Project Part 2

In: Computers and Technology

Submitted By julian505
Words 1461
Pages 6

Security Domains and Strategies

Purpose This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment.

Learning Objectives and Outcomes * You will learn the purpose of a multi-layered security strategy. * You will understand the information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals. * You will incorporate the industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of information systems. * You will fulfill the role of a security professional implementing proper security controls in a specific business situation based on Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge domains.

Required Source Information and Tools
To complete the project, you will need the following: 1. Access to the Internet to perform research for the project 2. Course textbook 3. (ISC)2 SSCP® Common Body of Knowledge available in the SSCP® Candidate Information Bulletin

Project Logistics
The project is divided into one smaller and one major assignment as per the details below:

Activity Name | Assigned | Due By | % Grade | Project Part 1. Multi-Layered Security Plan | Unit 1 | Unit 2 | 6 | Project Part 2. Student SSCP® Domain Research Paper | Unit 2 | Unit 11 | 15 | Deliverables

Project Part 1 Multi-Layered Security Plan

The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The…...

Similar Documents

Bus379 Part 2 Course Project

...Task 4 Year Cash Flow 15% Rate of Return Present Value 0 $(3,000,000.00) 1 $1,100,000.00 $956,521.74 2 $1,450,000.00 $1,260,869.57 3 $1,300,000.00 $1,130,434.78 4 $950,000.00 $826,086.96 Less Investment $(3,000,000.00) $3,450,866.74 1. IRR % IRR= 22.38% 2. NPV NPV= $3,450,866.74 3. Should the company accept this project and why? I believe the company should look into this. The IRR is greater than the Required Rate of Return and the overall NPV is a gain. There does not appear to be a loss in this asset. 4. Explain how depreciation will affect the present value of the project. Depreciation would cause the project's PV to go up. This would be a good thing when considering the amount of taxes the company would save. 5. Provide examples of at least one of the following as it relates to the project: a. Sunk Cost - costs that are non-recoverable and shouldn't be used when considering an investment decision. An example of this would be AirJet has already purchased delivery trucks to deliver parts to vendors/customers. This cost would not be taken into consideration because it has no affect on the purchase of a new machine. This was a purchase that was done prior to any decisions made about buying the new machine. b. Opportunity Cost - This is the most valuable alternative that is given up if a particular investment is undertaken. Most of the time...

Words: 1263 - Pages: 6

Microeconomics Project Part 2

...Sales & Marketing Management CA 2 – Group Project (20%) ________________________________________________________________ Group Project • • • • • • Form groups of no more than 5 students to work on this project. A list of products and customer groups, is given on the next page. Discuss among your group members which product your group will choose. No two groups can do the same product. Choice is on a first-come-first-serve basis. Register your product with your lecturer by Lesson 2 Report Component 1. Research and briefly explain about this customer group you have selected. 2. Research and showcase your knowledge of your chosen product. 3. Explain how you intend to sell your product to this customer group. 4. Presentation materials Your report should be type-written and 1.5-spaced in 11-point (Arial or Times) font. You must produce a picture/visual of your chosen product to accompany the report. It must not exceed 1500 words (not inclusive of the presentation materials) This report is due on 11/6/2012, 1159AM. Presentation Component 1. Each group is given 20 minutes to make the sales presentation to the chosen customer group. A 10-mark penalty will be imposed for exceeding the time limit. 2. Every member in the team must present his/her part. Absentees without a valid reason will be given a zero grade. Presentations are scheduled for Lessons 11 and 12. Each group will be allotted a slot to present. Products 1 Photocopy machines 2 2-liter cars 3 Laptops 4......

Words: 548 - Pages: 3

Project Part 2

...Project Part 2 Entrepreneur Edward Date: 7/14/12 To: My Boss I have researched ice cream and the effects of supply and demand associated with it. I have found several reasons for the increase or decrease in supply and demand and thought you may be interested in my findings. The first issue I have found would be the seasonal changes in the area that the ice cream would be sold. Customers seem to demand ice cream when the weather is hot and they are looking for a way to cool off. So, in the spring/summer months the demand would be high. When the season changes to fall/winter the demand seems to shift to the lesser. Climate of the area has a huge effect on ice cream sales. Secondly, a change in taste could shift the demand to less, People’s taste changes from time to time and there are other substitutes to ice cream. Also if people were to start dieting that could also affect the demand for ice cream. An increase in the price of sugar, and dairy would shift the supply curve to the lesser. With an increase in the cost of making ice cream it would in turn cause companies to order less and raise prices. Therefore people would be paying more for their beloved ice cream. An increase in electricity costs, cow feed, natural gas could also effect the supply curve in a negative way. Increasing the cost of production will shorten supply and increase costs over time....

Words: 255 - Pages: 2

Course Project Part 2

...Task 5: Cost of Capital AirJet Best Parts Inc. is now considering that the appropriate discount rate for the new machine should be the cost of capital and would like to determine it. You will assist in the process of obtaining this rate. Compute the cost of debt. Assume AirJet Best Parts Inc. is considering issuing new bonds. Select current bonds from one of the main competitors as a benchmark. Key competitors include Raytheon, Boeing, Lockheed Martin, and the Northrop Grumman Corporation. What is the YTM of the competitor’s bond? You may use a number of sources, but we recommend Morningstar. Find the YTM of one 15 or 20 year bond with the highest possible creditworthiness. You may assume that new bonds issued by AirJet Best Parts, Inc. are of similar risk and will require the same return. (5 pts) What is the after-tax cost of debt if the tax rate is 34%? (5 pts) Explain what other methods you could have used to find the cost of debt for AirJet Best Parts Inc.(10 pts) Explain why you should use the YTM and not the coupon rate as the required return for debt. (5 pts) Compute the cost of common equity using the CAPM model. For beta, use the average beta of three selected competitors. You may obtain the betas from Yahoo Finance. Assume the risk free rate to be 3% and the market risk premium to be 4%. What is the cost of common equity? (5 pts) Explain the advantages and disadvantages to use the CAPM model as the method to compute the cost of......

Words: 419 - Pages: 2

Project Part 2 It Security

...infect a computer. The term ‘computer virus’ is sometimes used as a catch-all phrase to include all types of malware, including true viruses. Malicious Code A piece of unwanted computer software or code introduced into another program, attached to a document or exists on its own, for malicious purposes. Malware Short for malicious software, software designed to infiltrate a computer system without the owner's informed consent. Usually refers to a variety of forms of hostile, intrusive, or annoying software or program code. Malware encompasses computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software. Casey L. Swain NT2580 August 25, 2013 Project Part 2: Student SSCP® Domain Research Paper REFERENCES Kim D. & Solomon G. M., (2012). Fundamentals of Information Systems Security: The Seven Domains of a Typical IT Infrastructure (1st ed.), 15-33. Burlington, MA. The State of Queensland Government. Department of Education, Training and Employment. Malware and Malicious Code Prevention. July 27, 2012. Web. Aug. 2013 <>...

Words: 953 - Pages: 4

Project Part 2. Sscp

...Introduction The (ISC)2 SSCP® is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSP®) and other advanced certifications. Scenario Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office. The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes. All employees have Internet access. There is no policy on the use of removable media. Several of the branch......

Words: 884 - Pages: 4

Course Project Part 2

...Course Project Part II Introduction You will assume that you still work as a financial analyst for AirJet Best Parts, Inc. The company is considering a capital investment in a new machine and you are in charge of making a recommendation on the purchase based on (1) a given rate of return of 15% (Task 4) and (2) the firm’s cost of capital (Task 5). Task 4. Capital Budgeting for a New Machine A few months have now passed and AirJet Best Parts, Inc. is considering the purchase on a new machine that will increase the production of a special component significantly. The anticipated cash flows for the project are as follows: Year 1 $1,100,000 Year 2 $1,450,000 Year 3 $1,300,000 Year 4 $950,000 You have now been tasked with providing a recommendation for the project based on the results of a Net Present Value Analysis. Assuming that the required rate of return is 15% and the initial cost of the machine is $3,000,000. 1. What is the project’s IRR? (10 pts) 2. What is the project’s NPV? (15 pts) 3. Should the company accept this project and why (or why not)? (5 pts) 4. Explain how depreciation will affect the present value of the project. (10 pts) 5. Provide examples of at least one of the following as it relates to the project: (5 pts each) a. Sunk Cost b. Opportunity cost c. Erosion 6. Explain how you would conduct a scenario and sensitivity analysis of the project. What would be some project-specific risks and market risks related to...

Words: 707 - Pages: 3

Project Part 2

...include in the GDP. I think some activities out of our standard of living that the nation does not rely on, their use might encounter some inaccuracies and defect the national income account. We will not accurately measure black market activities and inflation which is always adjusted for some reasons. Also the GDP does not take welfare into account. The GDP is considered to be the market value of all final goods and services produced in the economy during a period of one year, plus income earned locally by the foreigners minus income earned abroad by the nationals, then the GDP shows another limitation of the national income account; some of the activities to external parties to the production or consumption are simply dismissed. Exercise 2: Chapter 16 Question 5 Frictional unemployment is the time period between jobs when a worker is searching for a better job in comparing his or her previous job to another suitable job. It is the economy stage in which short-term unemployed and employers search respectively the best job and the most skilled employees. The frictional unemployment include the labor force who for some reasons such as searching a better job, moving to another location or they just lost their job therefore look for another job. This does not affect negatively the economy, indeed it is a sign of well-being or healthy economy, due to the fast-growing economy with a mobile and adaptable labor force that have choices. Frictional unemployment is important......

Words: 1030 - Pages: 5

Nt1310 Project Part 2

...This is an Executive Summary Plan for our new building for which construction begins in exactly six weeks. My name is David Pierce and I will be the Project manager for the design and installation of our new cable network for that building. I am excited to be a part of the project and look forward to working with each and every one of you during this exciting time of growth for our company. When considering the capacity if this project I ask you to consider all ideas or changes you see as plausible and should be brought to my attention at anytime. All input will be appreciated and welcomed. When I was assigned with this project I was given several different diagrams of how our new building will be occupied and a few different floor plans. With these my team and I will need to come up with a wiring diagram that will not fit our building’s needs but also allow for future growth of our building. With this project we plan for it to be a bit more expensive than common plans but it will allow for less problematic growth of our building and network in the future. When tacking a project like this we have several different issues that must be addressed. Our first priority in this process is to understand all of the proper building standards and codes. There are several different organizations that we will have to contact and work with to include the Insulated Cable Engineers Association and the Electronic Industries Alliance (EIA). These organizations, along with a few others will......

Words: 2276 - Pages: 10

Project Part 1 Task 2

...Project Part 1 Task 2: Provide Open Source Server Solutions For the various servers at First World Bank Savings and Loan, you need to recommend the appropriate open source software for each server. Tasks You need to: Research and evaluate various open source software for each server considering the stability and security of the software. Recommend open source software for each server and explain reasons for selecting each software. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 3 Self-Assessment Checklist * I have researched and evaluated various open source software for each server. * I have recommended open source software for each server providing rationale for my recommendation. Here is a list of various open source software for the servers used at First World Bank Savings and Loan. Below are the recommendations and reasons why. 1. Zenoss Zenoss is an open source IT Management suite. You can observe and monitor your entire network using Zenoss. It consissts of an alert console, network discovery, performance monitoring, service monitoring, and inventory modules. It is enterprise-ready, free, easy to install and maintain, and modular through ZenPacks. 2. Mono Mono is the open source implementation of Microsoft's .NET technologies. Sponsored by Novell, this technology combines two incompatible worlds (*nix and Microsoft) into a......

Words: 878 - Pages: 4

Menu Project Part 2

...Nutrition for the Young Child ECE 130 Graded Project #405030 Part II: Menu Children 3-5 Years Old Monday Tuesday Wednesday Thursday Friday Breakfast • Milk • Bread • Fruit/Vegetables 1/3 cup cereal 3/4 cup low-fat milk ½ cup fruit juice ½ cup orange fresh sections ½ cinnamon roll ¾ cup low-fat milk ½ cup diced peaches 1 blueberry pancake w/1 Tbsp low-cal syrup ¾ cup low-fat milk ½ cup pear halves ½ slice wheat toast w/ ½ oz low fat cheddar cheese, melted ¾ cup low-fat milk ½ cup fresh banana slices ⅓ cup unsweetened cereal ¾ cup low-fat milk Snack • Bread • Fruit/Vegetable or Milk 4 crackers with 1.5 oz low-fat cheese Water ½ toasted English muffin with 1 Tbsp peanut butter 3/4 cup low-fat milk ½ cup low-fat yogurt with 1 Tbsp granola ½ whole wheat roll ½ cup sliced fresh strawberries ½ oz graham crackers (2 crackers) ½ cup diced peaches, Water ½ oz wheat crackers (4 crackers) ½ oz cheddar cheese Water Lunch • Milk • Bread • Fruit/Vegetable • Fruit/Vegetable • Protein ½ turkey sandwich with 1.5oz turkey ½ cup cooked vegetables ½ banana ¾ cup low-fat milk 1 Pizza Pocket 1/2 cup green salad w/1 Tbsp low-fat dressing 1/2 cup apricot halves 4 oz low-fat yogurt ¾ cup low-fat milk 1.5oz Baked Chicken 1/2 cup boiled carrots 1/2 cup fresh orange sections ¼ cup cooked rice ¾ cup low-fat milk 1 ½ oz lean, broiled hamburger patty 1/2 cup lettuce and tomato salad 1/2 cup pineapple ½ whole wheat bun ¾ cup......

Words: 605 - Pages: 3

Eg481 Project Part 2

...Project Part 2 This research and overview provides awareness of global warming and how our planet’s atmosphere is overloaded with heat trapping carbon dioxide (CO2), which threatens wide-ranging disorder in climate with devastating consequences. Global warming is an environmental issue that affects human health, ecosystem, etc. and this study is summed up into basic responses and opposing viewpoints. I. What are the causes of global warming? • CO2 emissions and increased concentration of greenhouse gases • Human activity is causing the Earth to get hotter • Global warming is a natural occurrence of nature a. Deforestation and natural resources are part of the earth’s cycle b. Negative conception due to media c. Lack of scientific evidence II. Global warming causes serious concern. • Record-breaking extreme weather a. Severe droughts b. Damaging wildfires c. Rising sea levels, warmer temperatures d. Heat waves; diseases • Clean Air Act (CAA), Endangered Species Act, and the Clean Water Act (CWA) that addresses pollution from sewage systems and storm water run-off • NRDC examines long-range consequences if issue is not addressed III. Solving global warming will improve our lives. • Set practical and feasible limits on global warming pollution; in accordance with EPA standards • Think “green” a. Smart cars b. Public transportation c. Communities and buildings d. Stricter efficiency requirements for appliances IV. Curbing climate......

Words: 484 - Pages: 2

Course Project Part 2

...Formal Proposal Submission Assignment Go to the 1. Search for an opportunities within a 90 day period and select any opportunity of your choice. 2. Include the solicitation Number and Contract Award date. 3. Submit a formal written proposal in response to the opportunity that you have selected.   Evaluation Criteria  Technical merit is substantially more important than price in determining who will be included in the competitive range. As proposals become more technically equal, price will take on greater significance. The Government will select the top 3-5 Offers, considering the following evaluation criteria, listed in descending order of importance. * Technical Approach * Subject Matter Knowledge * Key Staff and Other Resources * Past Performance * Cost   Written Proposal Format and Instructions Your written proposal must have a minimum of 20 pages but not exceed 25 pages in length and include the items below: * 1 Page Business Professional Cover Letter addressed to the bid contact, including your overall cost estimate (bid) for the project. * Technical Approach should be at least 5-7 pages and include a description of your management plan for the overall project. Hint: Use of PM concepts apply here! * Resumes should be summarized for the key staff that you are proposing indicating their past experience, skills and education relative to the bid selection (at least 3-5 – one page each).......

Words: 445 - Pages: 2

Project Part 2

...This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the training that makes it possible to do the job. To prevent malicious software and etc. in the 7 domains of an IT infrastructure, you can isolate and install preventions for each domain. The domains are as follows: User Domain, Workstation Domain, LAN Domain, and LAN to WAN Domain, Remote Access Domain, WAN Domain, and the System/Application Domain. The first part of the IT infrastructure is the User Domain. It is the weakest link in the IT infrastructure and this is where the users connect to the system. You can make the user aware to the risks and threats that they are susceptible to by holding an Awareness Training session. The system is password protected however; you should change passwords every few months to prevent an attack. Also, log the users as they enter and exit the system to make sure there’s no unauthorized access. While it’s the company’s choice to allow employees to bring in USB/Removable drives, you have a threat to someone obtaining the wrong information, or getting malicious software into the system. If you allow the USB/Removable drives, have a virus scan every time someone inserts one into a company computer. In a Workstation Domain, you need to make sure virus protection is set up. You are protecting administrative, workstations, laptops, departmental workstations and servers, network and operating system software. You can enable password protection...

Words: 331 - Pages: 2

Nt2650 Project Part 2

...Joshua Rivas NT2580 Project Part 2 Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the......

Words: 1956 - Pages: 8

Photographic Images | Benvenuti a Marwen: il nuovo trailer del film di Zemeckis con Steve Carell Con questa performance l'attore può aspirare all'Oscar, grazie a un personaggio che crea empatia proprio come Forrest Gump. 23 Share | Most Watched