answer all the questions for each bullet point. There should be four sections, one for each bullet below. Separate each section in your paper with a clear heading that allows your professor to know which bullet you are addressing in that section of your paper. Support your ideas with at least three (3) sources in your essay. Make sure to reference the citations using the APA writing style for the essay. The cover page and reference page do not count towards the minimum word amount. Review the rubric criteria for this assignment.
Investigate the relationship between HIPAA and Electronic Medical Records to answer the following questions:
Why was HIPAA required in 1996 to supplement the existing Privacy Act regarding the confidentiality of patient health information?
Why was 1996 considered the initiation of Electronic Medical Records?
Why were the HITECH Act of 2009 and later provisions of the Affordable Care Act of 2010 required to supplement HIPAA in reference to Electronic Medical Records?
Reflect on your future (or current) career in healthcare and discuss several ways that explain how you will ensure HIPAA, HITECH Act, Affordable Care Act, (and other) compliance of protected health information with EMR systems.

How does contemporary cyber insurance function, and what are the potential benefits and risks to organisations considering cyber insurance?

Prepare a short (10 minute) presentation on the following topic- There should be at-least 8 main slides and give a intro and reference slide.
1. Cyber Insurance: Many organisations are investigating the potential benefits of purchasing cyber insurance. However, there are various aspects to be considered beyond the potential financial compensation should an attack occur. How does contemporary cyber insurance function, and what are the potential benefits and risks to organisations considering cyber insurance?

Please refer to the attached screenshots of sample 2 slides. Please make very neat, precise and to the point- bullet point slides. And give the narration script which will have the description of the slide which I’m going to record for the audio of the presentation.

***Make sure to follow the following guideline for marking criteria-
Presentation Quality
– Clear, well-structured and easy to understand
– Logical flow of topics with appropriate emphasis on each
– Quality of delivery and visual aids

Introduction & Background
– Topic clearly defined and described and its importance demonstrated
– Issues identified and explained
– Relevant perspectives established

Analysis
– Comprehensive analysis of issues with consideration of relevant perspectives
– Appropriate depth of analysis
– Discussion of supporting and contradictory points of view and reasoning

Validity of Arguments
– Justified recommendations and conclusion based on previous analysis
– Incorporation of technical and business considerations and recommendations where appropriate

References
– References formatted using UniSA Harvard style
– Valid sources used appropriately to support and illustrate key points and arguments

Identify 3-4 heuristics that are useful to analyze the device/application.

ACTIVITY: Design issues are common in healthcare. The purpose of this assignment is for you to think critically about a device or application to find usability issues. Select one small EHR component or one medical device, one component of an educational software or similar interactive healthcare interface.

Analyze one clinical user interface per group. Define typical tasks completed with this interface.
Identify 3-4 heuristics that are useful to analyze the device/application. Typically we want to find usability issues and heuristic violations.
Say why it does or does not comply with a focus on finding issues that designers need to fix. You may also state one element that complies with heuristics.
Post your Group Summary about the one interface on this forum.
Provide a screen shot, graphic or image of what you evaluated.

For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure.

Padgett-Beale’s Chief Information Security Officer (CISO) has tasked you to continue supporting the Merger & Acquisition team’s efforts to bring Island Banking Services’ security program into compliance with U.S. laws and regulations. The M&A team has provisionally accepted the draft cybersecurity strategy and draft implementation plan which you prepared previously. The M&A team has now requested that you contribute a set of summary slides for the M&A team’s Decision Briefing (presentation) to the Padgett-Beale Board of Directors. This briefing is one of the final steps in obtaining approval for the M&A team’s plan for integrating the newly purchased company – Island Banking Services – into Padgett-Beale as Padgett-Beale, Inc Financial Services (PBI-FS).

Before you begin developing your presentation, review your work products from Projects 1 & 2. As you do so, identify the most likely or most significant barriers to success (factors which increase the risk of failure). These can include barriers arising from external factors as well as issues arising from internal company sources. Consider culture and organizational conflict as well as legal and regulatory issues. For each factor, identify a countermeasure or compensatory action which the company could take to reduce the risk of failure. Select the five most significant barriers to success from your analysis. You will include these in your presentation slides.

Develop Your Presentation:

Using your prior work (Projects 1 & 2), develop a high-level summary presentation of your Cybersecurity Strategy and the Implementation Plan. Remember to include speaker notes for the agenda slide, section title slides, and content slides. Your notes should be at least 20 words / one paragraph but no longer than 150 words / 3 paragraphs per slide.

Your presentation must include the following:

  • Agenda Slide
  • Overview of the M&A effort (multiple slides – use the assignment overviews / background sections to put together a summary that answers: who, what, where, why, how)
  • Section Title Slide: Cybersecurity Strategy
  • Content Slides: provide a summary of your proposed Cybersecurity Strategy (Project 1)
  • Section Title Slide: Cybersecurity Implementation Plan
  • Content Slides: provide a summary of your proposed Cybersecurity Implementation Plan
  • Section Title Slide: Barriers to Success
  • Content Slides: five separate slides – one for each factor (identify each barrier to success and provide a recommended countermeasure or compensating action that the company could implement to reduce the risk of failure). This section will expand upon your “barriers to success” as discussed in Project #2.
  • Section Title Slide: Summary & Recommendations
  • Content Slide: present a recommendation that the strategy & implementation plan be approved by the Board of Directors for adoption and implementation by the company. Include 5 major business benefits of adoption and implementation. This may be new content (not previously included in projects 1 & 2).
  • Section Title Slide: References
  • Content Slides(s) that include reference list entries for your resources. Do not cite your own work for Projects 1 & 2.

Putting It All Together

MS Power Point .pptx format is the preferred delivery format; this application can be accessed via the Web or downloaded from UMGC under the university’s enterprise license for student use of Office 365. For more information see: https://www.umgc.edu/help/help-topic.cfm?‌id=‌kA00W000000sZpeSAE‌&table=‌FAQ_IT__‌kav&action‌=getArticle

If you are unable to use Power Point, you may use another presentation application to create your slides and speaker notes. After you have done so, print your presentation slides to PDF and deliver the assignment as a PDF document. If you deliver as PDF, you must make sure that your speaker notes are visible and accompany each slide.

Additional Information

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your presentation should be professional in appearance with consistent use of fonts, font sizes, margins, etc.
  3. You must include a title slide with the assignment title, your name, and the due date. Your reference list must be on a separate slide at the end of your file.
  4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). To reduce visual clutter, you may put citations for sources into footnotes at the bottom of your slides (instead of putting citations at the ends of bullet points).

Is it worth integrating a SIEM into your network system?

You are a CISSP for a Fortune 500 company. Write a two-page explanation that details the following:

What is a SIEM ?
What does it do?
Where does it get it’s information? Why?
How is the information used?
How long does it take to be set up?
Is it worth integrating a SIEM into your network system?
DO NOT plagiarize your answer from any source. Write your own answer based on your research.

Write a 650 word explanation that provides the advantages and disadvantages of virtualized servers when viewed from a security expert point of view.

You are a CISSP for a Fortune 500 company. Write a 650 word explanation that provides the advantages and disadvantages of virtualized servers when viewed from a security expert point of view.

DO NOT plagiarize your answer from any source. Write your own answer based on your research

What sort of people and institutions might acquire special economic and political power because of technological change?

Taking the feedback from your professor, make any revisions necessary to your presentation. Submit your completed presentation to the assignment folder and also to the Week 8 Discussion: Online Technology Conference. Further instructions for the ‘conference’ will be found there. Your sources, including images, should be cited, and a Works Cited page should accompany the presentation.

IMPORTANT: Please, make sure that your start your presentation with the words, “Dear Professor Tomasi, here is my presentation.”

The final project is a presentation for an imaginary technology conference called in order to evaluate the impact of technology on culture. Students will pose questions of cultural concern in regard to new or emerging technologies and answer these questions in a multimedia presentation that uses scholarly research. The project will be completed in stages throughout the course and shared with the class in the final week. Students choose a new or emerging technology and ask the following questions about it (from Neil Postman, Building a Bridge to the Eighteenth Century):

What is the problem for which this technology is the solution?
Whose problem is it?
Which people and what institutions might be most seriously harmed by a technological solution?
What new problems might be created because we have solved this problem?
What sort of people and institutions might acquire special economic and political power because of technological change?
Students answer these questions by doing research in the UMUC library. At least six scholarly sources must be employed to answer the questions.

Your exhibit will consist of a multimedia presentation on a particular technology and its relationship to culture. The exhibit will address the following issues regarding technology and culture:

Purpose

The purpose of this assignment is for you to understand and articulate the relationship between technology and culture

Skills

The project will enable you to develop the following skills:

Identify, define, and evaluate the influence of technology on human culture
Analyze and evaluate specific relationships between technology and literature, writing, philosophy, religion, art, music, and posthumanism
Articulate cultural critiques of technology
Synthesize interdisciplinary scholarship in technology and the humanities
Demonstrate the ability to design and produce multimedia communication appropriate to a given research or creative context (purpose, audience, event, form, genre, medium)
Knowledge

The project will enable you to obtain the following content knowledge

Nature and function of technology
Nature and function of culture

Feedback from professor is below:

I see the visual presentation, which is good, but I did not find the audio part. The file is 259kb, and a normal file with audio is more than 20,000, usually. So, I do not think it is there. I do not see the audio icon in any of the panels. Let me know. The other students embedded it in such a way that I simply clicked on the audio icon. Because of this, I cannot tell if the presentation is long enough (as you know, the minimum is 20 minutes).

I see a good number of panels, but I notice overlapping text that makes them unreadable. I also do not see much more than text. You should increase the variety of media. The panels are clear and to-the-point. I do see some Postman’s questions. Make sure you include your sources in the panels and insert the sources in the body of the presentation itself, whenever they became relevant.

Again, this evaluation is limited to the visual part, but I hope it helps ????

If it is possible to include audio narration with the slides, please do.

How might our experts be suggesting that these impact our communities?

Essay #2 Prompt: Stepping back from the texts explored in Unit 2, consider your appreciation of digital technologies (like tracking devices) and/or social media. How are these impacting you as an individual? How might our experts be suggesting that these impact our communities? Do you agree or disagree with their thinking? Ultimately, what might be the takeaway from the unit’s texts as far as how we may understand identity in a modern world? This essay–like every essay that you submit this semester–must include at least two quotations from 2 separate texts covered in this unit. The purpose of using quotations is to allow you to situate your stance in response to those of our textual authors.

Write and essay of approximately 500 words in which you respond to the reading “Technology and Healthcare Costs” by Krishna Kumar.

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3104544/

Write and essay of approximately 500 words in which you respond to the reading “Technology and Healthcare Costs” by Krishna Kumar. It must contain a clear, organising idea that is a manageable and logical thesis statement.