ERM

  You are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. You must use at least 2 paragraphs (of you own words) to justify your answer.

To complete this assignment, you must do the following

 As indicated above, assume that you are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. You must use at least 2 paragraphs (of you own words) to justify your answer.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Threat Modeling

Subject: Security Architecture & Design

There is a checklist for “Diving in and Threat Modeling”. But before you can do that, you have to fully understand what the checklist is asking you to do. After each checklist item, provide your own definition of what you think the question means. 

1. Can we tell a story without changing the diagram?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

2. Can we tell that story without using words such as “sometimes” or “also?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

3. Can we look at the diagram and see exactly where the software will make a security decision? Explain what this question means to you? And then provide your answer to the question.
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

4. Does the diagram show all the trust boundaries, such as where different accounts interact? Do you cover all UIDs, all application roles, and all network interface?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

5. Does the diagram reflect the current or planned reality of the software?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

6. Can we see where all the data goes and who uses it?
Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

 

7. Do we see the processes that move data from one data store to another?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Discussion

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructures systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address the cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts and better anticipate future threats.

 You must do the following:

1) Create a new thread. As indicated above, please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Research paper

3 pages and more please

Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research.  Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment.  If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

*All outside sources must be referenced and cited in your paper.  All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Case study

Read through the following scenario complete the following case study:

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access 

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

Suggest at least two policies that would help mitigate against attacks similar to this attack

Suggest at least two controls to support each policy (so a minimum of 4 controls)

Identify each of the controls as either physical, administrative, or technical and either preventative, detective, or corrective (so one control might be a physical, preventive control)

Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget

Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.  

Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy

All policies will be uploaded to SafeAssign, so ensure your papers are original!  As an indicator of length, this would probably be one or two pages in length.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Information Security Report (ISR)

INSTRUCTIONS (remove this section from your final report; included here for directional purposes only)

1.  Using the Internet, find an article/story on a current cybersecurity threat or vulnerability, and summarize your research in a one-page Information Security Report (ISR).

2. Change the ‘x’ in the header to reflect the edition of this report; either 1, 2, 3, 4 or 5.

3.  Insert the due date for this report.

4. Insert your name as the author of this report.

5. Insert the name of the threat you are reporting.

6.  Insert a few paragraphs describing the threat you are reporting.  No more than one (1) page.

7.  Describe the next steps that your organization should take to mitigate this threat using the risk control strategies we discussed in class.

8.  Clearly list the sources you referenced to gather information for this report.  Your citations should be written using APA 6th format.

9.  Insert your login id in the footer, following the words ‘CSCI ’.

10. Be sure there is no red text in your final report, unless you purposely used red text to highlight something you reported.

11. Submit via Canvas drop box.  Academic integrity, spelling, grammar, attention to detail, and readability are critical for a good grade.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Report

Finding a recent article about Cyber security threats on the News. It has to be no older than 2 months and about Cyber security threats. I’ll submit a file that has the requirements in how the report should be done. You will have to erase the red color sentences and write beside the black color. Make sure that the article is not older than 2 months and has a correct source information, so I can find and print out. It is only one page long. 

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Assignment 2: The Presentation

 Congratulations. Your project has been staffed and you are about to meet with the team for the first time. Initial impressions are important and you’ll need visuals for your presentation. Create a slide show (in PowerPoint or similar software) in which you address the following, in this order:

1. Goals: What the project hopes to accomplish.

2. Critical Success Factors: Identify at least 4 different stakeholders; for each, list at least 2 things that the stakeholder requires in order to deem the project successful. 

3. Acquisition strategy: Should the system be built in-house, created by a contractor, purchased offthe-shelf and customized, or leased as a service? Explain your rationale. 

4. Resources: For in-house development, what people/skills are required and what development lifecycle do you recommend? Otherwise, identify 3 candidate organizations that can deliver the system. 

5. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system; the ways that the system supports each of these needs; and how this support differs from the current system. 

6. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them. 

7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them. 

8. Mobility: Identify the system’s capabilities for mobile use. Include a title and summary slide. Use one slide for each of the 8 points above. Include speaker notes or audio narration that explains each slide more fully. 

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Interview Presentation

Joan is currently being considered for an internal promotion with her organization as a Staff Development Trainer. She is very excited about the opportunity. This is a highly competitive position that Joan has been pursuing for years .She has been invited for her second round of interviews and has been informed that she will need to complete a 10 minute oral presentation on any topic of her choice. She has been advised that the presentation will be held in front of the human resources team.

Task: Prepare a 10 minute presentation on any topic (something interesting yet appropriate for the audience).  Be sure to stand out from the other candidates.

Using PowerPoint or similar program create a visual aid to use for the presentation. As well as a full outline for the presenter.

Structure your presentation: The first slide should give an overview of the contents of your presentation. Your introductory slide following this could contain a “grabber” i.e. – an interesting fact, quote or statistic relating to your presentation topic which will make the interviewer sit up and take notice. Each slide following that should provide a headline of what that slide is about, then either a great visual or a few succinct bullet points which you are able to talk around and provide further detail on. Conclude your presentation with a provocative or memorable statement/quote that is intrinsically related to your presentation and vision.

Be sure that the presentation does not exceed 10 minutes. Remember to keep the audience engaged. 

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Short Essay #1 – Long term care option

Select a long-term care option from chapters 1-6.

 Identify the pros and cons of managing that community.

Discuss the educational, licensure, and/or certification requirements to serve as an administrator of that community.

Discuss the federal and/or state regulations that govern the community’s operations.

Students will reflect on the two Saint Leo core values for this class and respond to how these values will impact their management processes as it relates to the selected issue.

 A minimum of 3 peer reviewed scholarly journal articles and/or scholarly books should be used to support the essay.

 APA documentation is required.

The title page, abstract and references are not included in the 3-page requirement.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"