Identify 10 important components of an IT Risk Management Plan and define these components as well as their importance in an organization.

Research and identify three IT-related Risk Management Plans and list your references to the three plans you found. Then identify 10 important components of an IT Risk Management Plan and define these components as well as their importance in an organization. The submitted document should not exceed two pages in length.

Explain the concepts and procedures associated with investigating and responding to security incidents and prevention strategies.

This assessment consists of two labs that you must complete, and a strategy report for senior executive leadership in your organization. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully.

Complete both of the labs linked in this assessment. As you go through each lab, be sure to: (COMPLETED)

Perform all screen captures as the labs instruct and paste them into a Word document. (COMPLETED)

In the same Word document:

Explain the concepts and procedures associated with investigating and responding to security incidents and prevention strategies by addressing the following:
Explain the steps you should take at the first indication of compromise.
Describe the six-step incident handling process recommended by the SANS Institute.
Compare identification and containment during the incident response process.
Explain the relevance of the post-mortem step during incident response.
Compare IDS and IPS.
Explain the significance of obtaining a baseline of network traffic.
Describe some methods to mitigate reconnaissance attacks.
Now apply what you learned in the lab to the following scenario.

Scenario
To increase business transactions and maximize profits, the organization you work for established an international partnership with another organization. The appropriate business associate agreements and memorandum of association were put in place. A month after the partnership was initiated, your organization was the victim of a cyber-attack. Mitigation efforts were in the millions of dollars.

Your Role
You are a member of the Information Security team. The CISO has asked you to develop an Incident Investigation, Response and Prevention Strategies for senior leadership.

Requirements
Continue working in the same document; simply start your strategies on a new page with an appropriate heading.

In your strategy, address the following:

Explain the concepts and procedures associated with investigating and responding to security incidents and prevention strategies.
Analyze guidelines that can be included in a disaster recovery plan to assist in preparing for future Web attacks.
Identify appropriate guidelines.
Explain how the guidelines you have identified can help the organization prepare for future attacks.
Evaluate testing suites that can be used to test a disaster recovery plan.
Explain the principles and best practices that should be used to handle evidence acquired during the response to an incident.
Evaluate intrusion prevention strategies.
Is there a strategy that seems most effective to you? Why?
Explain how to secure a network with an intrusion detection system.
Support your work with references to at least four recent professional resources.

Name three ways you can network now as a student to ensure the greatest exposure in finding a positon after graduation.

Networking:

If you think college is about meeting new friends, going to classes, studying for exams and finding time to play, well, you are right. Those are important aspects of college life. They are not the only aspects, however.

One of the most important actions you can take in college is called networking. You have likely heard of networking by now and know that it involves meeting the right people who can help you currently or in the future with your career goals.

In fact, a recent report claims 85% of all jobs are found through networking so after listening to the prerecorded lesson on 9 ways to Network let’s take a deeper dive into the how and what networking looks like as a college student.

  1. Name three ways you can network now as a student to ensure the greatest exposure in finding a positon after graduation.

Company Research 

When you’re excited about something, you take the time to learn more about it. Consider the last vacation you took. Because you were excited, you went online to learn all you could about your destination. Doing some research about the company will show that same level of excitement for the work you’ll do and for the company itself.

Your research can help your excitement grow, as well. As you learn more about the company, its values and its goals, you’ll see how your skill set could fit. Your excitement for the opportunity and the company will show in an interview. In this way, your research helps you appear more confident and ready for the work, while also showing your excitement to your employer.

When employers are interviewing multiple candidates, they want to see excitement and enthusiasm for the work. In the reserved format of a job interview, you may not be able to convey this as readily as you would like, so your preparation must convey it for you.

  1. Before applying for a position with a company you must do research on the company as well as the position title you are seeking.
  2. Name three ways you can research a prospective company before you interview.
  3. Name three reasons why you should do research on a company before you interview. 
  4. Give three specific examples (one each) of questions you can ask faculty members, campus recruiters, and school alumni to gain information you could use to identify potential future employees?

 

 

Discuss how AppArmor secures Ubuntu 18.04 LTS specifically and how HTTPS is used to secure its users.

The paper should discuss how AppArmor secures Ubuntu
18.04 LTS specifically and how HTTPS is used to secure its users.
HTTPS and AppArmor are discussed in the securing of Ubuntu 18.04 LTS and Windows 2019 servers specifically. Specifics on their importance and the steps that are taken to secure the servers and users. Hardening techniques for both. Discuss Apparmor profiles and how https is better than http and SSL technology.

Technical details and installation of certificates using IIS and Apache.

Each topic AppArmor and HTTPS should be at least 3-4 pages.

Use as many references as needed and pictures if needed.

Why is mobile computing so important to these three firms? Evaluate the mobile strategies of each firm.

Read “Business Problem-Solving Case: Google, Apple, and Facebook Battle for Your Internet Experience” Compare the business models and core competencies of Google, Apple, and Facebook. Why is mobile computing so important to these three firms? Evaluate the mobile strategies of each firm. What is the significance of search to the success or failure of mobile computing? How have Apple and Facebook attempted to compete with Google? Will their strategies succeed? Explain your answer.

Describe the main points, arguments, research findings, and conclusions made in the article

  • Choose a scholarly (peer-reviewed) article focused on a Student Affairs topic on Student Wellness.
  • write a 2 page analysis of the article
  • describe the main points, arguments, research findings, and conclusions made in the article
  • include personal reflection as to how this article is relevant to your role in higher education
  • use APA format to cite references http://owl.english.purdue.edu/owl/resource/560/01/

Identify the key U.S. statutes that establish the national policy and legal framework for regulation of commercial space operations.

ASCI 404 Applications in Aviation/Aerospace Law

Submit a 12 to 15-page (including cover page & references), double-spaced research paper in APA format. You will identify current issues, regulations, and practices, and address related legal considerations on your chosen topic, using proper legal terminology throughout. You must cite at least 5 references, one of which can be our textbook, if applicable.

Selected Topic

Aerospace Companies

  1. Colossal Aerospace Corporation is developing a new heavy-lift rocket engine to replace the Russian-built RD-180 currently relied on by NASA and by other government agencies for military applications, and to serve the needs of the burgeoning commercial space launch market. The company anticipates producing the rocket engines for sale to U.S. and foreign commercial enterprises and governments, incorporating the engines into a line of launch vehicles it is developing for potential customers, and also offering launch services to those customers, using its own launch complex, equipment and crews. You have applied for a project management position with Colossal and have a job interview scheduled next week at the company’s Merritt Island, Florida headquarters. Intimate knowledge of this rapidly-evolving industry will be a crucial factor in the selection process. To prepare yourself for this interview and for the job, research and prepare a paper covering the following:
    1. Identify the key U.S. statutes that establish the national policy and legal framework for regulation of commercial space operations.
    2. Identify each federal agency and office responsible for regulation of launch vehicle certification, testing, and operations, describing the specific area of responsibility of each such entity and clearly distinguishing the roles of each.
    3. Describe federal permits required for the company to conduct rocket launches for experimental testing and for commercial purposes at the following two optional locations:
      1. The Cape Canaveral Spaceport
      2. A launch site to be developed by the company on Matagorda Island, Texas.
    4. Detail the process to qualify the launch vehicles to fly NASA and NASA-sponsored unmanned and eventually manned payloads.
    5. Determine whether the Arms Export Control Act and related U.S. Munitions List might interfere with the company’s plans for export sales of these engines and launch vehicles.
    6. Describe legal requirements for commercial space launch operators to obtain and the commercial availability of:
      1. Third-party liability insurance to cover injuries to persons and property on the ground or in aircraft that might result from a launch or recovery mishap
      2. Launch risk guarantee insurance to cover failure to deliver the payload to its intended destination or orbit
  • Liability insurance to cover injuries to participants, such as space tourists.
  1. If you find that any of the above insurance coverages are not yet available on the commercial market, and are not required by law, identify an alternative approach to management of that risk.
  2. Identify the federal agency responsible for investigation and determination of the probable cause of space vehicle launch- and recovery-related accidents and incidents and operator notifications and reports required.
  3. Identify any international organization responsible for establishment of international technical standards for certification of spacecraft crews and space worthiness of launch vehicles and manned spacecraft.

 

Describe what a project manager, database analyst, and developer are expected to perform in any project.

Week 5 Assignment – Widget Sales Company Project Phase 1
Project Overview
You have been retained by Widget Sales Company, an international company with offices in 25 countries, to develop a website that will allow its employees to enter travel expenses incurred on a business trip and store that data for reporting purposes (see Widget Sales Company Project Overview [DOCX] for more information). It is estimated that, initially, only 100 employees in the United States will use the system, but within two years, all 2,500 employees worldwide will be using it. The site should have functions that ask for input and calculate the following:

The total number of days spent on the trip.
The time of departure on the first day of the trip and the time of arrival back home on the last day of the trip.
The amount of any round-trip airfare.
The amount of any car rentals.
Miles driven, if a private vehicle was used. The vehicle allowance is $0.58 per mile.
Parking fees. (The company allows up to $12 per day. Anything in excess of this must be paid by the employee.)
Taxi fees. (The company allows up to $40 per day for each day a taxi was used. Anything in excess of this must be paid by the employee.)
Conference or seminar registration fees.
Hotel expenses. (The company allows up to $90 per night for lodging. Anything in excess of this amount must be paid by the employee.)
The cost of each meal eaten. On the first day of the trip, breakfast is allowed as an expense if the time of departure is before 7 a.m. Lunch is allowed if the time of departure is before noon. Dinner is allowed if the time of departure is before 6 p.m. On the last day of the trip, breakfast is allowed if the time of arrival is after 8 a.m. Lunch is allowed if the time of arrival is after 1 p.m. Dinner is allowed if the time of arrival is after 7 p.m. The program should ask only for the costs of allowable meals. (The company allows up to $18 for breakfast, $12 for lunch, and $20 for dinner. Anything in excess of this must be paid by the employee.)
The program should perform the necessary calculations to determine the total amount spent by the business traveler in each category (mileage charges, parking, hotel, meals, etc.) as well as the maximum amount allowed in each category. It should then create a nicely formatted expense report that includes the amount spent and the amount allowed in each category, as well as the total amount spent and the total amount allowed for the entire trip. This report should be written to a file.

Phase 1 Instructions
In this phase, you will be analyzing the project from several different roles: Project Manager, Database Analyst, and Python Developer.

For each of these roles provide:

A high-level overview of each role. This will be very general and describe what a project manager, database analyst, and developer are expected to perform in any project.
What information each role will need in order to complete that portion of it. This will be specific to this particular project. Include the departments and (or) personnel with whom each role will need to interact so there is an overall plan concerning how to proceed.

Explain the relevance of protocol analyzers to information security professionals.

This assessment is a lab that you must complete and a report for senior executive leadership in your organization. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully.

Complete the Analyzing Network Traffic to Create a Baseline Definition lab. As you go through the lab, be sure to: (COMPLETED)

Perform all screen captures as the lab instructs and paste them into a Word document. (COMPLETED)

In the same Word document:

Explain the concepts and procedures associated with analyzing network traffic by addressing the following:
Explain the differences and similarities between Wireshark and NetWitness.
Explain the steps in the TCP three-way handshake.
Describe the process for determining Wireshark network traffic packet counts.
Explain the relevance of protocol analyzers to information security professionals.
Explain baseline analysis.

What is it?
What is it used for?
Explain the difference between internal and external network traffic.
Describe the difference between TCP and UDP.

Now apply what you learned in the lab to the following scenario.

Scenario and Your Role

Information security incidents are stressful events for security practitioners. Inevitably, you will be faced with responding to an incident at some point in your career. Imagine that you discover that your organization’s network has been hacked. Indicators of compromise (IoC) include known hacking tools, modified file permissions, and multiple connections to an unknown network.

Root cause analysis shows that the attackers gained access to the network through the demilitarized zone (DMZ) from a compromised web server. A contributing factor in this attack is that the intrusion detection system (IDS) was misconfigured.

You must prepare a report on the incident for the CISO.

Requirements
Continue working in the same document; simply start your report on a new page with an appropriate heading.

In your report, address the following:

Outline an incident response plan for this type of attack.
Describe the concepts and strategies you would include in this plan.
Explain the purpose of a baseline analysis in an incident response plan.
Explain how you will test your incident response plan.