Attached Files (PDF/DOCX): Essay Guideline.docx
Note: Content extraction from these files is restricted, please review them manually.
Attached Files (PDF/DOCX): Essay Guideline.docx
Note: Content extraction from these files is restricted, please review them manually.
Policy Analysis Matrix:
PART 1: You have been exposed to hardening security in many aspects of Windows systems. Pick any one aspect (e.g., password policy) and explain why you consider it important to harden it. Please include any realistic threats in that aspect and also possible remedies.
You may not duplicate someone else’s topic, so check before you research. PLEASE DONT DISCUSS ON THE FOLLOWING AS SOMEONE ELSE ALREADY DID IT. HARDERING PASSWORD POLICY, HARDERING WORKSTATIONS, ACCOUNT LOUCKOUT POLICY.
PART 2: Select a topic covered in this module. Go to the SANS website (www.sans.org), locate the Reading Room, and find an article that relates to your selected topic. Write a brief report about the article, including the relevance of the article to the module, issues raised, your opinion of the issues (agree or disagree and why), and recommendation(s), if any. ” FOOTPRINTING”
This assignment is about:
It is a research-based analytical report, not a technical lab.
Length: 25003000 words
Individual work
APA references required
You must:
Then for EACH attack, you must fully analyze it using security concepts learned in class.
For every attack, you must clearly describe:
Your paper must include:
Explain:
Define important terminology:
Explain why these terms matter in security analysis.
Explain:
Full detailed explanation using course terminology.
Deep explanation:
One strong paragraph summarizing:
APA format
Proper citation required
Using the templates that are attached perform the steps and answer the questions while providing screenshots when requried. Use virtual box to create virtual machine with an Ubuntu OS system.
Attached Files (PDF/DOCX): Project 3 Scripting.docx, Project 3 Scripting Submission Template.docx
Note: Content extraction from these files is restricted, please review them manually.
Submit a 4 – 6 page Report with a minimum of 3 credible sources. Your paper should comply with APA formatting guidelines
Develop a strong understanding of your selected countrys (Bahrain)cybersecurity and privacy laws before you compare them to the U.S.
1.Country Overview
o Basic context (region, economy, tech maturity)
2. Cybersecurity Laws
For each major law/framework, include:
o Name of law
o Year enacted
o Purpose and scope
o Key requirements
o Enforcement agencies
3. Data Privacy / Data Protection Laws Include:
o Data covered
o Consent rules
o Data subject rights
o Breach reporting requirements
o Penalties
o Cross- border data transfer rules
4. Real- World Case Example
Summarize one cybersecurity or privacy incident from your country.
Explain:
o What happened
o What law(s) applied
o Penalties or outcomes
o Why it matters
Unit 6 Assignment: Incident Response and Recovery
Outcomes addressed in this activity:
Unit Outcomes:
Course Outcome:
IT484-4: Create an incident response plan, integrated with cybersecurity policy, which assists with organizational recovery.
Purpose
Having a sound plan ready in case an incident occurs that impacts an organizations systems is a crucial requirement for maintaining the integrity of any organizations systems. This assignment will reinforce the concepts you learned in this unit regarding the creation of an incident response plan.
Assignment Instructions
Part 1:
Using the internet and/or the library, research and complete the following:
In 5001,000 words, complete the following:
Develop an incident response plan that integrates with your cybersecurity policy, enabling effective organizational recovery. Include concepts such as maximum tolerable downtime (MTD) and recovery point objective (RPO) in your answer.
Part 2:
In 200 or more words for each answer, respond to the following:
Assignment Requirements
Your assignment should meet the specifications listed. Be sure to use appropriate APA format and cite your textbook or other sources that you used in the assignment.
Answers should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.
For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.
Directions for Submitting Your Assignment
Compose your assignment in a Microsoft Word document and save it as IT484_YourName_Unit_6 and submit it to the Dropbox for Unit 6.
Review the before beginning this activity.
Attached Files (PDF/DOCX): Unit 6 Assignment.docx
Note: Content extraction from these files is restricted, please review them manually.
Proposal should be based on the following scenario.
Heavy Metal Engineering (HME), a manufacturing organization that creates metal shell casings for very high-end washer and dryer products has suppliers and customers world-wide, as well as world-wide offices. HME the US Corporate office in NY hires you as a professional Information Assurance consultant.
HME is looking to receive some significant third party funding for an international joint venture but was told they would be denied because they do not have any kind of Information Assurance plan to keep all data assets secure. You are required to create a comprehensive IA strategy that includes the following:
-A detailed overview of what Information Assurance entails covering all the basics for an IA strategy (what will be protected and from what)
-A plan or strategy for IA implementation including a framework
-A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.
-Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward
-An incident response and disaster recovery plan in the event of intrusion and disaster
All sections should be clearly labeled and a separate section in each area specifically for justifications of your selection/proposal.
-Your thoughts must be solidified with viable sources consistent with graduate level work. No more than 2 sources may be used with ND or no author. Scholarly and Peer reviewed sources are expected to be used throughout the bulk of this paper.
This assignment has two Parts:
PART 1: The research topic for your assignment is : Compare and contrast Operating Systems and Security. Write a minimum 2 pages (Follow Lynn
standards how to write research paper)
Checklist:
Articulate the mechanisms necessary for the protection and security of operating and computer systems. Discuss the following areas:
Assess the techniques used in buffer overflow and buffer overrun.
Explain techniques of memory management.
Identify operating system and application weaknesses and vulnerabilities.
Describe the structure of operating system.
Hints for success:
These are merely pointers, you should explore other ones.
PART 2: Kali Linux Operating System Installation and Documentation
_____________________________________________________
SEPERATE DOCUMENT FOR PART 2
Dear Students,
for this assignment the following files will need to be downloaded and installed on your laptop preferably on your C: drive
Please create a folder C:FW
Download the following files:
For the homework make sure you have the latest version of Java installed on your laptop.
Follow the instructions on the file below and answer the questions.
If you have any questions please let me know.
Best Regards,
Dr Antoniou
The document “Firewall Exercise ISM 311 V1” outlines a comprehensive exercise for students to understand and implement cybersecurity strategies using a firewall visualization tool. The exercise involves several key activities:
1. Understanding Firewall Basics: Students start with a basic setup and observe how traffic flows with and without a firewall.
2. Firewall Configuration: Students configure a firewall, experimenting with different rules to understand how they affect traffic flow and security.
3. Active Attack Simulation: The exercise includes simulating active attacks to test the effectiveness of the firewall configurations.
4. Rule Creation and Analysis: Students create a series of firewall rules aimed at protecting a network from various attacks, analyzing the effectiveness of these rules.
5. Scenario Implementation: Implementing a specific scenario provided in the exercise, where students write rules to protect a database from attacks.
6. Reflection and Understanding: Students reflect on the limitations of firewalls in preventing certain types of attacks and consider alternative strategies.
Total Points (0-100):
Understanding and Setup (15 points): Assessing the initial setup and understanding of the firewall tool.
Firewall Configuration (20 points): Grading the ability to configure and modify firewall settings effectively.
Active Attack Analysis (20 points): Evaluating how students handle simulated attacks and their analysis of the firewall’s effectiveness.
Rule Creation and Effectiveness (25 points): Judging the complexity and effectiveness of the firewall rules created by the students.
Scenario Application (10 points): Points for correctly applying the learned concepts to the provided scenario.
Critical Thinking and Reflection (10 points): Assessing the students’ understanding of the limitations of firewalls and alternative strategies.
This distribution ensures a balanced evaluation covering technical skills, analytical thinking, and practical application.
Attached Files (PDF/DOCX): Firewall Exercise ISM 311 V1.docx
Note: Content extraction from these files is restricted, please review them manually.