Guide your staff members to follow the cyber safety practices while connecting to the internet from home using either their work or personal devices.

Introduction to Cyber Safety

Notes

  • The report should be prepared using Arial font, size 10-12, portrait orientation, and narrow margins if you use Microsoft Word or similar settings if you use other editing software. The section which does not have the supporting materials won’t attract any marks, and neither does the section with its “supporting materials” not supporting or relevant to it. The supporting materials section does not have page limits.
  • Your own writing in your report, including the supporting materials, should account for at least 70% of the content. The materials from any other sources should be properly quoted and referenced. Please feel free to use the Text matching draft assignment (URKUND checking) to check this .
  • Your report should read as an essay, rather than a collection of short question-answers.
  • Please use in-text referencing and Harvard style (or any other standard referencing style)

Task1

Assume you and your group members are the owners   of a small consultancy company located in Bruce in the ACT. There are 15 employees working to support you and the external clients.  Due to the COVID -19 pandemic, you have decided to allow the staff members to work from their home. They can take the work laptops to home or use their own devices instead. The staff members are required to use computer/laptop/mobile, smart board, Smart TV, and Multi-Functional Devices (e.g. printer, scanner). Often you organize the staff meeting using zoom or similar meeting tool e.g. MS Teams. The daily activities of the staff require them to use the computing devices for accessing and storing their files securely in their folders (individual works) and a shared folder (files required for all), as well as all the regular digital activities e.g. reading, writing and sending emails, prepare reports using  Office  software  and several other software applications, (for  some,  make  financial  transactions for the clients)

You are required to guide your staff members to follow the cyber safety practices while connecting to the internet from home using either their work or personal devices. To do so, you need to prepare safety instructions so that they are minimizing the risks. Please prepare the guidelines for the staff members which may include but not limited to:

  • . Identify the risks and vulnerabilities.

Task 2

Small business, families, and individuals are more vulnerable today than ever in the digital space. You are required to research and describe at least 2 recent cyber safety incidents targeting the small business, households, or individuals.

  • You need to analyze each of these incidents and include your mitigation strategies for those incidents.

 

 

 

 

 

 

 

Explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.

Since you have become familiar with foundations of cloud computing technologies, along with their risks and the legal and compliance issues, you will now explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.

In this project, you will first learn about networking in the cloud and auxiliary cloud services provided by cloud vendors. Next, you will explore cloud computing trends, best practices, and issues involved in migrating IT deployments to the cloud, as well as typical architectures of cloud deployments. Then, you will apply your findings to propose a general architecture for BallotOnline’s cloud deployment to best address the company’s business requirements.

Once you have selected a deployment architecture, you will research two leading cloud vendors: Amazon Web Services (AWS) and Microsoft Azure. Exploring and comparing the tools available for application migration will enable you to recommend a vendor to the executives in your final report. The final deliverable is a written report to BallotOnline management, describing the results of your research and recommending the cloud deployment architecture and the vendor for its deployment, with justification.

Your final report should demonstrate that you understand the IT needs of the organization as you evaluate and select cloud providers. The report should include your insights on the appropriate direction to take to handle the company’s IT business needs. You will also be assessed on the ability to integrate relevant risk, policy, and compliance consideration into the recommendations, as well as the clarity of your writing and a demonstration of logical, step-by-step decision making to formulate and justify your ideas.

Identify the resources needed to design and build a network and computing solution for your own business.

Report Overview:

In this assignment, you are required to deal with problem solving which includes the identification and determining the specification of the problem, strategies for its solution. You also required to design a network for a typical client that requires its computers to communicate with each other and on the internet. Then you will have to evaluate the solution provided through the reflective report writing. You are reminded that you have to provide reference list of your write up using Harvard referencing format.

Current Setup:

Part of your analysis & design task, you are required to identify the resources needed to design and build a network and computing solution for your own business. At the beginning, your plan is to start with two branches. However, you are planning to add two more branches within the next two years). Your business will sell new and used books and allow clients to jump “online” to browse and download books. You also will offer training on how customers can setup their own devices to browse, downloads books and place new orders.

Currently, there is absolutely zero connectivity within and between the two branches, which would prove extremely problematic, when there is a need to share information between both branches. However, it is envisaged that both branches would support both wired & wireless networked office environment.

After seeking advice from a network consultant, the following details have been provided:

– The two branches require 50 – 60 computers

– The two branches require high performance and opportunity for network expansion in the near future

– Switches and routers will be required

– The new network setup should support any modern-day networking standards and offers wireless connectivity and interconnect each building

– 24 computers to be connected to the new network and one computer used for Point-ofSale (POS) services at each branch

– Offer 10 computers in the ground floor where clients can get trained on how to setup their own devices to browse, downloads books and place new orders

– The new network should connect the two branches into one solid network to allow the sharing of the POS services and any other critical business data

– The new network should allow clients to connect wirelessly

– In conclusion, the new network should be capable of supporting a greater number of users, and their diverse requirements (desktop video conferencing alongside the usual business applications such as web, email, and regular office productivity packages). So, it would become critical to thoroughly understand the requirements of different communities of users. Therefore, a new network design is highly critical for this business.

 Requirements:

Your written report should provide good and clear details about the followings:

  1. The design of the network topology. Provide an overview of the network topology and details of the three buildings’ network design. (More details in the network design below)
  2. The type of media you propose to use. This must meet the performance requirements. You must justify your choice of media. Remember this might include copper and fiber options.
  3. Hardware (such as routers and switches) should reflect expected usage.
  4. Server room
  5. A wireless network should be made available to students which allows students access to different online resources while on campus
  6. Allocation of printers for each branch
  7. Internet access for the entire network, this connection should be sufficient for all current users, and scalable to allow for the expected increase over the next 2 years
  8. Identify a freeware tool that can monitor the entire network and show status of each computer in the network. Install and explore this freeware.
  9. Provide two (2) possible security requirements for the new network design
  10. Estimation Costing
  11. Produce a listing of equipment and implementation cost. This includes but not limited to (Hardware, software license, installation, operation and maintenance)

Network design:

Construct the network design in Cisco Packet Tracer simulator. Use appropriate addressing scheme for the network devices and ensure that all the host names and network addresses are well labelled.

 

Choose 3 to 5 families or categories of controls (“framework functions”), which should be implemented to remediate the above deficiencies

As part of its due diligence efforts, the M&A team has determined that the following events contributed substantially to the bankruptcy of Island Banking services.

1. Company officers and managers were able to conduct criminal activities using company IT assets without detection.

2. The company did not have a disaster recovery/business continuity plan in place. It could not restart operations due to the loss of servers and workstations (seized by law enforcement agents).

3. Storage media for servers and workstations had not been backed up to an off-premises location, leaving the company with no way to recover from the law enforcement seizure of storage media as evidence.

The root cause for each event listed above was determined to be: ineffective and missing IT security controls.

You have been asked to perform a gap analysis to assist in the identification and selection of IT security controls, which could be implemented to remediate the situation (“close the gaps”). The CCISO has requested that you use the NIST Cybersecurity Framework and the NIST Security and Privacy Controls Catalog (NIST SP 800-53) as your source for IT security controls.

Choose 3 to 5 families or categories of controls (“framework functions”), which should be implemented to remediate the above deficiencies (at least one family, e.g., AU Audit and Accountability, or category, e.g., Recovery Planning, for each event). Describe how the selected controls will prevent or deter such events in the future (“close the gaps”).

Format your response as a business memorandum. For each control family or category, you should provide the following information.

What is
What it does
How the control performs its objective

Explain what web server security, IIS and patch management is and give an example where an organization has been attacked by hackers exploiting the vulnerabilities of any and/or all of these components.

Explain what web server security, IIS and patch management is and give an example where an organization has been attacked by hackers exploiting the vulnerabilities of any and/or all of these components. What company will you choose? What was the actual hack and how did it happen? What were the possible risks/damages that were incurred, coupled with what was done to prevent it from happening and/or how it was controlled for it through mitigation practices after it take place (how did the company react). Lastly what was the overall impact not from just from an IT perspective, but bigger picture from a data loss, financial, company perception, business and client impacts?

How does the organization that you work (I work for AT&T) for use the Internet to promote itself or connect with those it serves?

Businesses have scrambled in recent years to use the Internet to promote their products and services, deliver support and connect with customers. How does the organization that you work (I work for AT&T) for use the Internet to promote itself or connect with those it serves?
• Does your organization have a website?
• Use social media?
• Offer online chat?
• Have a YouTube channel?
How do you think the intended audience responds to these efforts? Do you think they are effective? If not, what would you change?

Can you think of any situations where source documents are essential?

Some systems analysts maintain that source documents are unnecessary. They say that all input can be entered directly into the system, without wasting time in an intermediate step. Do you agree? Can you think of any situations where source documents are essential?

Some systems analysts argue, “Give users what they ask for. If they want lots of reports and reams of data, then that is what you should provide. Otherwise, they will feel that you are trying to tell them how to do their jobs.” Others say, “Systems analysts should let users know what information can be obtained from the system. If you listen to users, you’ll never get anywhere, because they really don’t know what they want and don’t understand information systems.” What do you think of these arguments?

How do you know a work is copyrighted? If it is, how do you get permission to use it?

In the United States a work is copyrighted as soon as it is created. What constitutes a “work” is a complex subject and is beyond the scope of this topic. Generally, however, it includes written works (e.g., books, articles, etc.), pictures (including original art), and music, among others.

For the first part of this assignment, create a Word document answering the following:

* Should anyone be allowed to use any copyrighted work without permission and/or compensation from the copyright holder?
* How do you know a work is copyrighted? If it is, how do you get permission to use it?
* What are the ramifications of using a copyrighted work?
* How can you protect your own work so it is protected?
* Identify at least two places / locations / Internet sites that you can find videos that are either copyright free (i.e., anyone can use them for any reason) or you have rights to use (e.g., use for non-commercial purposes).

Describe the business processes that you are using for your PIR?

Describe the business processes that you are using for your PIR? By describe I mean run the process from input to output. What things go in, what is done, then what is the output or results. Make sure you let the class know the business or organization you are using.
The Organization is a Fire Department called Columbus Fire Department.
Give at least three specific requirement you are going to use for your PIR and SDS
Make sure you include the organization that you are using and what the main process is.

For example, if I am doing a grading system at a school, I would write:

My organization is Valley Christian School and my system is a grading system.
System requirements are:
Output: System must provide parental access within 8 hrs of a grade being posted by instructor.
Process: The student records must tabulate and display on going GPA as grades are entered.

Compare foundational theories and concepts from the business literature that support stated business problems, research purposes, and research question

ggle Drawer
[u06a1] Unit 6 Assignment 1
Comparing Research Designs
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

Competency 4: Develop research questions in support of a business problem and research purpose.
Propose an example of a specified research technique.
Competency 5: Compare foundational theories and concepts from the business literature that support stated business problems, research purposes, and research questions.
Compare various research methodologies, designs, and techniques.
Competency 6: Research acceptable methodological approaches that support stated business problems, research purposes, and research questions.
Assess various research methodologies, designs, and techniques.
Evaluate various research methodologies, designs, and techniques.
Competency 7: Analyze different approaches to the creation of literature reviews that support applied business research.
Write in standard academic English appropriate for audience using correct grammar and current APA format.
Assignment Instructions
Complete the construction of the table, Comparing Research Designs [DOC], listed in Resources, to evaluate, compare, and assess various research methodologies, designs, and techniques.

Refer to the Comparing Research Designs Scoring Guide to ensure you meet the grading criteria.

Additional Requirements
To achieve a successful experience and outcome, you are expected to meet the following requirements:

Written communication: Written communication is free of errors that detract from the overall message, follows standard academic English usage, and uses language appropriate for the intended business and scholarly doctoral audiences.
APA formatting: Table formatted according to current APA style and format guidelines.