Cybersecurity Awareness 2 Min Video Script

Topic: Cybersecurity Awareness 2 Min Video Script

 

Paper details:

Please refer to the attached pdf guidelines for the requirements. Please write a script for the 2 minute Unique and creative imaginary video where a story will enable employees to be aware of cybersecurity threats. Ensuring that users have a high level of security awareness is one of the core tenets of effective cybersecurity defensive activities. As individuals write a script for a 2 minute (approx.) security awareness training video suitable for all employees in a large organisation in Australia. Example scripts are attached herewith for the following- Cybersense Videos + Scripts Please note that I’ve videos for them as well, but couldn’t upload it. This idea and story has to be unique and creative. Please use these examples just to develop an overall idea. These are only examples, feel free to use a different style of script You are not required to produce a video, only the script Think about a (single) clear topic for the video. Your video should be aimed at general employees at large sized organisation in Australia. The goal of the video is to modify the behaviour of employees, by either highlighting risky behaviour, affirming good behaviour, or both. Include short “key takeaway” messages (no more than 3) to end the script with. Ensure that you think of an original idea, perhaps based on the topics we have discussed in the course or other materials and produce original dialog. Please don’t copy any existing videos, although you can cover the same topics provided you do so in a new manner. Please deliver the script in world file.

Security architecture developments

Note: This assignment will be checked for plagiarism by the professor and this assignment should be a minimum of 600 words without references and should be in APA format and have to include at least two references. Please find the below attachment and refer to it to prepare the answer. And I need the answer by Tuesday evening 06:00 pm EST. (04/21/2020).

Length:  Minimum of 600 words

Question:

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures.
  • The SANS Institute hosted three “What Works in Security Architecture” Summits.
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet.
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book.
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development.

Cybersecurity Investigator

M13 Career Paper 

Description/Requirements:

As a final project for the course, write a five page paper on any career in the computer networking field. Include in the paper the responsibilities of the job, the educational background and the day to day activities involved in the job. Discuss whom a person in this career works with. Discuss how the job has changed and what changes are expected for the future.

See your IS 231 Syllabus for detailed requirements… NO PLAGIARISM. Meanwhile the format to follow regarding this topic is in the attachment below (IS 231 as indicated in the Syllabus for detailed requirements). References to be included.

Data Breach – Case study Ride Share company such as Lyft or Uber

You are the incident response team for a Ride Share company such as Lyft or Uber. There are reports and indications of a data breach in which customer data has been compromised.

You will need to complete the following:

· Summarize the issues that face Ride Share companies

· What types of policies are needed?

· What core principles apply here?

· What would be the best framework to use for a Ride Share companies?

· What User Domains should there be?

  • Be sure to define who the groups are
  • What files and folders containing what type of data should       they have access to?

· How would you go about implementing the changes?

· Summarize the policies that need to be in place and how they would address the issue

Prepare a report to address all aspects of the assignment.  This report should be no less than 10 pages of content.  You need to include outside sources and properly cite and reference your sources.  You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles.  In addition to the 10 pages of content, you will want a title page and a reference sheet.  This report needs to be in proper APA format.

Paper Sections

The following sections should be outlined as Headers in the paper.

Introduction, thesis statement, overview, purpose
Background, discuss history of topic
Discussion, identify benefits, obstacles, innovations
Conclusion, summarize the overall study, lessons learned
References, minimum three references with citations in the body

All written reports should be submitted in MS Word.  The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper.

Must submit both written assignment and presentation slides.

Final Research Paper – emerging threats and strengthen countermeasures

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complementary techniques to detect emerging threats and strengthen countermeasures.

Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. (Originality report should be at least 35% or less.)

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.)

So in summary, here are the research paper requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)
  • Originality report should be at least 35% or less.

Admin Notes:

APA Paper Formatting guidelines

1.Title page

2.Abstract

3.Body

4.Text citation and references

Additionally

-As usual, the text is typed on standard white paper that has familiar parameters of 8.5″ x 11″.

-The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font.

-Double spacing is required on both the title page and throughout the paper.

-Margins should be 1″ concerning all sides of the page.

-Paragraph indentation should be set to one half inch from the left side of the page.

-The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.

For more information on APA format consult APA, 6th Edition American Psychological Association, also  The OWL at Purdue is a good resource (see related link) on APA format.

https://owl.english.purdue.edu/owl/resource/560/01/

Help with peer reviewed papers or articles

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles

http://libguides.gwu.edu/education/peer-reviewed-articles

Privacy of your email

People email on a daily basis. There are policies at work places regarding privacy of your email. Look into a few items

  • Email privacy in the EU
  • What happens during a digital forensics investigation?
  • How does it apply to social media, Instant Messenger, etc

Blog Post On Internet And Security Related To All The Bullets Below.

Blog Post On Internet And Security Related To All The Bullets Below.

To complete this Assignment:

  1. Use the search engine of your choice, search for “free blog tool.”
  2. Select the tool that you feel is most appropriate for the task.
  3. Sign up for a free account. (Note: if you already have a blog account, you may use that.)
  4. Choose an appropriate background or theme.
  5. Give your blog an appropriate name.
  6. Create a post that contains a short paragraph on each of the following topics:
  7. Brief history of the Internet and security issues.
  8. Methods of communication
    1. Social networking
    2. Email
    3. Wikis and blogs
    4. Podcasts and webcasts
    5. Streaming media
  9. E-commerce and m-commerce
  10. Include a relevant image in each of your blog posts. Make sure that the pictures are free to use and share. (Hint: Use Google Advanced Image Search. Under “License,” choose “Free to use and share.”)
  11.  Provide a direct link for each image you use.

Designing FERPA Technical Safeguards

Imagine you are an Information Security consultant for a small college registrar’s office consisting of the registrar and two assistant registrars, two student workers, and one receptionist. The office is physically located near several other office spaces. The assistant registrars utilize mobile devices over a wireless network to access student records, with the electronic student records being stored on a server located in the building. Additionally, each registrar’s office has a desktop computer that utilizes a wired network to access the server and electronic student records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access student records. In 1974, Congress enacted the Family Educational Rights and Privacy Act (FERPA) to help protect the integrity of student records. The college has hired you to ensure technical safeguards are appropriately designed to preserve the integrity of the student records maintained in the registrar’s office.

Write a three to five page paper in which you:

  1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar’s office.
  2. Recommend the proper audit controls to be employed in the registrar’s office.
  3. Suggest three logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
  4. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Cyber Security assignment help

Find an article on cybersecurity and write about 250 words about that article. References must be contained in the paper and no plagiarism. Must be a peer-reviewed article published within the last 5 years and located on Google Scholar.

Establishing a Security Culture

Chapter 9(From attachment) – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

Req**: One page APA format, single line spacing

Government Mobile Apps Security Assessment & Strategy

Project 3: Government Mobile Apps Security Assessment & Strategy

For this research report you will research and then present your findings about cybersecurity issues specific to mobile applications. You will also provide a set of recommendations for best practices (your “strategy”) for security architectures and designs for mobile apps.

Mobile applications are important because they allow citizens and other stakeholders to access information and services through the federal government’s digital government initiatives. For more information about requirements to provide mobile friendly websites and mobile apps see this blog posting from GSA.GOV https://www.gsa.gov/blog/2018/08/07/collaborating-for-better-design-technology-and-user-experience and the text of the Connected Government Act Public Law 115-114 https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf

Note: this assignment requires inclusion of diagrams or graphics that help to explain the information provided in your analysis and strategy. You are not required to create these on your own. Instead, you should look for useful graphics/diagrams in the readings and use those to support your work. You must cite the source for each piece of artwork used in your project. Put a figure caption under the diagram or chart and then place the in-text citation at the end of the caption. See the example at the end of this file.

Research:

  1. Review the Weekly readings.
  2. Review recent changes in US Laws regarding the requirement for mobile friendly government websites.
    1. https://www.congress.gov/115/plaws/publ114/PLAW-115publ114.pdf
    2. https://www.nextgov.com/ideas/2018/01/what-digital-government-cx-pros-should-know-about-connected-government-act/144987/
    3. https://www.fedscoop.com/bill-mobile-friendly-government-websites-cruises-senate/
  3. Research the “best” of federal mobile apps to see examples of the type of apps that other agencies have created in the past.
    1. 19 of the Coolest Government Mobile Apps https://www.govloop.com/community/blog/cool-gov-mobile-apps/
    2. 10 Most Entertaining Government Mobile Apps https://www.govloop.com/community/blog/10-most-entertaining-government-mobile-apps/
    3. The Best Government Mobile Apps for Business…and Your Office https://www.govloop.com/community/blog/best-government-mobile-apps-business-office/
    4. 3 Innovative Ways Agencies are Leveraging Mobile Apps http://fedscoop.com/great-government-mobile-apps
  4. Research the federal government’s perspective on mobile app security architectures and design recommendations. Here are three sources to help you get started:
    1. App Developers: Start with Security
      https://www.ftc.gov/tips-advice/business-center/guidance/app-developers-start-security
    2. Mobile Security Reference Architecture
      https://s3.amazonaws.com/sitesusa/wp-content/uploads/sites/1151/downloads/2013/05/Mobile-Security-Reference-Architecture.pdf
    3. How to build a secure mobile app: 10 tips
      https://www.techrepublic.com/article/how-to-build-a-secure-mobile-app-10-tips/
  5. Research industry recommendations for mobile app security. Begin with the following sources:
    1. OWASP Mobile Security Project https://www.owasp.org/index.php/OWASP_Mobile_Security_Project
    2. Top 10 Mobile Risks (click on tab) https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks
    3. Mobile app security: Always keep the back door locked http://arstechnica.com/security/2013/02/mobile-app-security-always-keep-the-back-door-locked/
  6. Find five or more best practice recommendations for ensuring the security of mobile apps. These recommendations must include security for the platform (mobile device), the data on the device, and the transmission path between the device and the mobile application server. Your focus should be upon recommendations that can be implemented as part of a strategy for reducing risk.

Write:

Write a five to seven page report in which you summarize your research and present your “best practices” based strategy for reducing risk and ensuring security for government provided mobile apps and their users. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

  1. An introduction or overview of mobile apps for digital government. Include 5 or more examples of mobile apps recognized as being innovative or “best of category” applications for delivering government information and services to mobile devices. This introduction should be suitable for an executive audience.
  2. A separate section in which you discuss the federal government’s requirements and recommendations for mobile app security architectures and the associated design recommendations. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).
  3. A separate section in which you discuss industry’s recommendations for security architectures and risk reduction for mobile app security. Write this section for non-technical managers; you will need to translate from tech-speak to manager-speak. Include at least three diagrams or pictures in this section and remember to include the appropriate in-text citations for the source (append to the figure caption).
  4. A section in which you present 5 or more best practice recommendations for building security (the confidentiality, integrity, availability, authenticity, and non-repudiation for Mobile Applications) into mobile applications used to deliver government information and services. Present these strategies as recommendations for reducing risk.
  5. A separate section in which you summarize your research and recommendations.

Information Security And Risk Management

Information Security And Risk Management

 1. Discuss the difference between a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP).  You might want to start with the definitions from the NIST SP 800-34, located at http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf.  Section 3.5 discusses the different types of Plan Testing, Training, and Exercises.

Describe in 250 words with references.

Security Mechanisms – cyber security

“Security Mechanisms” Please respond to the following:

  • Use the Internet and Strayer Library to research (within the past 1 [1] year) various techniques that an organization uses to determine if someone has breached its security. Next, examine various techniques that an organization can use to determine whether or not it has been the object of a security attack. Determine which method is the most effective. Provide a rationale for your response.
  • Use the Internet to research a recent (within the past [1] year) cybersecurity / hacking attack on an organization. Next, describe (1) how the company discovered the attack and (2) the major repercussions of the attack. Recommend the three (3) most appropriate methods to prevent these types of attacks. Provide rationale for your response.

Establishing a Security Culture

Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.

Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

 

(Information Technology and Organizational Learning)

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

Risk Assessment

This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:

  1. Describe when some controls cannot be implemented (such as on a personal laptop).
  2. Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
  3. Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
  4. Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).