The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.
Answer the following question(s):
1. What is an advantage of organizing IT security policies by domain?
2. What is a disadvantage of organizing IT security policies by domain?
3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.
Category: Cyber security
-
Title: “Exploring the Benefits and Challenges of Organizing IT Security Policies by Domain”
-
Relational Database Terminology Relational Database Terminology A relational database is a type of database that stores and organizes data in a tabular format, with rows and columns. This format allows for efficient storage, retrieval, and manipulation of data
Discussion Points:
Discuss relational database terminology (table, tuple, constraints, relationship, especially the various keys). Include an example of a primary key (other than the one in the text). Include one question for your peers to research and answer. A web search for relevant articles and information could be employed to further assist you in your response. -
Title: Cybersecurity Threats to Critical Infrastructures in the United States: Vulnerabilities, Impacts, and Recommendations
1. Discuss the unique cybersecurity issues as applicable to the Transportation CI. Specifically discuss the potential vulnerabilities and concerns to include a recent cyber attack (past 5 years), impact on at least one other CI we’ve studied during the course (be specific), current government/industry cyber defense activities to include the Department of Homeland Security, US Transportation Command and the Department of Transportation, and present your recommendations for mitigating future security threats to this Sector. Ensure you answer each part of the test question. 2. Discuss the unique cybersecurity issues as applicable to the Energy CI. Specifically discuss the respective potential vulnerabilities and concerns of this CI to include a recent cyber attack (past 5 years), impact on at least one other CI we’ve studied during the course (be specific), current government/industry cyber defense activities to include the role and performance of the Sector Specific Agency (SSA), and present your personal recommendations for mitigating future security threats to this Sector. Ensure you answer each part of the test question. 3. Cybersecurity was largely left up to the private sector until 2016–2017 when surveillance capitalism and meddling in US elections were revealed. What strategies and policies should the US government enact to protect consumers and voters in the future?
4. Provide your view of the state of the U.S. national Cybersecurity Critical Infrastructures. Include the role and performance of the Department of Homeland Security and the Sector Specific Agency process, the role and performance of private industry and its protection of CI, the U.S. government’s process of managing and adapting to the CI threat, and the overall risks to the nation from this threat. RECOMMENDATION: Bring together all of the data, facts, concepts, and ideas you’ve learned during the course and present your recommendations for successfully mitigating the cybersecurity threat to the U.S. Ensure you answer each part of the test question. -
Title: Creating Tables with Unlimited Attempts Allowed in Postgres
Unlimited Attempts Allowed
Details
What would be the code to create this in postgres? Try your best 🙂 Assume ON DELETE CASCADE for foreign key constraints.
Turn in your code! Graded on effort and completion.
Try two tables 🙂 if you like, try all of them! 😀 -
Title: “Aligning with Government Requirements: A Look at Cybersecurity Laws, Regulations, and Standards for Organizations”
Briefly examine a law, regulation, and a standard that organizations use to align with government requirements around cybersecurity best practices within their industry.
-
“Implementing GDPR Compliance through a SharePoint Site”
A company is
considering hiring you to set up and maintain part of its IT operations. As
part of the interview, you must submit the project below for review.
Project outline
An organisation wants to use SharePoint to help
keep track of its GDPR data in the organisation. You should plan and set up a
site in SharePoint with enough information so they follow GDPR.
Project description/detail
An organisation needs control of which computer
systems they use, what kind of data they store, why, and who is the ‘owner’ of
the system. If this is an external system, they need to know they have
agreements with the vendor.
Additionally, they need to register and handle ‘GDPR
violations’ and apply the permissions to who has access to do changes on the
registers and what happens when a new violation is registered (like sending an
info email).
This project requires an in-depth study of the GDPR
law to understand the requirements of the GDPR for any organisation wishing to
implement the GDPR law. Based on the analysis of the GDPR law, the SharePoint
site will be developed to help companies start and continue to maintain their
internal work with the GDPR. The purpose of this site is to be flexible and
allow organisations to add their own rules and policies regarding the GDPR.
This is because some GDPR requirements would be different in relation to the
nature of the business.
The report will cover the GDPR law and creating a
SharePoint site with GDPR features. Furthermore, the site will provide the
appropriate security structure and automated features, such as notification of
any action on the site data.
A demo (proof of concept) is required to show the
work completed.
Possible resources required
Virtualisation software and host computer with an OS
(Windows, Linux) installed and configured.
Linux Server installation media.
Access to Packet Tracer, installed on the host machine.
Windows server installation media.
Linux and Windows desktop installation media. -
“Exploring the Top Cybersecurity Research Topics: A Comprehensive Analysis”
https://www.knowledgehut.com/blog/security/cyber-security-research-topics
https://writingcenter.kennesaw.edu/resources/handouts_print/IEEE%20Format.pdf -
Title: “Securing Sensitive Data and Cloud Resources with the MIST Algorithm: A Review and Analysis” Introduction: In today’s digital age, the use of cloud-based information technology (IT) resources has become increasingly prevalent. These
Discuss how the MIST Algorithm can be applied in securing sensitive data and cloud-based information technology (IT) resources.
Review and discuss the proposed algorithm as it relates to cloud disaster recovery and security algorithms. -
“Exploring Cybersecurity Concepts: Attack Chains, Module 6 and 7”
Limit your response to no more than a single page in MS Word (font 11, single spacing, normal margin – left, right, top, bottom= 1”). Use your own words to craft your answers; directly copying from the sources and citing them is forbidden. Then, convert this Word file to PDF for submission.
Submit only a 1-page PDF to Canvas for each problem. Do not include the instructions for this problem page in your 1-page submission file. Otherwise, you will lose 20% of the score.
You must upload three PDF files; each PDF is 1 page long. Other formats will not be accepted. Otherwise, you will lose 20% of the score
Question 1 has the file in it question 2 will go with the attackchain file and question 3 will be about module 6 and 7 files -
Lab Questions Answered Lab 1 Questions: 1. What is the purpose of this lab? 2. What materials are needed for this lab? 3. What steps did you take to complete this lab? 4. What challenges did you encounter during
I just need 1 word document with the questions from each lab answered after each step. Only 2-3 sentences each when needed. Thank you.