Categories
Computer sciences and Information technology

Please incorporate the topics below into an 8-page essay assignment. Make sure a

Please incorporate the topics below into an 8-page essay assignment. Make sure all details and information are including talking about these topics in depth. No Plagiarism!! Use the textbook Cloud Computing by Barrie Sosinsky for your sources including any outside information necessary. Please make sure it is done properly and correctly.
Platforms as a Service – PaaS
Infrastructures as a Service – IaaS
Software (Applications) as a Services – SaaS
Exploring Cloud Delivery Models:
Private Cloud
Public Cloud
Hybrid and Community Clouds
Data Considerations Security Design Monitoring Strategies, SLA Management and DR Planning

Categories
Computer sciences and Information technology

Please incorporate the topics below into an 8-page essay assignment. Make sure a

Please incorporate the topics below into an 8-page essay assignment. Make sure all details and information are including talking about these topics in depth. No Plagiarism!! Use the textbook Cloud Computing by Barrie Sosinsky for your sources including any outside information necessary. Please make sure it is done properly and correctly.
Platforms as a Service – PaaS
Infrastructures as a Service – IaaS
Software (Applications) as a Services – SaaS
Exploring Cloud Delivery Models:
Private Cloud
Public Cloud
Hybrid and Community Clouds
Data Considerations Security Design Monitoring Strategies, SLA Management and DR Planning

Categories
Computer sciences and Information technology

Topics are going to be from chapter 9 and 10 respectively and external sources a

Topics are going to be from chapter 9 and 10 respectively and external sources about Security
Management Practices and Planning for Contingencies
Information Security Management Practices and Planning for Contingencies
1. Overview of IS management practices and BCP – ½ to 1 page
2. IS Management Practices: – 3-4 pages
o Security Employment Practices which include Hiring, Job Descriptions, Interviews and
Background Checks
o The difference between contract employees and temporary workers, consultants, and
business partners
o Performance management and the building of the performance measurement program
o The implementation and reporting procedures of the performance measurements
o Benchmarking/Limitations and Recommended Practices
o Baselining and the support for benchmarks and baselines.
3. Business Continuity overview – fundamentals and components of contingency planning – 3
pages
o The business impact analysis and contingency planning policies
o The incident response policy and planning procedures
o Detecting incidents and data protection in preparation of any incidents
o Containing incidents and recovering from them
4. The disaster recovery process – 1 page
5. The business continuity policy and procedures – 1 page
6. Conclusion – one – two paragraphs
Above is the topic outline chosen and the number of pages for each step. Using the textbook Management in Information Security by Michael E. Whitman and Herbert J. Mattord to complete this assignment. Please complete and follow all instructions properly and No Plagiarism using information from the textbook and any sources used. And make sure each bullet point above is answered and followed.
http://library.lol/main/C7F97C2AE6B9B73EFF6ADB10104E63B9

Categories
Computer sciences and Information technology

Topics are going to be from chapter 9 and 10 respectively and external sources a

Topics are going to be from chapter 9 and 10 respectively and external sources about Security
Management Practices and Planning for Contingencies
Information Security Management Practices and Planning for Contingencies
1. Overview of IS management practices and BCP – ½ to 1 page
2. IS Management Practices: – 3-4 pages
o Security Employment Practices which include Hiring, Job Descriptions, Interviews and
Background Checks
o The difference between contract employees and temporary workers, consultants, and
business partners
o Performance management and the building of the performance measurement program
o The implementation and reporting procedures of the performance measurements
o Benchmarking/Limitations and Recommended Practices
o Baselining and the support for benchmarks and baselines.
3. Business Continuity overview – fundamentals and components of contingency planning – 3
pages
o The business impact analysis and contingency planning policies
o The incident response policy and planning procedures
o Detecting incidents and data protection in preparation of any incidents
o Containing incidents and recovering from them
4. The disaster recovery process – 1 page
5. The business continuity policy and procedures – 1 page
6. Conclusion – one – two paragraphs
Above is the topic outline chosen and the number of pages for each step. Using the textbook Management in Information Security by Michael E. Whitman and Herbert J. Mattord to complete this assignment. Please complete and follow all instructions properly and No Plagiarism using information from the textbook and any sources used. And make sure each bullet point above is answered and followed.
http://library.lol/main/C7F97C2AE6B9B73EFF6ADB10104E63B9

Categories
Computer sciences and Information technology

This week your rotation assignment takes you to the Office of the Chief Financia

This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).
An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:
1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credits some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.
2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.
The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.
Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)
Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a concise (approximately 300 word) summary of the important points from your readings. You have also been asked to help identify and describe / explain 3 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Categories
Computer sciences and Information technology

This week your rotation assignment takes you to the Office of the Chief Financia

This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).
An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:
1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credits some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.
2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.
The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.
Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)
Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a concise (approximately 300 word) summary of the important points from your readings. You have also been asked to help identify and describe / explain 3 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Categories
Computer sciences and Information technology

Project Deliverables This project report is of two parts: 1. Part 1 Security

Project Deliverables
This project report is of two parts:
1. Part 1 Security in operating system
2. Part 2 Protection in operating system
➢ Title page, Table of Contents, Introduction to the two selected operating systems, Security in Operating System, Protection in Operating System, Conclusion, References.
➢ You need to achieve all the requirements and select the two operating systems of your choice. Compare the algorithms of both the operating system for security and protection. Write a detailed report discussing the algorithms used by both the operating systems to provide security to the computer system and user. Discuss all sections of the algorithm.
To help:
In the section Security in Operating System,
• Write a detailed report discussing the algorithms used by both the operating systems to provide security to the computer system and user. Discuss all sections of the algorithms in detail.
• Based on your analysis which Operating System is providing better security and why.
• What features/functions you will recommend making an operating system more secure.
In the section Protection in Operating System,

• Write a detailed report discussing the protection matrix used by both the operating systems. Discuss all sections of the matrix in detail.
• Based on your analysis which Operating System is providing better protection and why for the following functions.
o An object is created and deleted
o A new domain is created and deleted
o New permissions are generated to a domain to access an object
o Existing permissions of a domain to access an object are revoked
o What features/functions you will recommend making an operating system more protected.

Categories
Computer sciences and Information technology

Project Deliverables This project report is of two parts: 1. Part 1 Security

Project Deliverables
This project report is of two parts:
1. Part 1 Security in operating system
2. Part 2 Protection in operating system
➢ Title page, Table of Contents, Introduction to the two selected operating systems, Security in Operating System, Protection in Operating System, Conclusion, References.
➢ You need to achieve all the requirements and select the two operating systems of your choice. Compare the algorithms of both the operating system for security and protection. Write a detailed report discussing the algorithms used by both the operating systems to provide security to the computer system and user. Discuss all sections of the algorithm.
To help:
In the section Security in Operating System,
• Write a detailed report discussing the algorithms used by both the operating systems to provide security to the computer system and user. Discuss all sections of the algorithms in detail.
• Based on your analysis which Operating System is providing better security and why.
• What features/functions you will recommend making an operating system more secure.
In the section Protection in Operating System,

• Write a detailed report discussing the protection matrix used by both the operating systems. Discuss all sections of the matrix in detail.
• Based on your analysis which Operating System is providing better protection and why for the following functions.
o An object is created and deleted
o A new domain is created and deleted
o New permissions are generated to a domain to access an object
o Existing permissions of a domain to access an object are revoked
o What features/functions you will recommend making an operating system more protected.

Categories
Computer sciences and Information technology

Same as the previous discussion in Week 5, select from the two topics below and

Same as the previous discussion in Week 5, select from the two topics below and answer the question in a detailed explanation.
(1) Based on the items below: What do think is most important when you design secure applications and architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Design secure access to AWS resources
Design secure application tiers
Select appropriate data secure options
(2) Based on the items below: What do think is most important when you design cost-optimized architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Identify elastic and scalable compute solutions for a workload
Select high-performing and scalable storage solutions for a workload
Select high-performing networking solutions for a workload
Choose high-performing database solutions for a workload

Categories
Computer sciences and Information technology

This course will have you cover various design concepts essential to working as

This course will have you cover various design concepts essential to working as an AWS solutions architect. Select from the two topics below and answer the question in a detailed explanation.
(1) Based on the items below: What do think is most important when you design a resilient architecture? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Design a multi-tier architecture solution
Design highly available and/or fault-tolerant architectures
Design decoupling mechanisms using AWS services
Choose appropriate resilient storage
(2) Based on the items below: What do think is most important when you design high-performing architectures? How can it be implemented in the AWS cloud environment? Why is it important to be included?
Identify elastic and scalable compute solutions for a workload
Select high-performing and scalable storage solutions for a workload
Select high-performing networking solutions for a workload
Choose high-performing database solutions for a workload