Categories
IT, Web

Write a detailed report discussing the algorithm used by the operating system to

Write a detailed report discussing the algorithm used by the operating system to provide security to the computer system and user. Discuss all sections of the algorithm in detail.

Categories
IT, Web

BACKGROUND: One of the key objectives of this course is to teach you to think li

BACKGROUND:
One of the key objectives of this course is to teach you to think like a Cybersecurity Leader. Leaders help establish scalable strategy, processes and standards. The only way this type of leadership can be effective is communicating with the remainder of the organization, which means documentation and training.
You have also learned in this class that polices and procedures should be driving a cybersecurity or information security program.
OBJECTIVE:
The objective of this assignment is for you to develop cybersecurity policies that you would use in a fictitious organization.
You will NOT be writing procedures (i.e., no step by step instructions) or standards (e.g., 256-bit symmetric encryption keys).
GRADING:
You will earn full points by ensuring that key policy elements listed below are addressed, and the policies are written in a professional manner. Review the lecture material on what the purpose of a policy is and how it is structured. You can also use Google for ideas, but the writing must be in your own words. Do not copy-paste from the web, as TurnItIn will reveal that plagiarism. There should not be any references listed, as this all your own thinking and writing, based on what you have learned and ideas you find from researching.
You may discuss and brainstorm with other students, but again, you must write your own words….TurnItIn will reveal shared content as well.
PEER REVIEW: While the instructor makes the final grading decision, two of your peers will review your policies for quality and completeness, and share their opinion with the instructor. This process helps you continue to learn, as you see how others have written their policies. It’s harder to write a policy than it seems!
View your peers as employees of the organization you would develop these policies for. Ask yourself, will they easily understand the policies? Would their use of these polices actually protect the organization’s data?
BACKGROUND:
You are writing a policy for a single doctor dental practice located in an office complex.
There are 4 employees (the dentist, two dental hygienists and an office manager).
There are 3 desktop computers (the office manager computer (used for collecting credit card payments and scheduling appointments) and two computers beside the dental chairs (used for taking x-rays and recording health details).
You can assume computers never leave the office.
The EHR software used by the practice is tab32 Links to an external site.(for managing the practice).
Microsoft 365 Business Basic Links to an external site.for web browser-based email only (Teams and Sharepoint are NOT used).
You can assume patient data is never emailed.
The office is secured with two external doors that are locked after hours and everyone in the organization is given a metal key to unlock.
There are no video cameras, but the last person to leave activates an alarm.
The front door is unlocked during the day and the office manager greets anyone that may come through that door.
DELIVERABLES:
Create a single document called “ACME Dental Workforce Security Policies” and save as a PDF that you attach and upload.
The audience for these polices is everyone within the organization, meaning the “entire workforce” (employees, contractors and volunteers).
These policies should tell the workforce what to do in their daily activities to ensure security of the organization’s data.
The document should be at least 1,000 words in length.
The document should contain at a minimum policy items that address the following:
Secure use of the EHR
Account and password use
Accessing from home or public computers
Printing patient data
Logging off
Secure use of Microsoft 365 for email
Account and password use
Accessing from home or public computers
Detecting and reporting phishing emails
Opening attachments
Clicking on links from un-known senders
Forwarding company email to external recipients
Forwarding company email to employee’s personal email accounts
Emailing patient data (or not!)
Using the EHR and Microsoft 365 from a BYOD device (e.g., personal phone, personal computer at home)
Prohibiting company data on personal cloud-applications (e.g., DropBox)
Using (or not!) the EHR and Microsoft 365 from a public computer (e.g., computer in the lobby of a hotel)
Company Computers
Use of company computers for personal needs and random web surfing
Use of company computers for illegal, dangerous or inappropriate activities
Accepting software updates
Never disabling antivirus and other security controls
Office security
Securing the office after-hours
Sharing of keys
Visitors (not patients, but friends or family of the employees)
Leaving the front door unattended
Other concerns
Attending periodic security training sessions
Reporting concerns that patient privacy or security has been violated
Reporting issues or concerns with computers, email or the EHR
Comments from Customer
Discipline: cybersecurity

Categories
IT, Web

Write a detailed report discussing the algorithm used by the operating system to

Write a detailed report discussing the algorithm used by the operating system to provide security to the computer system and user. Discuss all sections of the algorithm in detail.

Categories
IT, Web

Cloud Advanced Features Runbook Executive Summary (<1 page) Plan Scope (<1 page)

Cloud Advanced Features Runbook
Executive Summary (<1 page)
Plan Scope (<1 page)
● Cloud Advanced Features Overview
Advanced Data Protection Solutions in the Cloud (2–3 pages)
● Data Backup and Restore Using Amazon S3
● Summary
Advanced Data Security Solutions in the Cloud (2–3 pages)
● AWS Key Management Services Overview
● Summary
AWS Securing Data at Rest with Encryption (2–3 pages)
● Overview
● Scaling Your Encryption at Rest Capabilities With AWS KMS
● Summary
High Availability of Data in the Cloud (3-4 pages)
● Overview
● Near-Zero Downtown Migrations to AWS
● Summary
Advanced Resources Monitoring and Metering in the Cloud (2–3 pages)
● Overview
● Cloud Insights Deployment
● Summary
Deploying a Comprehensive Service Catalog (2–3 pages)
● Overview
● AWS Service Catalog
● Summary
Conclusion (<1 page)

Categories
IT, Web

Assignment of data visualisation and storry telling Tasks (All tasks are equally

Assignment of data visualisation and storry telling
Tasks (All tasks are equally weighted):
Using Tableau create a simple story on the topic:
• The biggest volcano eruptions – brief history
Remember:
• Justify the topic
• Remember about the chronology of events
• Avoid overloading your information
• Remember that your project must be the basis for further discussions
Answer the questions and justify:
• What are the best practices in story telling?
• What are the types of stories?
Covered learning outcomes: L01, L02
At least 2000, at most 2200 words

Categories
IT, Web

i have finished the PPT assignment , i’m gonna upload the assignment but i need

i have finished the PPT assignment , i’m gonna upload the assignment but i need you to fix the assignment based on the feedback so please read the feedback carefully and apply it in PPT assignment which i’m gonna upload . And here is the feedback which i need you to read and apply please . Please see my comments below:
Q1 (Slides 1,2) You need to identify UAE’s traditional enemies (e.g. Iran, others?)
Q1 (Slides 1,2) You need to mention which of these traditional enemies are using the internet to attack UAE
Q1 – Mention some important cyber attacks as examples from traditional adversaries (use the news or other references)
Q2 – create a list of the cyber threats against UAE (example DDoS attacks, Web defacement, others?) and provide some examples from the news or from other reports / if possible, include dates (for example, attacks on UAE because of re-established relations with Israel)
Q2 (slide 5)- Mention a short description of each of the cyber attacks from UAE enemies
Q3 – You need to identify Iran’s (or other adversary’s) cyber capabilities. You can use lecture 11 for this. It is important to know where our adversaries are standing(is the opponent weak, strong, or aggressive? what has the opponent done to be a significant threat?). For example, you could mention that Iran’s cyber skills have been improved after Stuxnet, etc. Also, please put your opinion at the end.
Q3 – Slides 6,7,8, you need to add some further aspects to the existing – explain in short in additional slides the importance of each one
Q4 – (use slide 5 list in addition – could UAE fall victim from these threats) YES – NO? WHY YES? WHY NO? please put your opinion at the end. Do you believe all these are enough? Should we be assured that nothing will happen or should we keep preparing for a potential large-scale attack? please state your opinion.
Q5 – break slide 9 into 3 slides, one for each category: (A) civilians, (b) companies, (C) gov. organizations. Repeat aspects you believe match all categories and add information from lecture 2 for all
Comments from Customer
Discipline: cyber security policy

Categories
IT, Web

i have finished the PPT assignment , i’m gonna upload the assignment but i need

i have finished the PPT assignment , i’m gonna upload the assignment but i need you to fix the assignment based on the feedback so please read the feedback carefully and apply it in PPT assignment which i’m gonna upload . And here is the feedback which i need you to read and apply please . Please see my comments below:
Q1 (Slides 1,2) You need to identify UAE’s traditional enemies (e.g. Iran, others?)
Q1 (Slides 1,2) You need to mention which of these traditional enemies are using the internet to attack UAE
Q1 – Mention some important cyber attacks as examples from traditional adversaries (use the news or other references)
Q2 – create a list of the cyber threats against UAE (example DDoS attacks, Web defacement, others?) and provide some examples from the news or from other reports / if possible, include dates (for example, attacks on UAE because of re-established relations with Israel)
Q2 (slide 5)- Mention a short description of each of the cyber attacks from UAE enemies
Q3 – You need to identify Iran’s (or other adversary’s) cyber capabilities. You can use lecture 11 for this. It is important to know where our adversaries are standing(is the opponent weak, strong, or aggressive? what has the opponent done to be a significant threat?). For example, you could mention that Iran’s cyber skills have been improved after Stuxnet, etc. Also, please put your opinion at the end.
Q3 – Slides 6,7,8, you need to add some further aspects to the existing – explain in short in additional slides the importance of each one
Q4 – (use slide 5 list in addition – could UAE fall victim from these threats) YES – NO? WHY YES? WHY NO? please put your opinion at the end. Do you believe all these are enough? Should we be assured that nothing will happen or should we keep preparing for a potential large-scale attack? please state your opinion.
Q5 – break slide 9 into 3 slides, one for each category: (A) civilians, (b) companies, (C) gov. organizations. Repeat aspects you believe match all categories and add information from lecture 2 for all
Comments from Customer
Discipline: cyber security policy

Categories
IT, Web

Do assignment:

Using: Microsoft Office 2016 Introductory
Go to Page PPT 111
Do Assignment:
In the Lab
Lab 1: Creating a Presentation, Inserting Photos, Applying Picture Styles, and Inserting Shapes
Comments from Customer
https://we.tl/t-e8FLhjBQRR

Categories
IT, Web

Do you think they would deploy such uncontrolled malware again?

Please listen to https://darknetdiaries.com/episode/54/ and answer the following questions as a text entry to the assignment.
Please title each section of your response with Question 1, Question 2 or Question 3 (do not re-post the actual question in the response).
1- Why do you think a user’s password is stored in cleartext in memory in a Windows OS, not encrypted like when stored on the hard disk?
2- Do you think Russia knew that the ransomware would spread across the world? Do you think they cared? Do you think they would deploy such uncontrolled malware again?
3- If you were the CTO of Maersk, what could you have done to protect against this zero-day exploit?
Comments from Customer
Discipline: CYBERSECURITY

Categories
IT, Web

Do you think they cared?

Please listen to https://darknetdiaries.com/episode/54/ and answer the following questions as a text entry to the assignment.
Please title each section of your response with Question 1, Question 2 or Question 3 (do not re-post the actual question in the response).
1- Why do you think a user’s password is stored in cleartext in memory in a Windows OS, not encrypted like when stored on the hard disk?
2- Do you think Russia knew that the ransomware would spread across the world? Do you think they cared? Do you think they would deploy such uncontrolled malware again?
3- If you were the CTO of Maersk, what could you have done to protect against this zero-day exploit?
Comments from Customer
Discipline: CYBERSECURITY