Devry sec360 full course [ all discussions all quizes all assignment

Questionweek 1

 

Security Policy (graded)

Policy is central to affecting security in organizations. Using the security policy for your workplace (or other organization with which you are familiar), what are some key features that allow personnel to control security? Are there any deficiencies? What can be added that would improve security?

The security Common Body of Knowledge (CBK) describes what security professionals collectively know about the discipline. What knowledge domains are included in the CBK? What do you think will be added to the CBK in the future?

This section lists options that can be used to view responses.

week 2

Compliance Legislation (HIPAA) (graded)

How can we utilize the four types of security policies to develop a HIPAA security program for organizations? What kinds of information does HIPAA protect? What kinds of organizations does HIPAA cover?

 

Intellectual Property (IP) (graded)

Your organization has asked you to assist in the discussion about how to best protect its intellectual property (IP). The engineers in your organization have developed new database and ordering software to support a faster process for fulfilling customer orders. Which of the various forms of IP protection will you recommend for safeguarding the engineers’ work? Should it be protected at all? What does the organization risk by getting IP protection?

week 3

 

Snack Cake Security (graded)

Your company has a special recipe for snack cakes. This snack cake is a key product in your company’s lineup, and it is responsible for a large majority of shareholder value. Using a security model described in the text, describ

 

Security and the OSI Model (graded)

Security can have a cumulative effect. Consider the OSI model as a key component of the Common Body of Knowledge. For definitions of OSI layers, click here: OSI Layers. What is the OSI model about, and how can we use it when we are selecting security controls?
e an approach that will allow this important recipe to be kept secure.

week 4

Amusement Security (graded)

Your company is in the business of entertainment; they run an amusement park. There are thousands of people all over the park every day. It is very important to control who has access to what, and not just for visitors, but for employees as well. Define groups of people, and indicate how you would control physical access for them.

Security Operations Changes (graded)

Describe how to insert changes in the operational security of the organization. How do you manage those who do not want to accept the changes?

This section lists options that can be used to view responses.

week 5

 

Backup and Recovery Planning (graded)

Why are backups so often overlooked in an organization? How do we sell the benefits of spending money on backup solutions to business managers and executives?

 

Access Control Lists (graded)

Access control lists are very valuable for administering granular control over an organization’s resources. So why do a lot of organizations opt not to use them in lieu of more general super user or administrator accounts?

week 6

Which algorithm is more secure: AES256 or AES128? Why?

 

The Enterprise Firewall is Dead (graded)

A popular computer network publication stated at one time that the enterprise firewall was dead. It boldly stated that the exterior firewalls of the organization should be torn down and replaced with host-based firewalls instead. Is this insane, or is it the best new practice in security management? Explain your answer.

This section lists options that can be used to view responses.

 

 

Intrusion Detection (graded)

Your organization’s business manager has read an article about how intrusion detection systems can help deter hackers. He or she wants to spearhead a campaign to deploy them around the company’s locations in three states. Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary? Specific to this example, how do you respond to ad hoc security requests like this? In general, how can you keep requests like this in check

Engineering software is like engineering a car; if one were so inclined, there could be a completely bug- and security-free application. Do you agree with this? Why or why not?

 

 

 

 

 

 

 

 

 

 

week 2 you decide

 

00:00

Role

You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.00:00

Players

StoneChief Executive Officer Margie NelsonChief Financial Officer GarThomasGeneral Manager

Deliverable

Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.<br><br>If you are finished reviewing this scenario, close this window and return to this Week’s You Decide tab, in eCollege, to complete the activity for this scenario.<br><br>You can return and review this scenario again at any time.

YOUDECIDE

Activity

Assignment

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.

Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.

  • Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
  • Review the OSI Simulation in the week 3 lecture.
  • Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).

Grading Rubric:

Category Points Description
Understanding 20 Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem.
Analysis 20 Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem.
Execution 10 Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly.
Total 50 A quality paper will meet or exceed all of the above requirements.

Note!

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox

 

 

 

 

<pclass=”block_indent”>Cryptographic Tunneling and the OSI Model

 

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).

Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).

View Grading Rubric

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions

 

 

 

quizes

 

 

 

 

 

 

 

 

 

EssayProffesor.com
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.