Premium Essay

Assignment 2-2 Cyber Security

In: Computers and Technology

Submitted By johu1989
Words 670
Pages 3
Course CS 3118
Professor: Milan Samplewala
Date: September/ 11/2015
Interest of Active Directory (AD)
Ken 7 Windows Limited software has provided you with innovation for organizational employee setup by roles. The software provides six roles you can choose from in order to identify your candidates. Making your operation more secure and efficient to manage your operation and protect restricted data. There is an extensive advantage to Active Directory that will be explain in detail to further questions you have provided our team to answer. We can see your operation has been split into groups of accounting, planning, and purchasing. We would like to add Active Directory to your operation making your business more secure and easier to manage.
Creating users with Active Directory
While creating existing users for your operation, we will begin the process by entering your Active Directory. User will be created in a file with multiples candidates and groups. User will be setup in an organized fashion as explained in this is example,
• Name of File: Shopfoor
• Users name: SFUser
• Users Last: 01
• Users Log In: SFUser01

Once creating the user through Active Directory, they will be provided with specific instructions to create a password. Lengths, Maximum letters, and more categories that will make the password complex enough to avoid vulnerabilities. These are the six basic roles that the (ERP) software will be proving you to identify candidates for your operation.

• Administrators- Maintain ERP data and system operation.
• Planners- Run planning software and generate requirements reports.
• Shop Floor users- Enter operational data (receiving, shipping, and products progress during manufacturing).
• Managers-Manage department personnel.
• Purchasing users- Generate purchasing documents based on planning requirements.
• Accounting users- Maintain...

Similar Documents

Free Essay

Itinfo Security Law and Ethics Course Syllabus

...geared to non-attorney managers and executives, provides a broad survey of federal and state laws and judicial systems governing and/or affecting information security. Topics include the effects on information security of cyber-business regulation, doing business on the Internet, privacy laws, taxation, protection of intellectual property, electronic privacy, wiretapping, and cyber-squatting. In addition, students examine ethical issues, forensics, and evidence of cyber-crime. (No Prerequisite) |   | | Terminal Course Objectives | DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives (TCOs). The TCOs define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes. A | Given the importance of Law, Investigation, and Ethics in Computer Security, develop an understanding of the operation of the American legal system, including how the interpretation of statutes, judicial precedents, and legal reasoning affect information security. | B | Given the global nature of the Internet, evaluate how doing business on the Internet may subject you and your company to the laws, regulatory......

Words: 891 - Pages: 4

Premium Essay

Case Study 1: the Critical Need for Information Security Rubrick

...for Information Security Due Week 2 and worth 100 points Access the ACM Digital Library by following the steps below: Students: 1. Login to iCampus. 2. From iCampus, click STUDENT SERVICES>> Learning Resources Center >> Databases. 3. Scroll down to "Information Systems/Computing". 4. Select “ACM Digital Library” below the heading. 5. Enter your library username and password. Faculty: 1. Login to Blackboard: bb.strayer.edu. 2. Click the "Resource Center" tab at top right of page. 3. From the list on the left, click "Databases". 4. Scroll down to "Information Systems/Computing". 5. Select “ACM Digital Library” below the heading. 6. Enter your library username and password. Download and read the following articles available in the ACM Digital Library: Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an......

Words: 1615 - Pages: 7

Premium Essay

Itmg381 Week 8 Assignment

...Assignment Week Eight 1 ASSIGNMENT WEEK EIGHT Assignment Week Eight Gary Best American Military University Assignment Week Eight 2 ASSIGNMENT WEEK 8 Chapter 14   First off the large American multinational corporation would need to rely on a teams of lawyers and interpreters to get to know the laws of the European Union against cybercrimes. Security firm FireEye released the results from a study they conducted and found that one third of the businesses in the UK, France, and Germany are at a loss with the new cyber security legislation.(1) If one third of the businesses that are in the European Union do not understand the upcoming laws your research team is going to be very busy. The establishment of the data protection regulation has created to things to point out that may make trying to follow it a little easier. First it wil1 be designated as a regulation. A regulation is applicable in all European Union states.(2) Secondly, there is now harmonization, only one regulatory authority that manages its state of things in all of the European Union states.(2) Before this change each European Union state had its own directive that you would have to worry about compliance. One thing to consider is if you plan on using a cloud based software for your data. It will need to be secured and protected against hacking. You will need secure the data before it is sent to the cloud using a process called cloud data encryption and tokenization.(3) Tokenization is taking the......

Words: 556 - Pages: 3

Premium Essay

Metacognitive Writing Assignment

...Sherief Beshara ENG 302-DeFazio Metacognitive Assignment Role of Cyber Security in Preventing Future Attacks 1. Copy/paste the following items from your major scholarly project into your Metacognitive Assignment document: * One of the main concerns is whether or not we are prepared for a cyber war. We have to equip ourselves with the education and understanding of what goes into preventing a cyber-attack and what we need to be on the offensive side. Our safety depends on it. Cyber security plays a daily role in our protection and we don’t even realize it. * Another opposing view shows that cyber security sometimes is not enough, and that the need for it is not just limited to our government, but also corporate America is in deep need for cyber security to protect its databases from malicious software and hackers that are always ready to invade and attack their firewalls. Bruce Schneider, a security expert with the Berkman Center at Harvard, mentions how important encryption is and mentions that it “protects our data from criminals. It protects it from competitors, neighbors, and family members. It protects it from malicious attackers, and it protects it from accidents” (Bailey). That is why encryption needs to be automatic to any type of data that needs to be protected or that is a target to any hacker out there. He is saying that encryption just generally puts a protective cover over all the data that needs to be protected and just protects it from everybody,......

Words: 1179 - Pages: 5

Premium Essay

Security Policies

...State University Department of Management Information Systems INSS 887: Emerging Issues in Information Security Assignment #3 Summer Session, 2014 Instructions: Answer each question thoroughly. Points will be deducted for fragmentary answers. The completed assignment should be submitted in the designated Drop Box by midnight on Sunday, July 27, 2014. 1. ABC Corporation has a thorough security plan for the primary and recovery systems used to ensure that even during a recovery the information is protected. Comprehensive plans are only a part of its efforts in securing recovery. Assuming that ABC will use contract employees for part of the recovery, describe how the company can mitigate the threat from using contract employees. 2. Britain plans to establish a dedicated military unit to counter cyber attacks. The unit will comprise of hundreds of computer experts to help defend Britain's national security. The plan is for the "cyber reservists" to work alongside regular forces in the new Joint Cyber Reserve Unit in a bid to protect key computer networks and safeguard data. According to Prime Minister David Cameron, the new capability would be able to "counter-attack in cyber-space and, if necessary, to strike in cyber-space as part of our full-spectrum military capability". "In response to the growing cyber threat, we are developing a full-spectrum military cyber capability, including a strike capability, to enhance the UK's range of military capabilities,"......

Words: 1401 - Pages: 6

Premium Essay

Cyber-Savvy Bombardments

...Written Assignment 3 “Documented Writing” Using the articles you have read for this module, search engines, and the EBSCO databases, write a 500-word essay on what you believe to be the greater threat to the nation—cyber crime directed against individuals or terrorist cyber attacks on national institutions. Provide your opinion on whether the United States is active enough in countering these threats. Cyber-Savvy Bombardments In the case of cyber attacks, where the results can vary from the annoying to the disastrous and destructive, there are no winners. I believe that both cyber crimes directed against individuals or terrorist cyber attacks on national institutions pose equal but different threats to our nation. Let’s take the recent news about a certain congressman who is claiming that his Twitter account was “hacked” resulting in a lewd photo being sent to a college student in Seattle (FoxNews.com 2011). Democrat Rep. Anthony D. Weiner who is a member of the Energy and Commerce committee from New Yorks 9th District (house.gov) uses the social media website Twitter to “tweet” with his followers. The media has jumped on board turning this into a national and even international spectacle, which makes this event annoying and possibly destructive to his career. If Congressman Weiner’s Twitter account was hacked “two broad possibilities exist: (1) the Congressman's Twitter account (and perhaps other accounts) were hacked, or (2) the Congressman or someone with......

Words: 784 - Pages: 4

Premium Essay

No File

...Week 9 Assignment 3: Cybersecurity The National Initiative for Cyber Security Education Initiative. Released in 2009, the Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure acknowledged the need for cybersecurity public awareness and an advanced cybersecurity workforce. To address these needs, the Comprehensive National Cybersecurity Initiative (CNCI) developed 11 initiatives to help secure the United States in cyberspace. The National Initiative for Cybersecurity Education (NICE) was established to lead the work on the goals outlined in Initiative 8, which addresses the Nation’s cybersecurity needs related to public awareness, education, professional development, and talent management. (McDuffie, 2009) In the past 20 years, the innovative use of cyberspace has transformed the day-to-day operations of the Nation. These advances have enhanced the lives of individuals, business, and government in profound ways. From eCommerce, to mobile communications and complex networked systems, the rapidly growing dependence on cyberspace is evident. In the years to come, the Nation’s dependence on cyberspace will only increase as technology advances and will further integrate into our daily lives. Great advances in technology comes with great risks. The Cyberspace Policy Review identified vulnerabilities in cybersecurity as systemic risks introduced into infrastructure, defense, and personal property due to the widespread adoption...

Words: 1570 - Pages: 7

Free Essay

Cis 502 Critical Infrastructure Protection

...documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not......

Words: 1288 - Pages: 6

Premium Essay

Trend Analysis of Wechat Payment Function

...Assignment 2A provides a preliminary overview for your Business Proposal (Assignment 2B). In this assignment, you are to identify current trends in the market and/or in the society in relation to your topic. To identify these trends, you will investigate the current industry landscape (consider relevant political, economic, social/psychological/behavioural, and technological factors) via secondary research (scholarly articles, business reports and databases). You are expected to present three trends to your manager by synthesising information from four sources. These trends may provide opportunities for your company to capitalise on, or reveal threats that could harm your company’s bottom line (economic, social or environmental). Therefore, this overview will be helpful for your company to decide the next course of action to address these trends so as to bring benefits to the company. That is to say, the focus of Assignment 2A is to give your manager or a decision maker in your department an overview of trends that is valid, accurate and relevant to the company based on your chosen topic. Note that in reviewing the trends, you should be aware of your audience’s needs and expectations (perform an audience analysis before writing your overview of trends). Synthesis matrix SWOT analysis Company profile (vision, mission, values) * Company choice: (Tencent --- wechat) Mission: To enhance people's quality of life through Internet services. * Treat the Internet......

Words: 674 - Pages: 3

Premium Essay

Business Analysis

...Contemporary Business Assignment 1: Business Analysis Dana Morrison Dr. William Bonaparte BUS 508 Strayer University October 24, 2015 1. Provide a brief description of an organization where you currently work, would like to work, or one in which you have an interest that you have chosen for this assignment. In 1914 Edwin Booz started his management consulting firm renamed Booz Allen Hamilton (BAH) in 1943. BAH is considered one of the oldest management consulting firms. Edwin Booz believed in a new approach to management. He believed that if you could find the right people, properly place them in the right position and provide the best possible support that the end result would be better than any theory or method. Ed believed that the three key attributes involved in placing the right person with the right partner were character, intelligence, and industry. These key attributes continue to be the core of their business and are otherwise known as "Boozisms" within the organization. In 1940 the U.S. Navy contacted BAH due to its reputation and success in management consulting and its performance with Goodyear Tire & Rubber and Montgomery Ward. Working with Navy planners, Booz consultants began working to develop a special sensor system that could track German U-boat's and assisted Navy planners with designing an attack strategy. This collaboration, by war's end, led to sinking or crippling most of the German submarine fleet and was the beginning of a long term...

Words: 1020 - Pages: 5

Premium Essay

Issc 342

...Week 2 Assignment 6/13/16 EBay Cyber Attack It seems that no one and many companies are not safe any longer while on the internet numerous companies have been targeted by hackers as of late. One of these such global companies is EBay it was targeted between February and March of 2014. Hackers targeted EBay and were able to find loopholes in which information was able to be stolen from the global giant. Email addresses, birthdays, passwords physical addresses and phone numbers were some of the things stolen from the website. The company said that it did not find any issues with finances such as credit card information was not compromised during the attack. On the day that the attack happened stocks fell on the New York Stock Exchange down to 3.2 percent. EBay was not able to find out exactly how many accounts were compromised at the time of the attack and the aftermath of it. Hackers were able to get into the network through hacked employee accounts that allowed access into the network. EBay did not noticed this until two weeks after the attack actually took place. PayPal accounts that were linked to the accounts that were compromised were not breached in the attack. The police and many security analysts assisted in finding out more information about the attack and just how the hackers were able to get into the employee accounts. EBay recommended to the members of the site to change passwords immediately and verify PayPal. Information as soon as possible. During this......

Words: 639 - Pages: 3

Premium Essay

Assignment 1: Digital Computer Crimes

...Assignment 1: Digital Computer Crimes Brandy N Bledsoe Mark Stone CIS170 July 14, 2013 The computer is a doorway to a world of opportunity on the Internet that is not policed by any single law enforcement agency. The potential for financial gain along with the ease of commission has resulted in many crimes via the Internet that previously occurred via mail or over the telephone. These are the type of crimes that you do not expect as a normal everyday citizen; so many of these crimes are committed right underneath your nose. It is a wide variety of crimes that are classified under digital computer crimes. The following paragraphs will explain the four major categories of computer crimes, the most common forms of digital crime, how the computer as an instrument of a crime presents the biggest threat to the world and the roles and responses of the U.S. government. The first category of computer crimes is the computer as a target, this means that the criminal targets the network and or the device. These criminals possess the skill, technique and knowledge of computers; crimes found under this category are data alteration, network intruders, and denial-of-service as well as computer vandalism. In April of 2007, Russia launched cyber-attacks on Estonian parliament, banks, ministries and newspapers; these countries were in a disagreement over the placement of a bronze soldier statue. As a result of these attacks, the country was disabled and became crippled. The second......

Words: 1501 - Pages: 7

Premium Essay

Sec 320 Week 1 Assignment

...Week 1 assignment 1) Threat, risk, hazard, and peril all fall under the same category but have different meanings. A threat is an intention of causing harm. A risk is a situation with possible danger. A hazard is danger or risk itself. Peril is severe and abrupt danger. I will build a scenario to show the use of these words in proper context. A military network does not have a physical firewall nor a software based antivirus. The threat is other countries wanting to inflict damage to this military base via cyber warfare. The risk needs two things, the threat which we just established, and vulnerability which is the lack of security measures in place within the network. The hazard is the danger of crippling the military network and or the sensitive information being lost to the attackers. The network is now under a denial of service attack inflicted by hackers from North Korea. The network is now under Peril. Overall these words are sometimes used in place of each other even though they have a specific context that they should be used in. 2) There are many things that are considered threats, risks, hazards, and perils in my organization. Working on a military base presents a great amount of these things. Our Security team must prepare to defend the environment from the threats of terrorism, active shooters, natural disasters, cyber-attacks, and more. They have a constant risk of personnel getting killed, buildings getting destroyed, and information getting stolen. The......

Words: 619 - Pages: 3

Premium Essay

Advance Issue in Ict

...Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from the series of seminar attended and visitation organized. Recommended/Required Materials Main Reference(s) | Newspapers, magazine, articles, journals, research paper | Course Assessment Participation | : | 5% | Assignments/Project | : | 45% | Final Examination | : |  50% | Total: | 100% | Course Requirements & Policies   Example: You are expected to fulfill the following...

Words: 832 - Pages: 4

Premium Essay

Assignment 2 Critical Infrastructure Protection

...Assignment 2: Critical Infrastructure Protection Strayer University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (dhs.gov, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders; enforce and......

Words: 1685 - Pages: 7