Categories
Computer Science homework help

1. Provide an example of the upside of risk and explain the concept. 2. Explain

1. Provide an example of the upside of risk and explain the concept.
2. Explain how Enterprise Risk Management varies from traditional risk management?
3. What are five examples of internal and external drivers of an organization’s risk culture?
4. Provide an example company, give a description of the organization and its work area. Define what a SWOT is.  Perform a SWOT for your example company and rationalize each of the company characteristics you choose.
5. Explain what a KPI is.  How might we use KPI’s in doing a risk analysis for an organization.  Choose five KPI’s for the Amazon organization and explain why you have made your choices. 
6. Explain the Delphi Techniques.  How might it be used in coming to consensus on risk identification related to an IT driven project?
7.  A popular hotel has continued to lose business in its room service food sales over the last five years.  Using the Six Sigma DMAIC process explain what you would do in each step of the process to improve the sales – provide relevant, practical details. What statistics would you apply and why?
8.  Explain the Plan, Do, Check, Act concept – provide a practical example.  How might it be applied in improving project quality?
9. Explain the concept of Continuous Improvement – provide an example. How might it be combined with a Lean approach.
10. Explain the primary inputs and outputs in the Project Management Institute Quality Knowledge Area.8.  Explain the Plan, Do, Check, Act concept – provide a practical example.  How might it be applied in improving project quality?
11. Explain the concept of Continuous Improvement – provide an example. How might it be combined with a Lean approach.
12. Explain the primary inputs and outputs in the Project Management Institute Quality Knowledge Area.
Requirements:
 Your response will be considered complete, if it addresses each of the components outlined above.
Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
Include your best critical thinking and analysis to arrive at your justification.
Text
Title: Managing Project Risks 
ISBN: 9781119489733 
Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 
Publisher: John Wiley & Sons 
Publication Date: 2019-08-13

Categories
Computer Science homework help

Instructions Instructions: Choose 1 of the next 3 questions from your readings D

Instructions
Instructions:
Choose 1 of the next 3 questions from your readings
Discuss Best Practices for Microsoft Windows Network Security using the text Internet, and/or your job as reference for full credit
Discuss best practices in terms of tasks for Security Administrators using the text Internet and/or your job as reference for full credit
Discuss techniques to harden Microsoft clients and servers using the text, Internet and/or your job as reference for full credit
Submission Instructions: The paper must be at least 300 words.

Categories
Computer Science homework help

Project description • The aim of the project is to show a mastery/integration of

Project description
• The aim of the project is to show a mastery/integration of the security concepts and technologies learnt in ISOM340.
• Each person will look for an organization that will allow them to assess their security preparedness, evaluate/audit their enterprise security system, identify outstanding issues and recommend a defense in depth security system that address these issues.
Suggested presentation template system
a) Describe the organization/its environment
b) Describe the major data/systems that they have to protect
c) Describe the top threats that the company is facing?
d) What are the legal issues and regulations that the company must comply with?
e) Describe the current enterprise security systems giving details on how they are using security controls to minimize the risks
f) What are the top major security issues that need to be addressed?
g) With the aid of diagrams, Recommend and describe a defense in depth state of the art system that protects the above assets and addresses the security issues
h) Do a cost-benefit analysis to demonstrate that your recommendation is viable
i) Suggest a phased implementation plan for the new system considering availability issues and identify new personnel required if any.

Categories
Computer Science homework help

  •Topics of project : Anything that has to do with data communications and netw

 
•Topics of project : Anything that has to do with data communications and networking.
–Understand of recent development of networking topics (survey paper), 4+ pages required (including references). You can use tables to summarize existing work.
–Implementation some network related applications (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))
–Modeling and simulation of networks (need to design your own scenario, comparisons with existing work are preferred (i.e. better performance))
Uploaded a template of the paper
Also need a PowerPoint presentation on the same topic  

Categories
Computer Science homework help

SWOT Analysis Content “My Individual Development Plan’ [Assignment Instruction

SWOT Analysis Content
“My Individual Development Plan’ [Assignment Instructions]
Write a summary paper about the skills that you would like to develop, enhance or improve upon as you move from this professional development course in pursuit of a graduate professional professional (internship or work) experience.
This paper should be labeled titled ‘My Individual Development Plan (IDP)’. Your IDP will serve as a resource to help guide your career development.
When creating your IDP, take into account your interests and strengths, while considering what skills and qualifications are necessary for your chosen career.
An IDP provides should also serve as a point of reference for conversations with your career advisor (and other mentors) about how to achieve your goals and/or evolve them.
This is a dynamic document that will be revised repeatedly because it reflects ongoing consideration of your short- and long-term goals. Ideally, it should provide you with a guideline that can measure progress towards your goals and be revised as your plans evolve. 
Your submission should be a minimum of one – two pages of content in length. Please type the question as well as your answer. Properly cite any source utilized in APA format.

Categories
Computer Science homework help

 Write a 7-10 pp. paper (or 1750 to 2500 words, not counting works cited) that t

 Write a 7-10 pp. paper (or 1750 to 2500 words, not counting works cited) that takes a position informed by research on the ethical dilemma(s) associated with the case study you explored in steps 1-4. 
All the info needed is attached. 
THE TOPIC OF THE PAPER IS;  “Misuse of Personal Information and Data”
 

Categories
Computer Science homework help

In this assignment, you are the Lead Systems Administrator for a mid-sized healt

In this assignment, you are the Lead Systems Administrator for a mid-sized healthcare organization. They are currently considering moving several of their on-premises servers to the Cloud but are concerned about their security and accessibility to data. Several of the servers contain patient PII (Personally Identifiable Information) that is protected by federal law. You’ve been asked to research the 3 major public cloud providers to determine:
Is Public Cloud is a viable solution?
If it is, which cloud deployment method should be used? Why?
Finally, what are your professional recommendations on how to move forward?
Use the information you gathered in “Lab #10 – Researching AWS, Azure and Google Cloud” to inform your decision.
Deliverable
The deliverable for this assignment will be a 5-10 slide PowerPoint presentation that presents your research and answers the 3 questions stated above. It should be formatted in a visually appealing way and written so a non-technical reader (like a manager) would be able to understand the information.
Use the following link (and Google) to see examples of professionally formatted PowerPoints used for this purpose. They will serve as an example of the quality that is expected: https://www.slideteam.net/finding-and-recommendation-marketing-product-sales-distribution-network-geography-manufacturing.html

Categories
Computer Science homework help

The use of playbooks is very common in sports. They can also serve very impor

The use of playbooks is very common in sports. They can also serve very important purposes in business—as a user manual that outlines knowledge needed so anyone on your team can help ensure business continuity. But most importantly, security playbooks can keep your business running smoothly if a business experiences attacks or intrusions that can occur at any time.  
For this assignment, you work for an enterprise business. The board of directors is worried about recent ransomware attacks that have happened across several industries that have made the news. They want to make sure the organization is prepared for potential attacks. You have been asked to present to the board of directors 3 playbooks that would be utilized as part of the incident response plan specifically for risk management at the business level. Create a playbook for each of the following:
SQL Injection 
Website Compromise 
Exploitation of Windows 7 Workstations
Read Cybersecurity in 2021 from All Hands on Tech for help completing this assignment.  
To complete this, you should create a 12- to 16-slide presentation with speaker notes and media such as images, video, or tables that will be presented to the board of directors. Specifically, your presentation should do the following:  
Explain the importance of using playbooks to risk management.  
Summarize the risks of the 3 threats listed above and recommendation of remediation plan presented in the labs associated with SQL Injection, Website Compromise, and Exploitation of Windows 7 Workstations. 
Summarize incident response plans for each of the 3 attack scenarios listed above.  
Justify NIST implementation, including an explanation of why it is the best option rather than another quicker and easier process. 
Identify additional tools and systems that might reduce or mitigate the risk of the 3 identified threats.
 

Categories
Computer Science homework help

1. What is a Botnet? (1 point)  2. In this class you tinkered with an IDS, Snort

1. What is a Botnet? (1 point) 
2. In this class you tinkered with an IDS, Snort. Name 5 IDS alternatives. (1 point) 
3. International efforts to support Ukrainian cyber defense  (3 points):  
Table 1 on this website (https://carnegieendowment.org/2022/11/03/evaluating-
international-support-to-ukrainian-cyber-defense-pub-88322) lists 6 such effort areas. Chose any 3 and write a 100-word technical description for each. 
 
4. Cyber Threat Intelligence Analysis (1 point each, total 5 points): a. You are a cyber threat analyst at an organization. Right now, most of your organization employees are working remotely. Your Chief Information Security Officer (CISO) needs your help vetting the current breath of communications technology offerings. She wants you to compile a list of known vulnerabilities in Zoom, Cisco WebEx, and Microsoft Teams. (you have to compile a list of known vulnerabilities in these specific tools. )
b. Given these known vulnerabilities which one will you recommend? Provide a security related reason for your choice. c. After receiving your recommendations, she also wants to you to identify and compile a list of websites/resources, where official patch notes for these communications’ technology offerings are available.  
d. Investigate the contents and timings of these patch notes. What details are available?  
e. Should these patch notes influence your previous recommendation? Do you want to change your recommendation?  
 

Categories
Computer Science homework help

please explain the purpose of using the password cracking utilities and discuss

please explain the purpose of using the password cracking utilities and discuss the relevance to cybersecurity.