Purpose The purpose of the Unit 4 assignment is for you to engage in defining

 
Purpose
The purpose of the Unit 4 assignment is for you to engage in defining

 
Purpose
The purpose of the Unit 4 assignment is for you to engage in defining a mitigation strategy for a malware threat being introduced into the system. 
Assignment Instructions
You are a cybersecurity professional employed in a research and development firm working on medical research related to identifying effective treatments for several diseases. It is known that a similar type of research organization was recently hacked by a foreign state agent through the use of malware, and many patents and other intellectual property were stolen. Your CEO and CIO want to be certain that their organization’s systems are protected against this type of attack. They have asked you to perform a high-level risk assessment and provide a risk management approach related to this type of malware attack. Assume the following for the assignment:

The organization has an outward facing website that provides information on the research in progress and presents general news of interest to its followers. The web server housing this website is in the organization’s demilitarized zone (DMZ). The DMZ uses a single firewall system. Users can request information by submitting a form.
Servers on the internal network houses several databases. One holds all current patent information for patents held by the organization. The second database holds the researchers’ notes and all research project information for projects that are in progress. The patent database is encrypted. There is also a collaboration area where researchers that work together can share notes and ideas. A third database houses employee information. 
Also, on the internal network are an email server, print servers, and application servers.
The organization does not use any cloud computing. An incremental backup of the servers and databases is made daily and stored in the same building.
The organization has biometric identification to the external door and all internal lab rooms and server rooms. There are no security cameras. 

Use the following risk management approach to determine where compromises may exist, what the consequences of those compromises are, and controls and methods to reduce the likelihood of or severity of the compromise. Identify at least two vulnerabilities, threats, and risks. Recommend what you think is the best control for each vulnerability, threat, and risk identified.
Assignment Requirements
The paper should be at least 3 pages, use 12 pt. Times New Roman, and be in APA format.

  The ability to deal with professional conflict is one of those soft skills th

 
The ability to deal with professional conflict is one of those soft skills th

 
The ability to deal with professional conflict is one of those soft skills that is very useful when working in teams. In 3-4 paragraphs, discuss the following:
Imagine you are on a team at work, and the Project Manager has asked each of the team members for their input on how the team is working together. What do you hope the other team members will say about you?
Suppose one of the team members isn’t contributing very much or providing you with something you need in order to proceed with your part of the project. How might you address the situation? Include a rationale for why you would take that approach.
What might you do if you approached the Project Manager about the issue with a teammate and the Project Manager ignored your concerns?

   A family clinic contains a dataset as uploaded in the module for the final p

  
A family clinic contains a dataset as uploaded in the module for the final p

  
A family clinic contains a dataset as uploaded in the module for the final project. Identify how the following methods and techniques can be applied to the dataset to aid necessary decision support.
1. Description of the use of Information Entropy to identify the reduction in the possibility of the development of heart disease (this part may not need the dataset provided) based on changes in lifestyle
2. Your explanation must describe the random variable considered for the calculation

In your initial post, imagine that you are a user writing an email to an IT hel

In your initial post, imagine that you are a user writing an email to an IT hel

In your initial post, imagine that you are a user writing an email to an IT help desk because your wireless internet is very slow.
In the email, explain what the issue is and provide some context that might help an IT professional resolve it. For example, you might state that you are having issues connecting to Wi-Fi on your computer or phone, or you are getting a 404 error when you try to access a webpage. Maybe your wireless router is blinking strangely.
You can describe an issue that you actually have experienced as a user in the past, or choose an issue that you think is common for many users to experience.
In response to two of your peers, answer the email as if you are an IT professional working at a help desk.
If you are having issues troubleshooting the user or system error because you do not have enough information, ask the user clarifying questions. Consider:

What important information do I need to know in order to troubleshoot the error?
Did the initial post provide me with enough information to identify the probable cause and to implement the fix?

If you believe that you have enough information, state your hypothesis concerning what is causing the issue.
RESPONSE 1
Dear IT Help Desk,
I am reaching out to you as I am currently experiencing significant issues with my wireless connection and would greatly appreciate your assistance.
For the past few days, my wireless internet has been intermittent and slow. This issue affects all the devices I connect to the network, including my laptop and cell phone. I have asked some of my peers if they are experiencing the same issues, however, they have all stated that they have not had any. Here are some details that might be helpful in diagnosing the problem:
When the issue is present and I run a speed test, the results are far below the speed I am supposed to be receiving compared to what I have received in the past and what my peers receive. During those times, I consistently get a download and upload speed of around 5 Mbps when others are seeing closer to 100 Mbps on both.
The slow speed is intermittent. Sometimes the speed is good, but other times the speed drops significantly. This issue occurs regardless of my relative location to the access point.
The access point nearest me appears to be functioning normally from what I can tell but I have noticed that one of the lights that was green now appears to be yellow and does not blink as quickly. I am unsure if this is related, or if this was a possible update to the access point. 
I have not noticed any error messages to indicate I have no connection to the access point, but I do experience frequent buffering when streaming videos and web pages can sometimes take a couple of minutes to load.
I have already tried rebooting my devices, but the issue persists. I also checked for any firmware updates on my equipment and applied them, but it did not resolve the problem. I would try to reset the access point, but it is high up and I would need a ladder.
Could you please investigate this issue and provide guidance on how to resolve this issue? Also, If you need any additional information or if there are specific steps I should follow, please let me know.
Thank you for your prompt attention to this matter.
RESPONSE 2
Dear IT Help Desk,
I am writing to report a persistent issue with my wireless internet connection. Over the past few days, I have been experiencing prolonged internet speeds and significant latency issues. Here are the details of the problem:
1. Devices Affected:
    My computer and phone experience slow speeds and high latency when connected to the WiFi network.
    I have tried connecting both devices in different rooms, but the issue persists regardless of location.
2. Symptoms:
    Web pages take an unusually long to load, often resulting in a 404 error before finally loading after multiple refresh attempts.
    Streaming services are buffering frequently, making it impossible to watch videos without interruptions.
    The latency is causing significant delays in online applications and video calls, which is affecting both my work and personal communication.
3. Router and Modem:
    The wireless router’s lights are blinking in a pattern I haven’t noticed before. Specifically, the internet light flashes rapidly and intermittently.
    I have tried restarting the router and the modem, which temporarily improves the situation, but the issue soon returns.
4. Network Configuration:
    I have yet to change my network settings or add new devices.
    I use a combination of 2.4 and 5 GHz bands, but both seem to be experiencing issues.
5. Interference and Signal Strength:
    The router is placed in a central location in my home, with minimal obstructions.
    No new electronic devices near the router could cause interference.
Your assistance in diagnosing and resolving this issue would be greatly appreciated. Thank you for your help.
Thank you,
Ismael Garcia Jr.

  Article:  Non_Verbal_Article.pdf (apus.edu)  Video: Cross cultural communicat

 
Article:  Non_Verbal_Article.pdf (apus.edu) 
Video: Cross cultural communicat

 
Article:  Non_Verbal_Article.pdf (apus.edu) 
Video: Cross cultural communication | Pellegrino Riccardi | TEDxBergen – YouTube 
Ensure you address the following topics:
Pick three areas of interest from the article or video and discuss why you find it interesting, if you have seen any personal examples (i.e., someone who covers their mouth while talking, specific gender non-verbals, cultural differences).
 proper APA 7th edition format
Make sure to use two additional resources from APUS online library or the internet (Google Scholar is a great source)

Select one of the videos found at https://www.dhs.gov/medialibrary/assets/video

Select one of the videos found at https://www.dhs.gov/medialibrary/assets/video

Select one of the videos found at https://www.dhs.gov/medialibrary/assets/videos/23188Links to an external site. that addresses technology used in the disaster recovery and business continuity plans. You may even find one related to your group’s disaster and industry.  
You are tasked with selecting one of the videos at https://www.dhs.gov/medialibrary/assets/videos/23188Links to an external site. and provide a brief summary of the technology as well as how this technology may be used. Identify one additional reference that supports the use of the technology.  

  Following are the instructions for submission of the semester wide project in

 
Following are the instructions for submission of the semester wide project in

 
Following are the instructions for submission of the semester wide project in the form of a report:
Double spaced APA format, font size 12 and Times New Roman. Report must be 10 pages.
Page 1 must include your name(s), name of course, semester and name of university
Introduction and background of problem, source(s) of data set(s),  how you collected the data, description of data set(s) and description  of variables used to answer the problem statement. You may create a  table with variable names and their description or include the variable  names and description as bullet points. You are also expected to use  some theoretical background or information systems research theory for  the research questions (although not required but recommended, may use  library resources or Google scholar to search for information systems  theories). (minimum 2 pages, no maximum limit).
Description of technique applied to the data set(s) to answer the  questions / problems. You may use any of the technique(s) we covered in  the class or may also use a data analytic technique(s) from outside the  syllabus as long as you have proper understanding of the technique and  can justify its usage to solving the problem (minimum 2 pages, no  maximum limit). You may also use a combination of supervised and  unsupervised techniques as well. For example, clustering followed by  linear regression. Also, you may use more than one data source/data set,  to propose research question(s) and analyze the data set(s)to find  answer(s) to proposed research question(s).
Results and interpretation of results. You must include some graphs,  figures, Excel outputs here. You are not required to include detailed  Excel steps in this section. You are expected to explain your results  (whether they support the research question(s) or not), based on the  chosen theory/theories.  (minimum 1 page, no maximum limit).
Any limitations, challenges and summary of your work (minimum 1 page, no maximum limit).
Appendix (optional). You may include the detailed Excel steps here, although not required (no page limit).
References including the web links, textbooks, articles, etc. you have used to carry out this project (no page limit).

  Instructions Course Wrap-Up This week’s assignment we are going to wrap up th

 
Instructions
Course Wrap-Up
This week’s assignment we are going to wrap up th

 
Instructions
Course Wrap-Up
This week’s assignment we are going to wrap up the last course by looking back to the work we did over the last four courses. You will want to use the content you developed for various exercises that are listed below. This document is the culmination of your time as the Vice President of Zenth City Water, if your report is great, you are going to be named the next CEO of Zenith City Water, Best of Luck! 
Assignment Guidelines
Step 1: Put together a document that contains all the various assignments from the previous courses that are listed below. 
ISSC477 – Week 1
ISSC477 – Week 2
ISSC477 – Week 6
ISSC477 – Week 7
ISSC477 – Week 8
ISSC478 – Week 8
ISSC479 – Week 1
ISSC479 – Week 3
ISSC479 – Week 5
ISSC479 – Week 7
ISSC479 – Week 8
ISSC480 – Week 2
ISSC480 – Week 5
ISSC480 – Week 6
Step 2: Once you have put together the above items into appendices, produce an executive summary of each document. You will then want to put together a 3–5 page document that walks the reader through the work that you have done at Zenith City Water. This is where you get to make your final argument to become the new CEO. 
Step 3: Finally, put together a one page wrap-up that discusses your plans for the future, have fun with this part include potential upgrades, new funding, etc.
Deliverables
A Word document that covers the requirements listed above.

  Instructions Hello Class! Welcome to Week # 7. This week’s assignment will he

 
Instructions
Hello Class!
Welcome to Week # 7. This week’s assignment will he

 
Instructions
Hello Class!
Welcome to Week # 7. This week’s assignment will help you to fulfill the requirements for the seventh course objective (CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization). For this week’s assignment instructions, please see below:
Assignment Instructions:
You are tasked as the Cyber Security Director at your new organization to develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization
REQUIREMENTS:
4 – 6 Pages in length in APA format (not including a cover page and reference section)
Cover Page
Background Section
Analysis of current research on the subject matter
Recommendations
Reference Section
MISCELLANEOUS:
Use current and real world data to make your points, not just the textbook
Your report may focus only on the topic of your choosing – imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.
Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

   System Security Plan Presentation For this presentation, you will prepare a

  
System Security Plan Presentation
For this presentation, you will prepare a

  
System Security Plan Presentation
For this presentation, you will prepare a System Security Plan (SSP) presentation slide deck to present your system security plan for CMI. The SSP may include artifacts discovered from the CMI risk assessment, the security policy report, and/or the ROE. This SSP presents the current security posture to the organization’s stakeholders and employees by describing security controls, procedures, & techniques to deter, detect, prevent cyberattacks. You may include technical, administrative, and operational controls to harden the network operations and bolster the enterprise security in your plan.
This assignment is based on the Cyber Marketing Inc. Case Study provided in this course. The CMI network diagramLinks to an external site. (opens in a new browser window) is shown below for your convenience but is also available in the CMI Case Study.
  
Procedures
You will prepare an SSP slide presentation to convey your findings of the CMI security posture and a proposed solution. Your SSP should include best security practices to build strong enterprise security for CMI from the areas of securing wireless systems, secure web content/access, perimeter security, audit, authentication, encryption, incident response, mobile device security, data hiding/forensics, reverse engineering, social engineering, cyber threat intelligence, cyber awareness/training and written security policy.  Utilize what you have learned in the areas of network host/server/communications device port scanning, malware & threat detection, vulnerability assessment, packet components & flows, risk assessment, application of security policy, and penetration testing. As you are presenting this SSP to your client in a presentation format, you will summarize your solutions with highlighted prioritized security controls to build a strong enterprise security.
While you are free to create your own SSP to best prevent cyber vulnerabilities and improve the CMI security posture, and build a defense in depth, you will, at a minimum, include the following sections.
1. Executive Summary
2. Brief Description of the organization
3. Brief Description of the system(s) or technology(s) under review and their requirements in Confidentiality, Integrity & Availability (CI&A).
4. Summary of Systems Threat, Vulnerability, Impact and Likelihood (TVIL) findings,
5. Selection of Controls to be applied to their systems for CI&A given their TVIL, and
6. Brief outlook on expected implementation timetable and resources for maintaining assurance.
Use the document System Security Plans (SSP) Guidelines for CMI Presentation Links to an external site.in Module 8 of the Google drive as a directive.
  
Slide Deck & Presentation
Your system security presentation should incorporate a slide deck of between 10-20 slides, with annotation in the Notes section and take about 10 minutes to deliver. The presentation should be a deliverable to CMI who will make decisions about hardening the CMI network operations and enforcing the security policy to improve the CMI enterprise security posture. A typical SSP would include many pages of documents. You will present your solutions in a Slide-based presentation to convey your security controls and solutions for CMI.
Post your slide presentation to the Discussions Section once you are ready for others to view it.
The following are recommended tool options for creating and sharing your presentation:
· You may use VoiceThreadLinks to an external site. to create a slide-based presentation to share. For information about creating slides in VoiceThread, please click hereLinks to an external site..
· You may upload a video to YouTube Links to an external site.and post a link to it in the discussion forum.
· You may record your video using Screen-cast-o-maticLinks to an external site. and post a link to it in the forum.
· You may record your video directly in the forum or upload directly to the forum by clicking reply and then selecting the Media icon.Links to an external site.
For more detailed instructions regarding how to create and share a video using the content editor in the discussion board, click hereLinks to an external site..
  
Grading
Presentation Grade Weighting
Systems Security Plan Points
Content
SSP Executive Summary 5 points
Organizational Description & Mission 5 points
System(s) Under Review Description 10 points
Threats to & Vulnerabilities of the System, Likelihood &
Impact of Destruction points
10
Controls Selection, Justification, & Application 15 points
Implementation & Maintenance Timetable & Resources 10 points
References 5
Support
Slide Core Content & Organization 10 points
Recorded Oral Presentation Quality 10 points
Slide Annotation 10
Diagrams, graphs, tables 10
Case study
Cyber Marketing, Inc. (CMI) is a marketing company that markets its products and services to thousands of its clients across North America. As a marketing company, the products and services catalog is an important corporate asset to keep up-to-date for its clients. In order to keep its products and services updated at all times, its corporate IT infrastructure plays an important role in processing data within and between the company and the clients. The following organization chart depicts the CMI executive management team.
Org chart
Your Role
For the assignments related to this case study, you will assume the role of a Cybersecurity Manager at Cyber Marketing Incorporated. You have been educated, trained, and hired to protect the physical, logical, and operational security of CMI’s corporate information system. CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2013, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of customer data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected, the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.2 Million in revenue and intangible customer confidence.
CMI Network Diagram
You are responsible for a corporate WAN spanning 10 remote facilities and interconnecting those facilities to the central data processing environment. Data is transmitted from a remote site through a VPN appliance situated in the border layer of the routing topology; the remote VPN connects to the internal Oracle database to update the customer data tables. Data transaction from the remote access to the corporate internal databases is not encrypted.
A bulk of the data processing for your company is handled by Oracle database on a high-end supercomputer. The trusted computing based (TCB) internal network is situated in a physically separated subnet. This is where all corporate data processing is completed and the internal support team has its own intranet web server, a SUS server, an internal DNS, an e-mail system, and other support personnel workstations. Each corporate department is segregated physically on a different subnet and shares the corporate data in the TCB network.
Additional Information
In addition to the context provided above, you will find some other considerations regarding the CMI case study below:
Recently, your network engineers report that they’ve noted a significant spike in network traffic crossing into the internal networks. They report that they cannot be certain what or who is generating this traffic, but the volume and frequency of traffic are certainly abnormal. The management is very concerned about securing the corporate confidential data and customer information.
Increasingly, CMI’s CEO Thompson attempts to outsource IT competency. In fact, you’ve been told of a plan from COO Willy to outsource network management and security functions away from your department and to a service integrator. COO Willy warns you that the political environment will only become more contentious over time; you must make a compelling case as to what value your department can bring over an integrator that can provide secure services at 40% less annual cost than you.
The interrelationship between data and operations concerns you. Increasingly, some of the 10 remote sites have been reporting significant problems with network latency, slow performance, and application time-outs against the Oracle database. The company’s business model is driving higher and higher demand for data, but your capability to respond to these problems are drastically limited.
Mobility is important for the organization to interact with the customers and other co-workers in near real-time. However, the CEO is concerned with the mobility security and would like to research for the best practice for mobile computing. The CEO is willing to implement a BYOD policy if security can be addressed.
Employees enjoy the flexibility of getting access to the corporate network using a WiFi network. However, the CEO is concerned over the security ramifications over the wireless network that is widely open to the company and nearby residents.
The company plans to offer its products and services online and requested its IT department to design a Cloud Computing based e-commerce platform. However, the CEO is particularly concerned over the cloud computing security in case the customer database was breached.