Instructions
Hello Class!
Welcome to Week # 3. This week’s assignment will help you to fulfill the requirements for the third course objective (CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments). For this week’s assignment instructions, please see below:
Assignment Instructions:
You are tasked as the Chief Information Security Officer for a large Fortune 500 International Firm to plan, develop and manage the functions that oversee a new large scale Cybersecurity program. The large scale Cybersecurity program will be a “Digital Blackwater” type organization (see the description below of “Private or Mercenary Armies” from the textbook).
For the purpose of this assignment, you are to search the Internet and utilize course reading materials to research the types of functions, strategies and tactics this organization will use for this new program. Use your imagination and name your proposed organization and follow the requirements below:
REQUIREMENTS:
4 – 6 Pages in length in APA format (not including a cover page and reference section)
Cover Page
Introduction – Firm name and overview of its purpose
Technical organizational proposal:
Value proposition for the new organization
Functions of the organization including management
How the organization will address dynamic Cyber risk and threat environments
Strategies and tactics the organization will employ
Proposed benefits for the U.S. government
How will the organization make a profit
Reference Section
MISCELLANEOUS:
Use current and real world data to make your points, not just the textbook
Your references should not be more than 5 years old
Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.
Private or Mercenary Armies
In an age where cyber warfare is more common than the physical battlefield, it may be necessary for the private sector to stop playing defense and go on offense, Gen. Michael Hayden said on August 1, 2011. Hayden, who led the National Security Administration and Central Intelligence Agency under president George W. Bush, said during a panel discussion at the Aspen Security Forum in Aspen, Colo. that the federal government may not be the sole defender of private sector companies—and that there is precedent for such action. “We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space,” he said. “Let me really throw out a bumper sticker for you: how about a digital Blackwater?” he asked. “I mean, we have privatized certain defense activities, even in physical space, and now you have got a new domain in which we donot have any paths trampled down in the forest in terms of what it is we expect the government—or will allow the government—to do”. Blackwater is a private military contractor that has changed its name to Academi after incidents in Iraq gave them a negative image. If companies decide to hire forces (hackers) to strike back or conduct recovery operations it could change the cyberspace battlefield dramatically (Winterfield and Andress, 2013).
Category: Computer Science homework help
-
“Developing a Digital Blackwater: A Proposal for a Private Cybersecurity Organization” Introduction: The purpose of this proposal is to present a plan for the development and management of a new large-scale Cybersecurity program for a Fortune 500 International Firm.
-
1. APA Reference: Carr, M. (2021, April 22). The pandemic is driving a wedge between parents and their kids’ schools. The Washington Post. https://www.washingtonpost.com/education/2021/
Identify a news article that discusses a current event or social issue that relates to your field of study. Follow the instructions below to explain the issue, provide an additional example of the issue, connect the issue to your field of study, and pose questions about the issue. See the Assignment 1 Model in Week 2 Content for an example.
First, identify your source for this assignment. It should be one news article, available through the UMGC Library, published within the past 12 months.
Content and Organization
Number your answers and/or include the assignment questions so your instructor can see that you addressed each part of the assignment.
Respond to each of the following.
Provide an APA-style reference for the news article you selected. The format for the reference is as follows:
Author, A. A. (Year, Month Day). Title of article in sentence case. Title of Newspaper in Title Case and Italics. http://www.newspaperhomepage.com
Although the news article should be available through the UMGC Library, provide the URL directly to the newspaper that published the article. An APA reference entry does not link to a library database record. It does include the URL of the newspaper homepage, such as https://www.washingtonpost.com
For your instructor’s reference, provide the URL to the article in the UMGC Library. This will be listed as “Document URL” in the library record: -
“Securing Success: The Intersection of Operations, Leadership, and Decision Making in Organizations”
Operations Security: – Practical Connection (2 pages)
Operation Excellence – Assignment (3 Pages)
Discussion: Organization, Leadership and decision making (2 pages) -
“Learning from the Ukrainian Power Grid Attack: Lessons and Implications for the United States”
Instructions
Learning from a Power Grid Attack
This week’s assignment we are going to investigate an extremely detrimental attack that took place and involved SCADA and ICS systems. The incident we are going to research is the attacks against the Ukrainian Power Grid.
Assignment Guidelines
Step 1: Obviously our first step is to start researching the various attacks against the Ukrainian Power Grid. What information is out there, can we assign the source of the attacks with certainty?
Step 2: Once you have completed your research you will want to breakdown the underlying attacks, lessons that can be learned from those attacks, and how likely it is that the source of the attacks could succeed in doing the same thing to the United States.
Step 3: Once you have gathered up all the information you will compile the data into Word document of approximately 5-7 pages of content, excluding the cover page, references, etc. Make sure you address the incidents and the likelihood of the threat towards the United States. -
“Rightsizing, Web Accessibility Lawsuits, and the Impact of Green Computing on Customer Buying Decisions: A Comprehensive Analysis”
Write a research paper that contains the following:
1) Define and describe the process of “rightsizing.”
2) Research and discuss a lawsuit that a company has lost for failing to support web accessibility for all users.
3) Define and describe green computing. Evaluate the impact green computing issues are having on customer buying decisions.
Research Paper Requirements:
The paper should be four pages long, not including the title and reference pages.
Use Times New Roman, size 12 font throughout the paper.
Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References.
A minimum of two scholarly journal articles (besides your textbook) are required.
Writing should demonstrate a thorough understanding of the materials and address all required elements.
Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free.
Note: plagiarism check required, APA7 format, include References, within 8hrs -
“Analyzing the Impact of Social Media on Society” Introduction: The emergence of social media has revolutionized the way people communicate and interact with each other. With the rise of platforms such as Facebook, Twitter, Instagram, and Snapchat, individuals are
All the documents you need are attached down below. Let me know if you have any questions. Please follow instructions thoroughly!
-
Title: Exploring the Most Interesting Standard or Organization in Information Systems Security The field of information systems security is constantly evolving to keep up with the ever-growing threat landscape. As a result, several standards and organizations have been established to provide guidelines,
APA FORMAT 200 WORDS WITH REFERENCES AND CITATION. no plagiarism no ai no chat gpt
Of all the standards and organizations listed in Chapter 13 in the book Fundamentals of Information Systems Security, which one did you find the most interesting. Do a little research and tell us a little more about it, in your own words. -
Title: Non-Determinism in Real-World Scenarios
APA FORMAT 250 words with References and Citations no plagiarism no AI no chat gpt
Can you think of a Real-World example of Non-Determinism? By that I mean an example of something that can happen with more-than-one outcome from “state 1” given the occurrence of “condition A” (single condition occurs…but somehow – multiple outcomes then also occur)??? -
“Agile vs. Waterfall: Choosing the Right Process for our Semester Project” Agile vs. Waterfall: Choosing the Right Process for our Semester Project Introduction The process of software development is a crucial aspect of any project, and choosing
For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know… -
Title: “Securing the ACME Yearbook Company’s Internet-Based Product: A Cryptographic Implementation”
IT543-4: Design an implementation of cryptographic methods for an organization.
Assignment Instructions:
This assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:
The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and design the school’s yearbook, including the ability to import additional photographs and lay out each yearbook page. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each yearbook page.
Note: Their previous product used CD ROMSs, and there was no Internet access for development, viewing, or purchase.
The company uses this data set to produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record-keeping or for direct sale to students to accompany their hard copies.
The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.
The Internet-based product should include the following additional features:
Allow all yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
Allow the desktop product to be used to edit the yearbook and any new Internet version of the product.
Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
Allow people to purchase copies of the completed yearbook using a credit card.
Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also, make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.
Security concerns include:
Licensing of the application client on school PCs.
Security for the output designs on the cloud and on CDs.
Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
Online purchasing of electronic copies of yearbooks.
Communications security.
You must do the following:
Identify and list RISKS to be addressed.
Design a solution or a solution set.
You do not have to address all of the items below, but here are some possible topics to consider:
Email
Remote access (VPN)
Whole disk encryption
Encrypted flash sticks
E-commerce transactions
Database encryption
Use of hashes (e.g., for checksums, passwords, perhaps even credit card information)
Cloud access security
Digital certificates (at various levels)
DRM for electronic copies of yearbooks
Acceptable use policies regarding the use of company computers, personal computers, and perhaps even use of personal encryption
Identify potential vulnerabilities with your proposed solution. (Note: Not all vulnerabilities can be solved with encryption.)
Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.
Your design should take into consideration the data storage, data processing, and data communication needs of the system.
It is anticipated that the length of the paper will be 10–12 pages.