“Cyber policy can influence behavior on end users from a security perspective” Provide a 500 word (or 2 pages double spaced) minimum reflection on how Use of proper APA formatting and citations. If

“Cyber policy can influence behavior on end users from a security perspective”

Provide a 500 word (or 2 pages double spaced) minimum reflection on how

Use of proper APA formatting and citations. If supporting evidence from outside

resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

Subject: Physical SecurityGo to http://www.fullspectrumsolutions.com/cri_explained.htm to research the Color Rendition Index (CRI) and some of the common light sources’ color temperature and CRI va

Subject: Physical Security

  • Go to http://www.fullspectrumsolutions.com/cri_explained.htm  to research the Color Rendition Index (CRI) and some of the common light sources’ color temperature and CRI values.  After you have read this, please use this article and any others, including the course text to answer the following. Please make sure that you have written at least 1 page and have cited and referenced all resources.

    Question(s):

    1. What is CRI?
    2. Why is this important to know and important to physical security?

300 words + 1 reference with citation

COBIT Planning”  Please respond to the following:

  • Describe how organizations establish the five (5) COBIT IT governance focus areas: strategic alignment, value delivery, risk management, resource management, and performance management
  • Suppose senior management has tasked you with the planning of the COBIT compliance project. In terms of the COBIT framework, predict which key areas are likely to be problematic to implement. Suggest at least two (2) possible solutions to these problematic areas.

Discussion 8

Select a particular company and/or industry that is using cloud computing in a certain manner. Briefly identify that company or industry in your post and discuss the potential value that cloud computing may have to that organization. How might this company be using or use cloud computing? 

Must be 150-200 workds with at least on proper citation

IT quiz

Please answer the following questions in a word doc

Thank you

 a)  Which of the following is considered the first line of defense against human behavior? Explain.

      A) PoliciesB) CryptographyC) Physical securityD) Business continuity planning

b)  Select from the following the best definition of security risk analysis:A) Risk analysis looks at the probability that a vulnerability exists in your system.B) Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system.C) Risk analysis looks at the probability that a hacker may break in to your system.D) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.E) Risk analysis looks at the consequences of being connected to the Internet.

c)  Which answer governs how a network might be configured and operated as well as how people are expected to behave on it? Explain.A) Network documentationB) RegulationsC) ProceduresD) Policies

d)  Which answer is one that contains actions to be taken in a certain situation like how long before users must change passwords, actions to take if an infiltration takes place or a users steals corporate date? Explain. A) PoliciesB) DocumentationC) RegulationsD) Procedures

PROBLEM 2 – Networking Fundamentals (20 points)(5 pts each)

a)  While using which type of networking device would each host ‘see’ all other traffic on the network? Explain.A) Network SwitchB) Network RouterC) Network HubD) Token Ring Network

b)  Which type of network device divides broadcast domains? Explain.A) SwitchesB) HubsC) RoutersD) Bridges

c)  What destination MAC Address would be added to a packet on the route to a remote computer? Explain.A) MAC Address of the far side of the default gatewayB) MAC Address of your computerC) Exterior MAC Address of the remote ServerD) Interior MAC address of default gateway

d)  You have two network segments separated by a router. A host on one segment does an ARP request for a certain IP Address. Would that request cross the router? Explain.A) Yes, because routers forward broadcastsB) Yes, if there is a hub between segmentsC) Only if you have a Caching EngineD) No, routers do not forward broadcasts

PROBLEM 3 – Cryptography Fundamentals  (20 points)(5 pts each)

a)  Users in your organization sign their emails with digital signatures. What provides integrity for these certificates? Explain.A) HashingB) EncryptionC) Non-repudiationD) Private key

b)  Bob wants to send a secure email to Alice so he decides to encrypt it. Bob wants to ensure that Alice can verify that he sent it. Which of the following does Alice need to verify the certificate that Bob used in this process is valid? Explain.A) Alice’s public keyB) Alice’s private keyC) Bob’s private keyD) Bob’s public keyE) The CA’s private keyF) The CA’s public key

c)  Which cryptographic system provides both data security and non-repudiation? Explain.A) 3DES – Triple Data Encryption StandardB) PKI – Public Key InfrastructureC) DES – Data Encryption StandardD) AES – Advanced Encryption Standard

d)  When a user needs to provide message integrity, what options may be the best?A) Send a digital signature of the message to the recipientB) Encrypt the message with a symmetric algorithm and send itC) Create a checksum, append it to the message, encrypt the message, then send it to the recipientD) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key 

PROBLEM 4 – Network Vulnerabilities, Attacks and Countermeasures (20 points)(5 pts each)

a)  Which of the following is not to be considered a cyber attack? Explain.A) A nuclear electromagnetic pulse (EMP) that knocks out all electronic devices.B) Trust exploitation.C) Access control.D) Port redirection.E) Man-in-the-middle.

b)  Which denial of service attack involves sending crafted ICMP packets which have a source address of the victim and all responses go to the victim?A) Macro VirusB) SYN FloodC) Smurf AttackD) Buffer Overflow

c)  Security experts at your organization have determined that your network has been repeatedly attacked from multiple entities in a foreign country. Research indicates these are coordinated and sophisticated attacks. What best describes this activity?A) Targeted attackB) SniffingC) Spear phishingD) Advanced persistent threat

d)   Which component of an effective penetration test involves contacting users and asking questions about the corporate network in an attempt to gather intelligence? Explain.A) Man-in-the-Middle AttackB) PhishingC) Spear PhishingD) Social Engineering

PROBLEM 5 – Authentication and Authorization Controls (20 points)(5 pts each)

a)  Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages:

      — Epub(B)( K, Sigprv(A)(K))– EK(M)

      “E” means encryption and “Sig” means digital signature. Which of the following statement(s) is true? Briefly explain why or why not.(A) Only B can decipher the contents of the message M(B) B is certain that the message M is from A(C) B can prove to a third party that the message M arrived from A.

b)  The security manager at your company recently updated the security policy. One of the changes requires dual-factor authentication. Which of the following will meet this requirement? Explain.A) Fingerprint scan and retina scanB) Password and PINC) Hardware token and PIND) Smart card

c)  Apart from having strong passwords, what can mitigate brute force logon attempts? Explain.A) Automatic Account LockoutsB) Renaming Administrator AccountsC) Disable the Administrator AccountD) Security Audits

d)  A network includes a ticket-granting ticket server. Which of the following choices is the primary purpose of this server? Explain.A) Access controlB) AuthenticationC) AuthorizationD) Identification

Positioning Technologies

DISCUSSION -3                     Positioning Technologies

Question:

1.     Nowadays, various indoor and outdoor positioning (i.e. identify the position of an object) applications are making use of 3G and wifi technology. Do your own research and reference at least 2 articles related to this topic.

ØWrite a post (300-500 words) on the discussion forum to summarize your research. In your summary:

1.      Identify and briefly describe TWO positioning technologies and their applications. You need to name specific application for example “Find my iPhone” is one such application making use of positioning technology. 

2.      Discuss the pros and cons of each positioning technology identified above.

Submission:

1.     Post your primary response by Tuesday August 8, 2017 (23:59PM) 

Marking criteria

Your posts will be evaluated based on the following criteria:

  1. Using appropriate APA citation/reference style
  2. Provide concrete examples in your discussion and reply
  3. Identify and describe the correct positioning technologies, their applications and their pros and cons.
  4. In your reply, you can challenge something that has been posted or pose a related question or issue or suggest a different perspective or interpretation 
  5. Provide your comment on a post and summarize why you agree/disagree to the post.
  6. Pull in related information from other sources with proper citations & references 
  7. Writing skills and structure of the discussion

A prestigious university has recently implemented

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records. 

You met with various university subject matter experts and have determined the following after performing various business analysis processes:

  • Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the Art Faculty, Computer Technology Faculty, Language Faculty, and Science Faculty. Each faculty member has an assigned Dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
  • Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
  • There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering to name a few. 
  • The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
  • The university identifies each student by his or her name, date of birth, social, and professional study program.

Using these findings, write a three to four (3-4) page paper in which you:

  1. Analyze the university’s requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
    1. Provide an Entity Relationship Model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
    2. Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course or students can only be enrolled in one program.
  2. Create the primary key and foreign keys using a UML Class diagram for each table.
  3. Suggest at least four (4) types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could assist executives of the university.
  4. As an alternative for development of the database, you are considering outsourcing the functions above. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
    1. Suggest three (3) vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one (1) of these three (3) vendors.
    2. Compare and contrast the key aspects that each system offers. Examples of system aspects include but not limited to cloud based, pricing model, open source, etc.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.