Category Archives: CIS 542

STRAYER CIS 542 Week 9 Discussion Question Social Networking Risks Recent

STRAYER CIS 542 Week 9 Discussion Question Social Networking Risks Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-9-discussion-question-social-networking-risks-recent

For more classes visit

http://www.uopassignments.com/

 

Social media and social networking are some of the newest tools used to market products and services to the public. Sales and marketing professionals love these tools since they reach consumers with great efficiency and with tailored results.

Many organizations do not allow office employees to use social networking sites and instant messaging software. Take a position for or against these policies and provide a rationale for your response. What if the company implemented a “Bring your Own Device Plan,” (BYOD)—would this change your opinion? Should employees be allowed to access these sites if they are at work? Using the Internet, look for any resources that suggest safer ways to implement these services in the workplace. Provide links to the tools or tips that you find and share with your classmates.

 

After reading a few of your classmates’ postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.

 

 

STRAYER CIS 542 Week 9 Discussion Career Paths in IT and Security Recent

STRAYER CIS 542 Week 9 Discussion Career Paths in IT and Security Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-9-discussion-career-paths-in-it-and-security-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 9 Discussion Career Paths in IT and Security Recent

Please respond to the following:

There are many different caeer paths that one can take in IT. Several are mentioned in Chapter 14. Remember that a path is a journey. It is not likely that you would start as a Junior Web Developer and stay a Junior Web Developer for the next 30 years. Choose any one (1) career within and describe the path you could take. Explain the major expectations an employer would have of you in that career..

Building on the previous discussion, determine at least three (3) types of security training and certifications that you should you obtain to be successful in that career path. Provide a rationale for your response.

 

 

STRAYER CIS 542 Week 9 Case Study Viruses Recent

STRAYER CIS 542 Week 9 Case Study Viruses Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-9-case-study-viruses-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 9 Case Study Viruses

Case Study: Viruses

Due Week 9 and worth 100 points

The country of Iran is expending tremendous resources on developing a nuclear energy program that is believed by the Western countries to be weapons-oriented. Recently, a virus named the Stuxnet has been in the news because it was introduced into the Iranian computers controlling their nuclear program and wreaked havoc on their centrifuges. Unfortunately, this virus has now escaped and is available to malicious attackers so that it could potentially be used against our own infrastructure.

Watch the video from “60 Minutes” titled, “Stuxnet: Computer worm opens new era of warfare”, located athttp://www.youtube.com/watch?v=6WmaZYJwJng, concerning the Stuxnet virus.

Read the article titled, “News briefs: Flame, Stuxnet, breach at LinkedIn and other security news”, located athttp://www.scmagazine.com/news-briefs-flame-stuxnet-breach-at-linkedin-and-other-security-recents/article/245502/, concerning the Flame virus and Stuxnet.

 

Write a three to five (3-5) page paper in which you:

1. Describe the virus and how it propagated itself onto servers over the Web based on the actual information provided. Assess the Web-based risks that led to the attack.

2. Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

3. Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet.

• Discuss some secure coding efforts and practices under way to mitigate the vulnerabilities exposed by this particular episode.

5. Use at least four (4) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast Web-based risks.

• Describe the attributes and qualities of secure coding practices.

• Use technology and information resources to research issues in securing Web-based applications.

• Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

 

 

STRAYER CIS 542 Week 8 Discussion End point Communications Recent

STRAYER CIS 542 Week 8 Discussion End point Communications Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-8-discussion-end-point-communications-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 8 Discussion End point Communications Recent

Please respond to the following:

Imagine that you are an IT Manager and you need to create a Power Pointfor training purposes that outlines the potential threats involved in e-mail and social networking. Determine the top five (5) risks that you would cover in your presentation. Provide a rationale for your response.

 

Many organizations do not allow office employees on the corporate intranet to use social networking sites and instant messaging software. Take a position for or against these policies and provide a rationale for your response.

 

 

STRAYER CIS 542 Week 7 Discussion End Point Device Security Recent

STRAYER CIS 542 Week 7 Discussion End Point Device Security Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-7-discussion-question-testing-websites-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 7 Discussion End Point Device Security Recent

Please respond to the following:

Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement. Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc. What are the top five (5) policies that you would include? Be sure at least one (1) of the policies involves security.

 

Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise

 

 

STRAYER CIS 542 Week 7 Assignment 8 Recent

STRAYER CIS 542 Week 7 Assignment 8 Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-7-discussion-end-point-device-security-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 7 Assignment 8 Recent

STRAYER CIS 542 Week 6 Lab Assignment 7 Performing Dynamic and Static Quality Control Testing Recent

STRAYER CIS 542 Week 6 Lab Assignment 7 Performing Dynamic and Static Quality Control Testing Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-6-lab-assignment-7-performing-dynamic-and-static-quality-control-testing-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 6 Lab Assignment 7 Performing Dynamic and Static Quality Control Testing Recent

Due Week 6 and worth 30 points

Each lab will be submitted based on the following:

Complete the weekly labs described below using ToolwireLiveLabs.

Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.

Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

STRAYER CIS 542 Week 6 Discussion Website Testing and Security Recent

STRAYER CIS 542 Week 6 Discussion Website Testing and Security Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-6-discussion-website-testing-and-security-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 6 Discussion Website Testing and Security Recent

Please respond to the following:

It’s important to fully test any sort of web application development for functionality, security, etc. Outline the major componenents that you would include in your test plan in order to make sure that your Web application is secure. Provide a rationale for your test plan components.

Imagine that you are an IT Security Manager. You want to have your security team perform penetration testing as part of vulnerability testing on your current systems. Your CIO wants to hire an outside company to perform the penetration testing. Choose a side and argue for or against hiring an outside company. What are the potential benefits and risks with penetration testing in general.

 

STRAYER CIS 542 Week 6 Discussion Question Compliance and Regulations Recent

STRAYER CIS 542 Week 6 Discussion Question Compliance and Regulations Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-6-discussion-question-compliance-and-regulations-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 6 Discussion Question Compliance and Regulations Recent

Many recent breaches have involved payment card systems, otherwise known as point of sales (POS) terminals. The regulations and standards for POS systems is called the Payment Card Industry Data Security Standard (PCI DSS).

Research recent POS breaches, (find examples from within the last three years) and explain based on your reading in class what occurred. Explain why or why not you think the breach was preventable, as well as the overall impact the breach had on the business. In your opinion, if the breach was preventable and the company is found responsible should they be given a monetary penalty or should stricter legal action be taken, such as jail time? Justify your answer. Suggest or recommend any tool that could help to maintain compliance. Share examples with your classmates and provide links to any useful resources you find.

After reading a few classmate postings, reply to the ones where you learned something new, or have something to add. Get in early to post your initial feedback and keep the discussion going.

 

STRAYER CIS 542 Week 5 Lab Assignment 6 Applying Regulatory Compliance Standards Recent

STRAYER CIS 542 Week 5 Lab Assignment 6 Applying Regulatory Compliance Standards Recent

Check this A+ tutorial guideline at

http://www.uopassignments.com/cis-542-strayer/cis-542-week-5-lab-assignment-6-applying-regulatory-compliance-standards-recent

For more classes visit

http://www.uopassignments.com/

CIS 542 Week 5 Lab Assignment 6 Applying Regulatory Compliance Standards Recent

Due Week 5 and worth 30 points

Each lab will be submitted based on the following:

Log into the ToolwireLiveLabs environment.

Complete the weekly labs described below using ToolwireLiveLabs.

Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.

Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.