-Consolidated Electronics Group, Inc. is a manufacturer and
supplier of avionics equipment to various airlines across the
continental United States. Recently, the company laid off several
employees, resulting in many disgruntled workers.
Now, the information technology (IT) staff has reported a spike in
network attacks numbering in the thousands. Reports from the
intrusion detection system (IDS) indicate that two of these
potential attacks may have compromised highly classified plans
for a new prototype avionics switchboard, which is expected to
revolutionize the market. The IT staff suspects that the attacks and
potential security breach may have something to do with the
recently laid-off staff.
To complete this assignment, use NIST’s Computer Security Incident Handling Guide (Which I will attach to this order), Section 3 starting on page 21.
-Using the guidance from guide, craft an incident response plan that includes:
-A description of the specific measures that will be taken to
investigate a security breach
-An explanation of steps taken to prevent future attacks and to
secure the company’s information systems
-A communication plan to disseminate the results and findings of
this event to the organization.
Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your organization has decided to hire additional network security technicians. Once hired, you are to give a report to these individuals designed to illustrate holes in current security countermeasures, along with ways in which these holes can be filled. In your report, ensure you address the areas mentioned below:
An explanation of which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures
An explanation of the actions that should be taken to prevent existing web security countermeasures from being exploited
An assessment of the pros and cons of choosing to implement measures such as firewalls, access control measures, and cryptographic systems
Visit two Web sites that create e-commerce infrastructure for their clients. What kinds of tools are available for building e-commerce applications? If costs and project timelines are available, please include those figures as well. Summarize your findings in a one- to two-page report.
I do not need any cover page of my essay and conclusion or references page. I just need the 4 page of main idea.
Welcome to the task!
First, review what big data is and the applications of big data.
Read Chapter 1 Introduction to big Data in Application of Big Data for National Security: A Practitioners Guide to Emerging Technologies.
what is it
How is it different
structured and unstructured data
The five V’s of Big Data
Importance, application, advantages
Analytical capabilities of big data – greater risk intelligence and predictive modeling
Read Big Data Analytics: A Practical Guide For Managers.
Mother of Invention’s Triplets: Moore’s Law, the Proliferation of Data, and Data Storage Technology
Second, investigate analytics of big data.
Read Chapter 2 Drilling into the Big Data Gold Mine – Data Fusion and High-Performance Analytics for Intelligence Professionals
Read Chapter 6 Critical Infrastructure Protection by Harnessing Big Data
Read Cognitive Computing and Big Data Analytics
Chapter 4 The Relationship between Big Data and Cognitive Computing
Chapter 6 Applying Advanced Analytics to Cognitive Computing
Third, investigate Implementation and challenges of big data analytics
Watch IT Security: Big Data Challenges in the Cloud
Read Section 3 – Methods and Technology Solutions in application of Big Data for National Security: A Practitioner’s Guide
Requirements and challenges for big data architectures
Tools and technologies for implementation
Mining Social Media
Making Sense of Unstructured Natural Language Information
Literature Mining and Ontology Mapping Applied to Big Data
Big Data Concerns in Autonomous AI Systems
Read Section 4 Legal and Social Challenges
Legal Challenges of Big Data Application
Big Data and the Italian Legal Framework
Accounting for Cultural Influences in Big Data Analytics
Making Sense of Noise
Task 4: Since the company is dealing with very large amounts of data continuously, it I important for the IT team to develop a “Big Data” mindset so that they can use their analysis for predictive modeling. Set up a series of digital scenarios that you would have the IT team work through where they have to make predictive models from a large batch of data. You can find and use an existing data set for this project but need to clearly define what the team is analyzing and how they are to go about making their predictive models. Remember, this is a training exercise. Here is a link for a video on predictive modeling for your to see:
Research and select a current trend in the area of telecommunications. Prepare a 10-15 page paper in Microsoft Word APA format (350 words per page). At a minimum include the following:
– Detailed description of the area researched
– Technology involved in the area
– Future trends in the area
– Example companies involved in the area
– Regulatory issues surrounding the area
– Global implications for the area
– References (minimum of 10)
Prepare a 10-12 slide Microsoft PowerPoint highlighting the content from the paper.
Case Study Question:
Society is becoming increasingly dependent on computers and technology for functioning in every day life. Every aspect of our lives has been affected by the infiltration of computers and technology. Computers are used to conduct business from home, meet new friends and find old friends, maintain communications with distant family, and to met out some stress relief after a long day at the office. As more and more people rely on computers to succeed each day, it begs the question – are people becoming too dependent on computers, your paper should look at either the historical changes that shook up society or future changes being developed now that will shake up society?
To be able to route packets, a router must know the destination address the packet is being sent to, the location of neighboring routers that it will use to pass, the possible routes it can take to remote networks, metrics to calculate the best route based on efficiency and throughput, and how to maintain the routing information.
For your Unit 1 Individual Project assignment, develop a 3-page MS Word document that explains the IP routing process, provides a diagram of the IP routing process, and explains the three different route types of static, default, and dynamic routing.
Note: Your paper must contain a cover page (your name, date, course, assignment title) and a reference page (APA citations).
Please cite your references in APA format.
Knoppix is a Linux distribution that can run entirely from a CD or DVD. Write a short paper discussing the possibility of using Knoppix (or other similar distributions) as a forensic boot disk. Give a real-life scenario demonstrating Knoppix’s (or other similar distribution’s) impact and application.
Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization called Adventure Scuba and Diving Institute (ASDI).
Adventure Scuba and Diving Institute (ASDI) is located in the United States and offers training and certification programs for scuba and deep-sea diving. ASDI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides and manuals. The school suspects that competitors have tried to breach the organization’s computer systems to gain access to these training materials.
ASDI’s network is comprised of two web servers, two file servers, one email server, 50 employee workstations, and a 50-workstation student computer lab. The school also has public and private Wi-Fi availability throughout the campus.
Your firm has been hired as the IT security analyst to review, evaluate, and make recommendations with respect to maintenance of security of the organization’s computer and network systems. You have been charged by your supervisor to prepare a preliminary report documenting the most critical security threats that ASDI faces. Your supervisor has given you the following resources that might be useful in your research and analysis:
-An article on the Help Net Security website (https://www.helpnetsecurity.com/2010/11/15/top-10-security-threats-for-2011/)
-Common Vulnerabilities and Exposure (CVE) database search (https://cve.mitre.org/find/index.html)
-Security organizations, such as Secunia (https://www.flexera.com/products/software-vulnerability-research/secunia-research)
Your supervisor has asked you to consider and account for the following questions as you shortlist the threats and prepare your report:
-What threats are new this year and which have become more
-Why are these threats more common and why are they
-What threats remain constant from year to year? Why?
-What threats do you believe will become more critical in the next
12 months? Why?
-Has an exploit been released?
-What is the likelihood of an exploit?
-How widely used is the software or system?
Also Include in the report a network diagram of how you propose the network structure should be configured for optimum security.
The sections of your report should be as follows:
-Table of Contents
-Executive Summary (provide a project overview and summary in
-Body of the report in narrative form in two sections: Section 1 of
the on Vulnerabilities and Threats in narrative form, providing
responses to each of the questions posed in the assignment
scenario, and Section 2 on Countermeasures and Prevention
The majority of online fraud occurs through electronic communication. We receive emails daily that represent some type of phishing scheme or web spoofing, which can be deleted with a simple click of the delete button. But what happens when your personal information has been stolen through a third-party vendor’s technical error while you made a purchase from your local retail store, who stores your credit card and personal information within a remote database?
Research a recent news headline of a retail chain that has been breached recently and analyze the scenario. What caused the issue? What steps can be taken moving forward to resolve the issue? Use research and specific examples to support your resolution recommendations.