Premium Essay

Nt1330 Unit 3 Assignment

Submitted By
Words 927
Pages 4
1) Describe a threat and a threat agent. What are the differences between the two? Provide an example of a threat and a threat agent and how they interact (the example can be fictitious).
• Threat – is a nonstop danger to an asset and this could be planned or accidental threat. For example, fire is a threat and it could happen accidentally or it could be planned.
• Threat agent – (attacker) is the enabler of an attack. For example lighting strike or a person that set something on fire would be the threat agent.
2) Describe the CIA Triangle (also known as the CIA Triad), and give an example of each of its three aspects. How does it tie into Information Security?
• CIA Triad – According to Michael E. Whitman and Herbert J. Mattord, “The …show more content…
o Data - o People - o Procedures – Lack of written security policy and procedure, it will be difficult to apply or enforce if its not written. o Networks – if user accounts communicated across the network insecurely, it will expose username and password to the attacker to gain access.

7) What is an SDLC? Describe the (general) five phases of an SDLC. How does it differ from a SecSDLC?
• The five phases of systems development life cycle (SDLC); o Investigation – Planning and requirement gathering – o Analysis – feasibility and assessments of organization systems. o Design – Creating and designing of a system o Implementation – installation of a system o Maintenance and Change - maintenance activities within the database.

• SecSDLC methodology for the design and implementation of technologies to protect an organization from intrusion, data corruption, and theft. SDLC develops systems used within a business and business needs, while the SecSDLC develops the systems to protect these systems and

Similar Documents

Premium Essay

Nt1330 Unit 3 Assignment

...There are many routing protocols in use today. Each protocol serves a different purpose that it is designed to address. Routing protocols serve 3 main purposes: 1.They learn the identity of other routers on the network to effectively transfer data from point to point. 2.They stockpile the destination possibilities inside their databases, as well as the pathway data. 3.They decide exactly where the send network messages based off the two other functions mentioned above. There are 5 main routing protocols implemented and widely used in todays networking environment: 1. RIP V1 & V2 (Routing Information Protocol)- -RIP contains support for 15 hops. RIP operates by messaging nearby devices asking for the routing tables it needs. -These RIP devices...

Words: 481 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment

...By comparing the sample website to that of the original, the benefits greatly outweigh the risks. By choosing to use the redesigned site, Global Village will see tremendous benefits. One of the major design focuses was on the functionality of the website to both customers and for Global Village as well. This will cause the current website to no longer be a growing concern for the business cycle of Global Village. CCH Consulting considers the current version of Global Village to be classified as a risk due to the effects on everyday business that the website interferes with. First, Global Villages currently lacks important in-store information and barely has a contact us page. With 51% of people believing that thorough contact information is the most important missing piece of a website and with 44% of people instantly leaving a website due to missing contact information, one can see why this is currently marked as an impediment of business. By focusing on areas that directly reflect to the amount of potential cliental loss, CCH Consulting will turn the newly developed website into a benefit that one did not have before. In 2015, the consumers spent over 74 billion dollars within the coffee industry showing a phenomenal opportunity for the growth of a business. The reboot of the website will help with the frustration of customers and also the improvement of customer satisfaction will provide Global Village with the unique opportunity receiver a greater portion of this...

Words: 527 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

... Companies scramble daily to maintain their statuses in the business playing field. However, some win and some lose but it’s all in how the game was played as with the developing and implementing of strategic initiatives. All companies and organizations must plan to succeed and possess a sound marketing strategy to match both internal and external environments. (Ferrell and Hartline, 2014 p, 1) These initiatives are vital and play key roles developing and instituting positive outcomes within a company’s current and future marketing strategies. Currently, the goal set for the company is to increase development and expand markets already established by the company and that message is portrayed through various marketing tactics at their annual meetings and business trips. (p.468) However, based on Sigma’s mission statement “Sigma Marketing is a provider of custom printing and related services focused on meeting customer needs through creativity, flexibility and on-time performance” the goal of achieving customer satisfaction is an obvious priority, but the company will need to adapt and do it quickly in order to remain competitive. (Sigma Marketing, n.d.) First, understanding to needs of specialty advertisers is imperative to secure strong initiatives for the future and having the proper measures in place to withstand the advancements of the future will require a strategy that includes online shopping options. As it stands today, Sigma only renders its products through...

Words: 412 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment

...account, however all these evolutions will be treated after the recipe phase. Warning ! Some changes or changes requests identified outside the design phase lead to a reevaluation of the initial load estimate and a shift in the delivery schedule! A tool to centralize your returns and track corrections The use of a recipe tool such as Redmine is essential to identify and centralize all the feedback to be transmitted to the technical team. The objective is to follow the treatment and the resolution of the anomalies, to prioritize them and to preserve the history of exchanges for each return or requests for modifications or evolutions. And after ? You notice an anomaly out of recipe period? Do not panic ! Generally a warranty period (at ACSEO 3 months) is planned following the launch of your site. It is used to process any returns identified after the recipe phase. The technical team corrects the major or blocking anomalies. Test example : Contact form Name* First name* Address* Postal code* City* Birth date* Password* Confirm password What to do ? Try sending a blank form to check the required fields Check the format of the fields (text, free text box, password, email ...) Password criteria Finally try to send a fully completed form and ensure that it is sent / received...

Words: 875 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...CS 2301- Unit 3 Learning Assignment Abebe Erena University of the people term 5 (2015-2016) July 6, 2016 An operating system (OS) is a program that manages the computer's resource and its CPU, primary storage, it's input/output device. so that the resources can be correctly and fairly used by one or more persons and /or computer programs. an operating system will initialize the various registers when started, something like buffers, and controllers used by the computer. *multi-programming has come to be a given in modern computing. a computer allows multiple programs to execute more than one program at a time. for example, say a word processor,...

Words: 643 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

...Production Time: A new team will have to be created to accommodate the new software production. Currently the lead time, after product launch, is eight months, working thirty hours on a five work week. Two hours a day will be dedicated to lunch and at least one-hour long meeting. A team of six production managers are scheduled to complete the launch. The takt time would not be affected since there will be a dedicated team to handle the production of the new program. Traditionally, takt time is calculated by dividing the net available time by the customer demands (Pereira, 2010). The only situation that would impact the takt time is the client becoming more demanding and additional resources needed to help the critical path. Bottleneck: Bottlenecking is a common situation that occurs in production situations. The following situations could adversely affect the cycle time of the new software program: - Inaccurate measurement of resources needed – programmers, space, time - Fluctuation in the key process parameters that would increase the demands of the customer - Unscheduled downtime – internet outages, storms affecting employees work habits, sick time - Slow turnaround between platform launches – delivery of products - Customer needs change - Human Factor and Error Lean Management Impacts: Microsoft has an efficiency pursuit in how their brands are re-engineering and how their business is conducted. For my new program to be launched with Microsoft, they will assist...

Words: 695 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

...Unit 3 Assignment Diane Peplinski Business Segment Processes Current State of Wireless Implementation for the Process Technology Used/Proposed for Wireless Implementation Benefits of Moving to Wireless Possible Timeline Customer Service Mobile Point of Sale systems Currently exists mPOS Shorter wait times, improved customer satisfaction, greater flexibility Year 1 Networked tablets for staff Does not exist iPad Inventory management, able to see how many items are in stock, enhanced customer service throughout the store Year 1 In Store Public Wi-Fi service for shoppers Does not exist Wi-FI Enhances shopper experience Year 1 IT Security Security audit and review Does not exist Qradar Review and documentation of who accesses the system and records what changes were made Year 1 Access policy Does not exist Mobile Iron Mobile Iron can set policies on mobile devices and keeps them secure Year 1 Web scans Does not exist Qualys...

Words: 808 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...In-game username: My ign is Jimmiee. Age: I'm 13 years old. Gender: I'm gender-fluid. Location and Timezone: I live in Virginia and my time-zone is EST. How many staff applications have you made, when was your last application made? I have made 6 other staff applications. My last one was made on June 6th, 2015. How long have you been playing Minecraft? I have been playing Minecraft since September 19th, 2013. How long have you been playing on the server? I have played on the server since September 19th, 2013. How active are you on the Server? I'm on the server everyday for hours, so I'd say I'm pretty active. How active are you on the Forums? I'm active on the forums all day. If I don't have access to it through my PC, I have access through my phone. How active are you on TeamSpeak? I go on TeamSpeak everyday for hours too, so I am active on there too. Personal questions: Previous experiences as a staff member: I've been a staff member on many small servers owned by my friends. I learned commands and simple things like that on them. I'm currently a staff member on a fairly larger server called Omega-Realm. What makes you a worthwhile helper? I think what makes me a worthwhile helper the most is that I actually enjoy to help. I think it's pretty fun to answer questions and simplify things for players. I am really contributed to what I do. I take responsibility of all my actions and try my best to learn from my mistakes. I'm open-minded and I am a quick learner. I can...

Words: 550 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

...him was. I was able to reduce my phone bill by $200 a month just by asking the question, "What's the best deal you can give me? There are a lot of phone companies asking for my business so I want to know what you can do to convince me to stay with you." That's $2,400 back to the bottom line each year. Remember that I'm giving you ideas on how to boost profits. Reducing expenses increases the amount of money you have left over at the end of each month. Don't ignore this. Sure, you can sell more but in a down economy, it's a great strategy to focus on negotiating new terms that benefit you 100% so that when the economy gets strong again, you'll be making more money and spending less of it. Both working together results in fatter wallets! 3. Don't include a lot of extras in your video proposals. Having a lot of extras in the initial video proposal drives cost up which can drive customers away or leave room for your competition to bid lower than you. I recommend that you quote the shooting and editing part of a video and only include 1 copy of the DVD master. Then, in your video proposal, tell them that additional copies and/or website files can be provided for an additional fee. Most of the time, they will forget about the copies or the digital files until the project is complete. Then, when they are in a mad rush to distribute their video, they'll want/need you to make the copies. You quote them a reasonable yet on the higher side number and they go with it because they are...

Words: 577 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

...Cloud computing is opening markets that were not secured by the organizations before. Presently some product organizations are considering conveying programming as an administration, instead of embracing the standard technique for creating programming and offer it to clients through customary circulation strategies. To be software as a service (SaaS) vendors, organizations need to locate the right adjust, in which assets are shared among numerous inhabitants to diminish costs and guarantee the security of client data in connection to different clients. There is not any more difficult issue than to see the private data of an inhabitant from the record of another. Notwithstanding the security of data of occupants, SaaS merchants need to give some level of customization to clients. In a multi-inhabitant environment, a cloud computing SaaS organization can decrease expenses to share or reuse the vast majority of its elements. Nonetheless, the more the organization shares, the more dangers it faces in light of the fact that the inaccessibility of a common asset can influence different clients. The sharing of more assets likewise expands the many-sided quality of the arrangement. An application domain in multi-tenure In this arrangement we will just address the information layer and we will utilize the DB2 programming. Alternate layers can be controlled by other IBM programming, for example, WebSphere Portlet Industrial facility, WebSphere Entrance Server, Tivoli Catalog Server...

Words: 481 - Pages: 2

Premium Essay

Nt1330 Unit 3 Assignment

...There are four main categories of MV applications in the industry: inspection, guidance, gauging and identification. Inspection Inspection is the process of comparing the individual manufactured items against some pre-established standard with a view to maintenance of quality. The process of inspection commonly take places in three definable stages: image acquisition, object location and object scrutiny and measurement (Davies, 2012). The inspection category is the broadest in machine vision applications. Machine vision can be used to correct the location, control the quality and check the completeness. A typical machine vision application is to inspect the surface of an object. It is essential to identify the defects like scratches, printed strings on the surface of the objects. In the conclusion part of this paper, I would design an IC orientation inspection equipment with the machine vision system based on this application. First, a digital camera obtains the IC’s surface image. Second, the MV software does image processing to extract some useful and critical information. Third, the MV software compares the extracted information with the template image. Last, MV software outputs a signal to programmable logic controller (PLC) based on the comparing result. If the result is ok, the MV system will check the next IC. If the result is not good, the MV system will trigger an alarm system. The MV system will not perform the next procedure until the operator acknowledges the alarm...

Words: 766 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...Task 3 Impact of IS In order to improve its chances of success describe two major new systems that Amazing Destinations needs, together with a description of what you will expect these systems to do. Mention any reporting requirements that you would expect from these systems and who are the most likely recipients of those reports. Amazing Destinations will need a booking management system Refers to a system that processes information for business transactions that involves collection, modification and transaction of all data. BMS will enable customer service staff process client information which are Amazing Destinations daily activities which will aid in facilitating the quick process of destination bookings that will in turn add value to...

Words: 807 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment

...Meet John and Mike, they both are Roofing professionals. Every month they visit dozens of sites to make condition assessments, taking photos and making notes of observations. At the end of the day they need to turn these observations into concise reports, a client proposal, or transfer the observation information to others. That's a big job, especially since each site is unique, and requires documenting the complexities of commercial roofing information, and the critical observation areas of the roofing system. In the past John would use his tablet computer to take pictures and make notes to transfer to a word document for his reports. Mike, took lots of photos with digital camera and updated his companies home grown web application. That was fine when buildings were simple. However, John was adding more and more complexity into his homegrown templates, and to be honest the information that made sense to him was not in any industry format. Mike, had other challenges trying keep reports consistent when their company roofing app was not able to support the variety of roofing systems and defects, so it was common, if the internet was down, or the data was not supported, Mike went back to pen and paper. It was messy, however, what choice did he have. At the end of the day, they both were spending their valuable time organizing site data even when going back to re-inspecting buildings. Even though John had just purchased a new tablet and Mike had a MS Surface Pro convertible...

Words: 527 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment

...support the customer’s business needs. Configuration does not make any changes to the core software code, but instead updates tables with settings and entries specific to the customer’s business. Called configuration tables, these tables enable a company to tailor a particular aspect of the system to the way it chooses to do business. Project team members can use configuration tools to select alternatives through an easy to use GUI. These selections then behave like switches that tell the software to perform differently based on the values selected. For example, configuration may allow the company to specify: • Whether accounting for inventory should be based on LIFO or FIFO. • Whether the company wants to recognize revenue by geographical unit, product line, or distribution channel (or all three) • How many legal entities are reflected in the system • What the default currency will be. SAP has over 3,000 configuration tables and there are approximately 8,000 configuration decisions to make when implementing it. Navigating through them can be a formidable task. For example, when Dell Computers implemented SAP, the configurations alone took over a year to decide upon. As ERP software vendors attempt to gain market share, they continue to provide configuration options to address and increasing number of system requirements, thereby broadening their target customer base. So what happens when the options the system allows don’t exactly fit business requirements? At this point...

Words: 1017 - Pages: 5

Premium Essay

Nt1330 Unit 3 Assignment

...Bradford Network and Fortinet Solution Overview Most organizations realize that one solution can no longer provide adequate network protection. Organizations now need a “security village” composed of multiple best-of-breed technologies. The Fortinet and Bradford Networks partnership combines the SIEM, switch or firewall benefits of Fortinet, with the visibility, network access control and automated threat response of Network Sentry. By combining these technologies, organizations achieve superior threat detection for mobile, IoT and network devices. Network Sentry provides visibility and control of all wired and wireless infrastructures to extend the Fortinet Fabric to all equipment. By combining Fortinet solutions with Network Sentry, Fortinet provides security hardware and/or intelligence management, while Network Sentry provides detailed contextual information about the endpoints, user, applications and network connections. Networks Sentry also enables organizations to take microsegmentation to the edge. It augments the Fortinet switch, firewall and gateway technologies by controlling the access layer to create a smaller threat landscape. In addition, Network Sentry works with the Fortinet security solutions to gather and adds contextual information for all alerts, automate access policies and controls, and automatically quarantine threats. While Fortinet is controlling perimeter security, Network Sentry can control what files, equipment and network resources each employee...

Words: 637 - Pages: 3