The details and instructions are on the same page as the homework. If the work y

The details and instructions are on the same page as the homework. If the work y

The details and instructions are on the same page as the homework. If the work you will give me includes any kind of artificial intelligence, I will not give you the money.

CYB 260 Module Four Worksheet Activity Guidelines and Rubric Summation of Privac

CYB 260 Module Four Worksheet Activity Guidelines and Rubric
Summation of Privac

CYB 260 Module Four Worksheet Activity Guidelines and Rubric
Summation of Privacy Laws Part 3
Overview
This is the final of three activities where we will explore privacy laws that govern personally identifiable information (PII). The table you will be creating will summarize the laws, who they apply to, and who is responsible for ensuring compliance in an organization. It is important that this table is filled in using your own words, as this will help you master the material. Because the descriptions will be in your own words, you are not required to cite the sources. This exercise introduces a small sample of laws that you will add to in subsequent course activities. By the end of Module Four, the completed table will be a great addition to your cyber playbook and will provide a useful reference for Projects One and Two.
Prompt
Complete the Module Four Worksheet, which is linked in the worksheet assignment in Module Four of your course. In the worksheet, fill in the three blank columns for each law. The list below describes the information that is required for your worksheet.
Law – See the laws provided in the worksheet.
Briefly describe the law. – In under 50 words, describe the law.
Whose rights are covered by the law? – Identify the main party covered under the law.
Who in an organization is responsible for ensuring compliance with the law? – Identify the entity in the organization who is responsible for ensuring compliance with the law.
What to Submit
Fill in the required information directly in the provided worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Module Four Worksheet Activity Rubric
CriteriaProficient (100%)Needs Improvement (70%)Not Evident (0%)Value
Census Confidentiality ActCompletes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Freedom of Information Act (1966)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Wiretap Act (1968, Amended)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Mail Privacy Statute (1971)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Privacy Act (1974)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Cable Communications Policy Act (1984)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Electronic Communications Privacy Act (1986)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Driver’s Privacy Protection Act (1994)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
E-Government Act (2002)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Health Information Technology for Economic and Clinical Health (HITECH) ActCompletes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law9
Articulation of ResponseSubmission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas10
Total:100%

please make a simulation based on the question provided the document says using

please make a simulation based on the question provided the document says using

please make a simulation based on the question provided the document says using cadence if not you could use other stuff like ngspice or anything that will simulate to the requirements of the question. Attached is an example of what the solution should look like.

Prior to beginning work on this interactive assignment, complete the Course Proj

Prior to beginning work on this interactive assignment, complete the Course Proj

Prior to beginning work on this interactive assignment, complete the Course Project Acknowledgement, which will provide important information needed as you undertake this project. In addition, refer to your notes from the INT301 Computer Networking course, and the EZTechMovie Business Overview Download EZTechMovie Business Overview.
EZTechMovie is considering an improvement of their current network scheme. Specifically, they now require a scalable network due to their plans to expand.
For this Interactive Assignment, you are taking on the role of the network designer and are required to work with your manager to present your design for a new scalable network to the CIO. Generally, you will need to first draw the major components of the network diagram(s), and then briefly describe the connections and interactions among the various components. To complete this interactive assignment:
Draw a high level diagram that represents the entire system. Explain the overall high level diagram.
Use any drawing software with which you are familiar.
Next, break your high level diagram into smaller components. For example five or six sub components.
Explain the job of each of these sub components.
Be sure to include information about computation, storage details, client side components, server side components, the number of servers and their jobs, caching, queueing, load-balancing, and any other networking details. Feel free to use on premises or cloud based components where necessary.
Support your answer by providing explanations to back up your choices.
Attach your diagrams to your initial post.
In your post, write an email to your manager explaining why you are sending this to him or her.

1) Click the following link and enter the username password and domain stated be

1) Click the following link and enter the username password and domain stated be

1) Click the following link and enter the username password and domain stated below. Just copy and paste the info: https://labs.practice-labs.com/app/dashboard/title.aspx?productId=0bc4e6c0-7b97-4ffb-854e-7fe3f0b48bf5&backButtonUrl=products.aspx
The User is : ********
The Password is: ***********
The Domain is: ***********
2) Click where it states SNHU-CYB220 “Network Security” towards the bottom.
3) FIRST LAB: Click where it says launch for the lab that says “Implement the Cisco Adaptive Security Appliance”
4) Complete the lab step 1 to 6. (Attached below is what lab you’re doing. Click Launch to begin the lab)

OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE AN

OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE AN

OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE ANSWER FILL IN DOCUMENT ATTACHMENT BELOW TO ADD IN THE BUBBLE IN ANSWERS, SHORT-WORD ANSWERS, AND/OR SCREENSHOTS FROM THE ANSWERS YOU RECEIVE FROM THE PACKET TRACER ACCORDING TO THE “FIREWALL AND ACCESS CONTROL” DOCUMENT.
_____
DIRECTIONS ON HOW TO DOWNLOAD PACKET TRACER >>>>>>>
Click the following link (https://auth.socialgoodplatform.com/auth/realms/skillsforall/protocol/openid-connect/auth?client_id=b2e-marketplace&redirect_uri=https%3A%2F%2Fskillsforall.com%2F%2Fdashboard&state=fb50a882-ba15-49d3-becd-d3f87c188672&response_mode=fragment&response_type=code&scope=openid&nonce=82315c40-ff0b-4753-acfa-97f89676cedd&ui_locales=en-US) and log in with the following information (Copy the login information and paste so it’s easier): Username- *********@SNHU.EDU Password- **********
Click the following link(https://skillsforall.com/resources/lab-downloads?userLang=en-US&courseLang=en-US) and scroll down to where it says Cisco Packet Tracer 8.2.1 for MacOS, Ubuntu, and Windows. Click the blue highlighted download link for whichever is compatible with your computer.
The Cisco Packet Tracer should be installed to your computer. You can use this application to do the project assignment. To Download The Cisco Packet Activity “.pkt” file click the following link : Module Four Activity Student File . Then Login with the following information :
username: *****
password: *****
Once logged in click allow to download the packet tracer .pkt file. Open the file that you’ve just downloaded that says “CYB 220 MODULE FOUR ACTIVITY STUDENT FILE.PKT” once you have the Cisco Packet Tracer application already open and running.

QUESTION: In response to your peers, choose one of the following Fundamental Sec

QUESTION:
In response to your peers, choose one of the following Fundamental Sec

QUESTION:
In response to your peers, choose one of the following Fundamental Security Design Principles:
Simplicity of design
Trust relationships
Defense in depth
Discuss how the two principles work together to improve security when the selected firewall type is employed.
_________________________
PEER POST # 1
Hi Everyone,
I decided to choose a network-based firewall and the design principle of Isolation.
We all know that network segmentation plays a crucial role when it comes to safeguarding confidential client data. By dividing assets into zones controlled by firewall policies, businesses can control communication channels and restrict access attempts, whether it be legitimate or malicious.
I worked at a financial services company as a Firewall Administrator a few years ago and during a Check Point firewall upgrade, there was a disruption in a third-party financial advisor’s access to a mission-critical client reporting portal. After some investigation, we discovered that the connectivity issue was caused by the firewall receiving a new “updated” configuration. This update applied a stricter firewall rule that limited external partner access. Thankfully, we were able to adjust the firewall rule and resolve the problem. We were able to restore their reporting functionality safely.
Although it was inconvenient, this incident highlighted how firewalls fulfil their critical function of keeping customer data secure and isolated. It also emphasized the benefits of controlling portal permissions through network micro-segmentation rather than solely relying on server-based security measures.
Purpose-built firewalls remain essential for financial service firms to manage sensitive client information and assets. While configuring them may be complex, they enable the creation of security zones that minimize risks in case any environment is compromised while still allowing necessary operations. This isolation advantage justifies the effort required for organizations dealing with wealth or personal data.
_____________________________________________________________________________________________________
PEER POST # 2
Hello everyone,
I would like to describe how a network-based firewall can address the “Modularity” security design principle.
Modularity refers to the concept of breaking down a system into smaller, more manageable components, which can be developed, tested, and maintained independently. Network-based firewalls are designed to provide security by monitoring and filtering traffic at the network level. They exist as a separate network device, which makes them beneficial for enforcing a modular security design.
By applying a network-based firewall, organizations can implement a modular security design that separates internal networks from external networks. For example, an organization may have a network that is dedicated to specific applications or services that require additional security controls to protect from external threats. A network-based firewall can be placed between these two networks to control traffic flow and prevent unauthorized access.
The firewall can be configured to permit only authorized traffic to move from the external network to the internal network, and vice versa. This helps to ensure that each network remains secure and isolated from the other, and that any breach of security in one network does not affect the other.
In conclusion, a network-based firewall can provide modularity in an organization’s security design by enforcing separation and isolation of different networks and applications. This allows for a more modular approach to security design, which in turn facilitates easier management, testing, and maintenance of each security component.

Paper – How New Technologies are Making an Impact on Businesses This paper is fo

Paper – How New Technologies are Making an Impact on Businesses
This paper is fo

Paper – How New Technologies are Making an Impact on Businesses
This paper is focused on the role of new technologies and how they impact business operations
and decisions. This is a research paper, so you need to have references in APA style. Your paper
should be at least 3500 words, and at a minimum discuss the following topics:
• Three different and new/emerging technologies
o Introduce the technologies
o How are they being used (or how they will be used)
o What are their potential for users and businesses
• Impacts on business operations, decisions, sales, etc.
o Positive & Negative
• Impact on executives, employees, customers, humans, etc.
o Positive & Negative
Some Guidance on Your Topics:
• Emerging topics should be specific and recent (past five years)
• Don’t write about Artificial Intelligence, Cloud Computing, Self-Driving cars, IoT, and
other “buzz words” because you won’t be able to focus on the topic. Too many tangents
to go on, which results in you not being able to drive your point home
• Instead, focus on a specific technology or version of the technology.
• For example:
o If you want to write about Amazon Alexa, that’s fine. But pick the latest version
of Alexa and focus on why it’s so much better than the pervious.
o If you want to write about Tesla, that’s cool. But pick a model and the latest new
improvement that is added on to the vehicle / software
o You get the idea right?
o But then you have to ask the question – is that enough content for you to write
about?
• And finally, you should find something you want to research and write about. If you
don’t have fun with this assignment (and you’re majoring in ISOM), then you’re not
doing something right.
Your grade will be dependent on:
• How effectively you address the minimum points listed above
• How organized your paper is, and how well it flows
• Correct spelling & grammar
• To get a perfect score – go above and beyond the minimum points while ensuring bullet
points #2 & #3 are still addressed.
• If you choose not to submit a Draft of the paper with a minimum of 1500 relevant words
for review – you risk losing two additional points on your Final Paper Submission.
• See Rubric for Details

CYB 260 Module Four Activity Guidelines and Rubric Privacy Laws and Compliance C

CYB 260 Module Four Activity Guidelines and Rubric
Privacy Laws and Compliance C

CYB 260 Module Four Activity Guidelines and Rubric
Privacy Laws and Compliance Controls
Overview
A major security breach that happened within the federal government is the Office of Personnel Management (OPM) data breach, which exposed a large amount of personally identifiable information (PII) of federal and state employees. The effects of this breach are still being explored, and the full extent is still not known. This breach has become an important learning experience. Examining laws that suggest controls to minimize the possibility of data breaches is a crucial part of developing an adversarial mindset and will help with future instances of data breaches. There are numerous articles and research papers on the OPM breach, but the article provided in the prompt explores the breach from the employee perspective and discusses the steps that could have been used to help minimize the possibility of a data breach.
The critical controls defined by the Center for Internet Security (CIS) are used as guidelines for processes that a company can incorporate for data security. The controls are used to determine compliance to a standard put forth by the organization. They are meant to be used as an adaptive tool that will allow an organization to evaluate compliance to a known risk-mitigation level.
You have been preparing for this assignment by summarizing privacy laws and determining who is responsible for ensuring compliance to the law within an organization. It is important that you complete this assignment in your own words. Express your own ideas on how the laws and controls can be applied to this breach. It is the responsibility of a security analyst to be able to explain breaches and the controls used to mitigate issues.
Listed below are the privacy laws you are familiar with and the critical controls you will be learning about to help you complete this activity.
Privacy Laws
Americans With Disabilities Act, Section 508
Cable Communications Policy Act (1984)
Census Confidentiality Act
Children’s Internet Protection Act (CIPA)
Children’s Online Privacy Protection Act (COPPA)
Computer Security Act
Driver’s Privacy Protection Act (1994)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
Federal Information Security Management Act (FISMA)
Freedom of Information Act (1966)
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH) Act
Mail Privacy Statute (1971)
Payment Card Industry Standards
Privacy Act (1974)
Red Flags Rule
Sarbanes-Oxley Act
State Data Breach Notification Laws
U.S. Constitution
USA Patriot Act
Wiretap Act (1968, Amended)
CIS Controls
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Continuous Vulnerability Management
Controlled Use of Administrative Privileges
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Maintenance, Monitoring, and Analysis of Audit Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports, Protocols, and Services
Data Recovery Capabilities
Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
Boundary Defense
Data Protection
Controlled Access Based on the Need to Know
Wireless Access Control
Account Monitoring and Control
Implement a Security Awareness and Training Program
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
Prompt
Before you begin working on this assignment, read the article Inside the Cyberattack That Shocked the US Government and review the CIS Controls website. Then address the following:
Briefly summarize (in one to two paragraphs) the major issues with the OPM breach and how it occurred.
Select two of the privacy laws provided above and describe how they relate to the OPM breach.
Determine to what extent jurisdiction plays a role in the application of your selected laws.
Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.
Select four of the CIS controls provided above that could have been monitored to help minimize the possibility of the breach. Explain why monitoring these controls would have helped minimize the breach.
What to Submit
Your submission should be 2 to 4 pages in length and should use double spacing, 12-point Times New Roman font, and one-inch margins. Any sources should be cited according to APA style. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Module Four Activity Rubric
CriteriaProficient (100%)Needs Improvement (70%)Not Evident (0%)Value
SummarizeBriefly summarizes the major issues with the OPM breach and how it occurredAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Privacy LawsSelects two privacy laws and describes how they relate to the OPM breachAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
JurisdictionDetermines to what extent jurisdiction plays a role in the application of the selected lawsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
ReportIdentifies which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
CIS ControlsSelects four CIS controls that could have been monitored to help minimize the possibility of the breach and explains why monitoring these controls would have helpedAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Articulation of ResponseSubmission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas10
Total:100%

Task 1: create a Work Breakdown Structure chart (Your WBS identify the tasks tha

Task 1: create a Work Breakdown Structure chart (Your WBS identify the tasks tha

Task 1: create a Work Breakdown Structure chart (Your WBS identify the tasks that will need to completed including the system and industry analysis, system design, implementation plans, and security tasks). Use Word, Excel, PowerPoint or Visio to create your chart. Word WBS Sample (using SmartArt Design inserts) Excel WBS can be created in Table view or Tree structure Alternative open-source software “ProjectLibre” can be used for Visio. Link found in the Course Resources folder. Task 2: as indicated in the AW Case emails create a Gantt chart using the WBS tasks with displayed timeline. (Use the historical data in the resource library to assign the duration of each tasks Use Word, Excel, PowerPoint or Visio to create your chart. Alternative open-source software “ProjectLibre” can be used for Visio. Link found in the Course Resources folder. Resources: Gantt Chart Excel Template Task 3: list 4-5 project risks.