Explain what happens to malware when antivirus software is run. Compare a complete scan with Resident Shield.

This assessment is a lab that you must complete and a report for your organization’s CISO. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully. (COMPLETED)

Complete the Identifying and Removing Malware on a Windows System lab. As you go through the lab, be sure to:

Perform all screen captures as the lab instructs and paste them into a Word document.
In the same Word document: (COMPLETED)

Explain the concepts and procedures associated with malware by addressing the following:
Explain how to determine if a computer has been compromised.
What are some of the characteristics you would expect to find?
Explain what happens to malware when antivirus software is run.
Compare a complete scan with Resident Shield.
Now apply what you learned in the lab to the following scenario.

Scenario and Your Role
DoS attacks are a threat to system security. These attacks consume system resources, network resources, and exploit programming flaws to stop legitimate system use. DDoS attacks use multiple computers to increase the intensity of the attack. For example, an attacker may use a botnet consisting of many compromised computers to launch an attack against a corporate e-commerce site, costing the company revenue.

Imagine that a recent cyber-attack has left your web servers unresponsive; essentially closing your online store for business. The company is losing revenue every minute the site is down, and you need to stop the bleeding quickly. An analysis of the attack revealed a high consumption of system resources, high network utilization, and exploitation of programming defects.

The chief information security officer of your organization has asked you to prepare a report on how the attack may have been implemented.

Requirements
Continue working in the same document; simply start your report on a new page with an appropriate heading.

Prepare a report in which you:

Define both DoS and DDoS attacks.
Do not just copy a definition from a source; explain what they mean in your own words.
Analyze the differences between DoS attacks and DDoS attacks.
Describe the relationship between DDoS attacks and malware.
Explain how ethical hackers use DoS or DDoS to assess the damage caused by malicious hackers.

You need to support your work on this assessment with references to at least three recent, professional resources.

Design a spreadsheet that shows cost comparisons of the vendors’ licensing options and the pay-per-use option using the data estimates.

Cost Comparison of Web Conferencing

The two owners of Spinner Media Services Inc. wanted to cut travel costs and productivity losses (wasted time) and maintain the benefits of person-to-person collaboration. They decided to use Web conferencing internally for collaboration and externally for sales demonstrations to customers. Their two options were (1) a pay-per-use basis or (2) a per user licensing plan based on the number of seats or participants. The decision would depend on cost comparisons based on these data estimates:

Approximately 100 meetings per year
An average of 12 participants per meeting
Each meeting lasting about one hour, which takes into consideration the need to get the meeting set up at least 15 minutes in advance and meeting for 45 minutes
250 unique participants, consisting of 50 employees and 200 customers
Research the costs of a pay-per-use plan vs. a per user licensing plan based on the number of seats or participants for Zoom and Cisco’s WebEx. Or evaluate two other pieces of web-based meeting software. Precise cost comparisons are difficult because there are so many variables, but a general cost analysis between Zoom and WebEx or other software is feasible.
Design a spreadsheet that shows cost comparisons of the vendors’ licensing options and the pay-per-use option using the data estimates.
Identify other criteria that should be taken into account when making such a decision (for example, vendor support or the ability to integrate with Outlook).
Based on your analysis, make a fully documented recommendation to the owners.
Prepare an Excel spreadsheet that fulfills the criteria for this SLP assignment. Be sure to use formulas and graphs within Excel so they can be reviewed. In a Word document, interpret the meaning of your analytical findings from the spreadsheet. The Word document should present the results to the owners of Spinner Media Services.

What are the benefits of conducting comparative research?

Based on the articles assigned for this week, choose and answer ONE question:

1. What are the benefits of conducting comparative research?

2. What are the challenges in conducting comparative research?

Compare and contrast the way in which Harriet Beecher Stowe and Khaled Hosseini present trauma in Uncle Tom’s cabin and the Kite Runner

Compare and contrast the way in which Harriet Beecher Stowe and Khaled Hosseini present trauma in Uncle Tom’s cabin and the Kite Runner

Examine the view that in both texts ‘cultural trauma stems from social injustice and racial inequality’

Compare and contrast MD5sum and SHA1sum hashing algorithms.

Complete the Applying Encryption and Hashing Algorithms for Secure Communications lab. As you go through the lab, be sure to:

Perform all screen captures as the lab instructs and paste them into a Word document. (All labs are completed, please see the attachment)

In the same Word document:

Explain the concepts and procedures involved in applying encryption and hashing algorithms by addressing the following:
Explain why hash values are an important part of performing a forensic investigation.
Explain why (or why not) hash values typically change if data is modified.
Identify a method of securing message integrity during e-mail communications without encrypting the e-mail
Explain the purpose of the –e switch in the GnuPG command.
Compare and contrast MD5sum and SHA1sum hashing algorithms.
In what ways are they similar (compare)?
In what ways do they differ (contrast)?
Identify the cryptographic algorithms used during the lab.
Explain what is required to decrypt an encrypted message.
Now apply what you learned in the lab to the following scenario.

Scenario
Cybercriminals have orchestrated a hybrid attack on your city’s municipal website. The Federal Bureau of Investigation (FBI) has asked that the municipal website be taken offline and that infrastructure that supports the website be isolated until a thorough investigation has been completed.

Your Role
You have been asked to prepare a brief report for city leaders to address the problem.

Requirements
Continue working in the same document; simply start your report on a new page with an appropriate heading.

In your report you will need to:

Describe different types of attack strategies attackers may employ. You must choose at least four of the following :
Cross-site scripting (XSS) attack.
Cross-site request forgery (CSRF).
SQL injection.
Code injection.
Command injection.
Parameter tampering.
Cookie poisoning.
Buffer overflow.
DMZ protocol attack.
Zero-day attack.
Authentication hijacking.
Log tampering.
Directory traversal.
Cryptographic interception.
URL interpretation.
Impersonation attack.
Evaluate mitigation strategies for each type of attack.
Recommend a course of action for addressing the web attack. Note: To make a recommendation, you will need to make your own assumptions about the type of attack on the city’s municipal website.
Support your work with references to at least three recent, relevant professional resources.

Additional Requirements
Include a title page and references page.
The length will vary depending on how you paste the screen captures. Your report should be 3–4 pages in length.
Cite at least three current, relevant professional resources.
Follow current APA style and format for references.
Use Times New Roman, 12 points, double-spaced.

Describe the major components of cyber defense laws and policies pertaining to the storage and transmission of data.

Assessment Instructions

Write an analysis of key legal and ethical issues relevant to creation and maintenance of a secure enterprise information security infrastructure. Complete the following:

Discuss the ethical implications of monitoring user compliance with secure transmission activities as components of a framework for a secure enterprise information infrastructure.
Describe the legal and ethical issues that relate to monitoring user compliance with e-mail security policies and procedures as components of a framework for a secure enterprise information infrastructure.
Identify resources that can be used to assess the likelihood of environmental and legal risks.
Describe the major components of cyber defense laws and policies pertaining to the storage and transmission of data.
Describe the various legal and ethical issues that relate to specific phases of penetration testing.

Explain how risk analysis supports your development of a secure network infrastructure (SNI).

In your role as information security professional serving the CIO, you have been asked to create a memo to the risk management and security leadership that details items they should consider in their planning regarding secure network infrastructure assurance.

Use the organization and characteristics described in the Case Study: Global Widgets Inc. document found in the Required Resources as the context in which to create the memo.

Include the following in your professionally formatted memo:

Explain how risk analysis supports your development of a secure network infrastructure (SNI).
Explain how information security policy supports development of your SNI.
Identify organizational roles that can contribute to risk analysis of a SNI.
Determine organizational roles that can contribute to the creation of information security policy that supports development of a secure network infrastructure.
Evaluate the factors that influence design of a SNI including centralized versus decentralized administration.
Outline the legal and ethical impact that activities related to SNI may have on employee civil and privacy rights.
Recommend information security policy and risk management activities that will support the creation of a SNI.

Explain the role that anti-malware software will play in securing e-mail. What software would you use? Why?

Assessment Instructions

In your role as information security professional serving the CIO, you have been asked to create a 6–8 page e-mail security plan that will become part of the corporate knowledge base.

Use the organization and characteristics described in the Case Study: Global Widgets Inc. document found in the Required Resources as the context in which to create your plan.

Include the following in your professionally-formatted plan:

Diagram and describe the basic components of the secure e-mail system.
Discuss how a move to the cloud will affect your e-mail security plan.
Describe threats and vulnerabilities that are specific the organization’s secure e-mail management system.
Explain the role that anti-malware software will play in securing e-mail. What software would you use? Why?
Describe the technical controls that you will employ to enforce e-mail security policy.
Describe personnel controls that are available to enforce e-mail security policy.

Produce a report of no more than 3000 words (+/- 10%), plus appendices, that identifies IT requirements, and contains a plan for the procurement, deployment, maintenance and support of the required IT.

You will identify a business or organisational problem that requires an IT solution. This must NOT be a situation where a software solution is already in place.

You will produce a report of no more than 3000 words (+/- 10%), plus appendices, that identifies IT requirements, and contains a plan for the procurement, deployment, maintenance and support of the required IT.

The steps covered will include: sign-off of requirements, identification of at least two software options, selection of preferred software, identification of immediate and medium-term hardware needs, evaluation of the software/prototype and details of maintenance and security procedures.

additional note: Please use attached “RSO form” to be used in the coursework and also use “solution table” to be used in the solution section as the template. Also the business for the work is already chosen and its a “vintage clothing shop” and the work will be about “Creating an Ecommerce website for a vintage clothing shop”

How can a hotel that is underperforming their comp set (being beaten) use a Monthly STAR report to improve its performance?

“Monthly STAR Report-Full Service Hotel”
Answer the following questions ;
(1) In your opinion, what are the most important three tabs in a Monthly STAR Report? And Why?
How can a hotel that is underperforming their comp set (being beaten) use a Monthly STAR report to improve its performance? (Note: The subject hotel in the attached STAR report may outperform their comp set in some areas.

(2 ) is asking a general question of how to use a Monthly STAR report to improve a hotel performance)
Note;This case analysis requires you to analyze a hospitality business situation, answer questions, and demonstrate knowledge-based on information gained from the prior and current course material. Course material or content is attached . In addition, two credible external sources (outside of course material) are required to support each of your case analysis.

Please see below.
Answering Case Questions:
Responses which are purely opinion and anecdotal are not considered to be substantive in nature.
Each question response should provide the depth of analysis, significant insight, and application to at least one course concept from prior or current course material(see course content pdf attached) and make sure you cite .