IT Management

IT Audits and Planning

The purpose of this lab is to show how to audit the remote access domain. You will identify common risks, threats, and vulnerabilities found in the remote access domain; assess common risks, threats, and vulnerabilities found in the remote access domain; identify network and security policies to properly secure the remote access domain portion of the network infrastructure; and audit and assess the implementation of security controls in the remote access domain. Lab 7.1a You will use Microsoft Word to develop your homework assignment by completing the sections listed below: Review the following scenario: You are a security consultant for an information systems security firm and have a new healthcare provider client under HIPAA compliance. Your new client wants to know the requirements and the business drivers for securing the remote access domain in a healthcare environment because it requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client who also wants you to perform a remote access domain compliance audit per DoD remote access hardening guidelines and baseline requirements. Both organizations want you to focus on the remote access domain only, and you are to use the DoD-provided frameworks and STIGs previously found to summarize a remote access domain hardening strategy. With the information you read from Unit IV and Unit VI, identify the risks, threats, and vulnerabilities commonly found in the remote access domain’s security solution. Document these in your text document. Launch your Web browser. Navigate to the following website https://public.cyber.mil/stigs/ View_and_Download_STIGs.png Search for the ‘Desktop Application’ Security Technical Implementation Guide (Version 4, Release 5) document from the STIG database website and other NIST standards you discovered in previous labs. Sunset-DesktopApplicationsGeneralSTIG-Ver4Rel5.PNG Summarize these in your homework assignment. Lab 7.1b Navigate to the following website: https://vaulted.io/library/disa-stigs-srgs/virtual_private_network_vpn_security_requirements_guide This document reviews the potential vulnerabilities and configuration recommendations for secure remote access as per DoD guidelines. Review the following concepts from this overarching DoD standards document for secure remote access and discuss these guidelines in your homework assignment: Security Considerations for Remote Access and Telework Assessment, Enforcement, and Remediation Services Endpoint Security Security Readiness Review Requirements Lab 7.1c Review some more remote access security checklists and guideline documents, by visiting the following links: Remote Access Policy STIG Remote Endpoint STIG Review the security controls listed in each of the Secure Remote Access checklists to help mitigate the risks, threats, and vulnerabilities within the remote access domain. Review how these DoD guideline documents can help organizations baseline their security and achieve the compliance requirements in both government and commercial organizations. Discuss these guidelines in your homework assignment. Lab 7.2 Write an executive summary that summarizes the top remote access domain risks, threats, and vulnerabilities and include a description of the risk mitigation tactics you would perform to audit the remote access domain for compliance. Use the U.S. DoD remote access hardening guidelines as your example for a baseline definition for compliance. NOTE: When you submit your homework assignment, you can combine the assignments into one document for grading. Please clearly mark the answers for Lab 7.1a, Lab 7.1b, Lab 7.1c, and Lab 7.2 within your submission by labeling those sections within your assignment.

Aug 14th, 2021

IT Management

IT Network Intrusion Detection

Submit a 10 page research paper with APA standard annotations on an approved topic (see pre-approved topics below). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and other non-peer-reviewed sources are not acceptable).   Requirements:   The paper must by at least 10 pages double-spaced 1″ margin all around Black12 point fonts (Times New Roman, Arial, or Courier) Correct APA format citations Graphics are allowed but do not apply for the minimum page count. A minimum of 10 references are needed. The paper is automatically submitted to Turnitin to against plagiarism Assignment Rubric (100%) Synthesis of Concepts 60% Writing Standards – APA format   20% Timeliness 20%

Aug 14th, 2021

IT Management

IT Audits and Planning | GET SOLUTION

The purpose of this lab is to show how to audit the remote access domain. You will identify common risks, threats, and vulnerabilities found in the remote access domain; assess common risks, threats, and vulnerabilities found in the remote access domain; identify network and security policies to properly secure the remote access domain portion of the network infrastructure; and audit and assess the implementation of security controls in the remote access domain. Lab 7.1a You will use Microsoft Word to develop your homework assignment by completing the sections listed below: Review the following scenario: You are a security consultant for an information systems security firm and have a new healthcare provider client under HIPAA compliance. Your new client wants to know the requirements and the business drivers for securing the remote access domain in a healthcare environment because it requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client who also wants you to perform a remote access domain compliance audit per DoD remote access hardening guidelines and baseline requirements. Both organizations want you to focus on the remote access domain only, and you are to use the DoD-provided frameworks and STIGs previously found to summarize a remote access domain hardening strategy. With the information you read from Unit IV and Unit VI, identify the risks, threats, and vulnerabilities commonly found in the remote access domain’s security solution. Document these in your text document. Launch your Web browser. Navigate to the following website https://public.cyber.mil/stigs/ View_and_Download_STIGs.png Search for the ‘Desktop Application’ Security Technical Implementation Guide (Version 4, Release 5) document from the STIG database website and other NIST standards you discovered in previous labs. Sunset-DesktopApplicationsGeneralSTIG-Ver4Rel5.PNG Summarize these in your homework assignment. Lab 7.1b Navigate to the following website: https://vaulted.io/library/disa-stigs-srgs/virtual_private_network_vpn_security_requirements_guide This document reviews the potential vulnerabilities and configuration recommendations for secure remote access as per DoD guidelines. Review the following concepts from this overarching DoD standards document for secure remote access and discuss these guidelines in your homework assignment: Security Considerations for Remote Access and Telework Assessment, Enforcement, and Remediation Services Endpoint Security Security Readiness Review Requirements Lab 7.1c Review some more remote access security checklists and guideline documents, by visiting the following links: Remote Access Policy STIG Remote Endpoint STIG Review the security controls listed in each of the Secure Remote Access checklists to help mitigate the risks, threats, and vulnerabilities within the remote access domain. Review how these DoD guideline documents can help organizations baseline their security and achieve the compliance requirements in both government and commercial organizations. Discuss these guidelines in your homework assignment. Lab 7.2 Write an executive summary that summarizes the top remote access domain risks, threats, and vulnerabilities and include a description of the risk mitigation tactics you would perform to audit the remote access domain for compliance. Use the U.S. DoD remote access hardening guidelines as your example for a baseline definition for compliance. NOTE: When you submit your homework assignment, you can combine the assignments into one document for grading. Please clearly mark the answers for Lab 7.1a, Lab 7.1b, Lab 7.1c, and Lab 7.2 within your submission by labeling those sections within your assignment.

Aug 14th, 2021

IT Management

The Implantation of RFID’s or Information Storing Devices into Humans.

Critically examine the implantation of RFID’s or information storing devices into humans. Must use scholarly academic journals within 3 years old. Include in-text citations and reference list.

Aug 14th, 2021

IT Management

The Technology Acceptance Model (TAM)

The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness. Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?  cite your sources (3 minimum) and include a reference list at the end

Aug 14th, 2021

IT Management

Emerging Technologies

You have been asked to make an “emerging technologies” presentation as part of a panel discussion at your company’s next senior leadership meeting. The topic for this panel is Cybersecurity for the Internet of Things. The panel moderator, your company’s Chief Technology Officer, has asked the speakers to each focus on one of four categories of enabling technologies for the Internet of Things (International Telecommunications Union, 2005): Tagging things: RFID and similar technologies Feeling things: Sensor technologies Thinking things: Smart technologies Shrinking things: Nanotechnology Pick one of these categories. Research technologies which fit into your category (in the context of the Internet of things). Then present a summary of your research and findings as a background paper to be shared with the moderator and other panelists prior to the meeting. At a minimum, your background paper must address the following questions. 1. What is your selected category? (Name and describe it.) 2. What are the leading technologies in your selected category? (Name and describe at least three.) 3. How do these technologies contribute to the Internet of Things? (What are the benefits / what features or capabilities do they provide?) 4. What emerging risks to privacy and security have been identified for technologies in your selected category? Format your analysis and findings as a background paper and post it as a response to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end

Aug 14th, 2021

IT Management

Panel Presentation about Privacy

Coordinators of an upcoming conference, attended by federal government IT managers and staff, invited you to participate in a panel presentation about privacy. For this activity, prepare a 5 to 7 paragraph briefing statement which answers the following four questions. Use information from the weekly readings as your research material. Go to Content >> Course Resources >> Expanded Explanation for Discussion Question Responses to learn more about the format requirements for a “briefing statement.” Definitions: Privacy has many definitions. When examining data protection and privacy laws and practices, it can be helpful to focus on four categories or classes of privacy. Information privacy is concerned with establishing rules that govern the collection and handling of personal information. Examples include financial information, medical information, government records and records of a person’s activities on the Internet. Bodily privacy focuses on a person’s physical being and any invasion thereof. Such an invasion can take the form of genetic testing, drug testing or body cavity searches. It also encompasses issues such as birth control, abortion, and adoption. Territorial privacy is concerned with placing limits on the ability to intrude into another individual’s environment. “Environment” can include the home, workplace, or public space. Invasion into an individual’s territorial privacy typically takes the form of monitoring such as video surveillance, ID checks, and use of similar technology and procedures. Communications privacy encompasses protection of the means of correspondence, including postal mail, telephone conversations, email, and other forms of communicative behavior and apparatus. Privacy Impact Assessment (PIA): A PIA is both a process and a document. It is a process that focuses upon identifying and assessing risks related to privacy of data handled by a specific IT system or database. It is a process that communicates the results of the PIA process to stakeholders. Released PIAs are either fully available to the public, while redaction removes sensitive/non-public information in other PIAs. When responding to this discussion, prepare a 5 to 7 paragraph briefing statement which answers the following four questions: 1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. “the average person” definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof). 2. What are some important best practices for protecting privacy for information collected, stored, used, and transferred by the US federal government? Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization’s IT systems and databases. 3. Explain why federal government agencies and departments required to complete PIA’s. Should every federal IT system have a PIA? Why or why not? 4. Name and briefly describe 3 benefits to citizens which result from the use of PIA’s. (Considering citizen’s needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.) Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. To ensure you include all required elements, be sure to use the Discussion Rubric when creating your initial response, critiques, and replies.

Aug 14th, 2021

IT Management

IT Forensics

Explain how to sort and analyze images files using P2 Commander’s sorting feature. Explain how to extract steganographic sequestered data from an identified image files while conserving their integrity

Aug 14th, 2021

IT Management

IT Network Intrusion Detection | GET SOLUTION

Submit a 10 page research paper with APA standard annotations on an approved topic (see pre-approved topics below). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and other non-peer-reviewed sources are not acceptable).   Requirements:   The paper must by at least 10 pages double-spaced 1″ margin all around Black12 point fonts (Times New Roman, Arial, or Courier) Correct APA format citations Graphics are allowed but do not apply for the minimum page count. A minimum of 10 references are needed. The paper is automatically submitted to Turnitin to against plagiarism Assignment Rubric (100%) Synthesis of Concepts 60% Writing Standards – APA format   20% Timeliness 20%

Aug 14th, 2021

IT Management

The Implantation of RFID’s or Information Storing Devices into Humans. | GET SOLUTION

Critically examine the implantation of RFID’s or information storing devices into humans. Must use scholarly academic journals within 3 years old. Include in-text citations and reference list.

Aug 14th, 2021

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.