CIS 542 WEEK 9 ASSIGNMENT 3

CIS 542 WEEK 9 ASSIGNMENT 3

 

Assignment 3: Outline a New IT Security Policy

Due Week 9 and worth 250 points

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards.  RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues.  RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

  1. Briefly explain the current state of Web application security to the Board of Directors.
  2. Describe the major potential security risks associated with maintaining the organization’s Web presence, protecting its assets, and promoting e-Commerce.
  3. Assess any techniques and technologies that you may need to use to mitigate those potential security risks.
  4. Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.
  5. Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.
  6. Use at least four (4) quality references in this assignment. Note: Wikipediaand similar Websites do not qualify as quality references.
  7. Format your assignment according to the following formatting requirements:
  8. Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-9-assignment-3/

    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

  • Analyze the impact of the Internet and Web applications on the business world.
  • Analyze the evolution of social media, social networking, and the ethical issues they raise.
  • Compare and contrast Web-based risks.
  • Analyze common Website attacks, weaknesses, and security best practices.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, us

 

CIS 542 Week 9 Discussion

CIS 542 Week 9 Discussion

 

 

“Career Paths in IT and Security” Please respond to the following:

  • There are many different caeer paths that one can take in IT. Several are mentioned in Chapter 14. Remember that a path is a journey. It is not likely that you would start as a Junior Web Developer and stay a Junior Web Developer for the next 30 years. Choose any one (1) career within and describe the path you could take. Explain the major expectations an employer would have of you in that career..
  • Building on the previous discussion, determine at least three (3) types of security training and certifications that you should you obtain to be successful in that career path. Provide a rationale for your response.

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-9-discussion/

 

 

 

 

“Career Paths in IT and Security” Please respond to the following:

  • There are many different caeer paths that one can take in IT. Several are mentioned in Chapter 14. Remember that a path is a journey. It is not likely that you would start as a Junior Web Developer and stay a Junior Web Developer for the next 30 years. Choose any one (1) career within and describe the path you could take. Explain the major expectations an employer would have of you in that career..
  • Building on the previous discussion, determine at least three (3) types of security training and certifications that you should you obtain to be successful in that career path. Provide a rationale for your response.

 

 

 

“Career Paths in IT and Security” Please respond to the following:

  • There are many different caeer paths that one can take in IT. Several are mentioned in Chapter 14. Remember that a path is a journey. It is not likely that you would start as a Junior Web Developer and stay a Junior Web Developer for the next 30 years. Choose any one (1) career within and describe the path you could take. Explain the major expectations an employer would have of you in that career..
  • Building on the previous discussion, determine at least three (3) types of security training and certifications that you should you obtain to be successful in that career path. Provide a rationale for your response.

 

CIS 542 WEEK 7 ASSIGNMENT 2

CIS 542 WEEK 7 ASSIGNMENT 2

 

 

CIS 542 WEEK 7 ASSIGNMENT 2

Assignment 2: Compliance and Governance Regulations

Due Week 7 and worth 120 points

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-7-assignment-2/

 

 

 

 

Organizations and IT Professionals must adhere to compliance and governance regulations. Three regulations of note are HIPAA, PCI, and SOX compliance. HIPAA is used in Healthcare.  PCI is used in credit card transactions. SOX is used in public organizations for data integrity.  Auditing is part of adherence to these regulations.    For this assignment, you will choose one organization that you are familiar with.  Then, you will choose the regulation associated with that business.

Write a three to five (3-5) page paper in which you:

  1. Briefly describe the organization that you chose. Identify which regulation you would associate with that organization.  Explain the purpose of the regulation for that business.
  2. Identify the requirements for the organization in order to be compliant.  Outline the penalty for non-compliance.
  3. Explain how the regulation affects the work of the IT professional in that business.Assess the role of auditing in IT in order to be compliant.
  4. Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.
  5. Format your assignment according to the following formatting requirements:
    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze common Website attacks, weaknesses, and security best practices.Compare and contrast Web-based risks.
  • Use technology and information resources to research issues in securing Web-based applications.
  • Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using

 

CIS 542 WEEK 7 ASSIGNMENT 2

Assignment 2: Compliance and Governance Regulations

Due Week 7 and worth 120 points

Organizations and IT Professionals must adhere to compliance and governance regulations. Three regulations of note are HIPAA, PCI, and SOX compliance. HIPAA is used in Healthcare.  PCI is used in credit card transactions. SOX is used in public organizations for data integrity.  Auditing is part of adherence to these regulations.    For this assignment, you will choose one organization that you are familiar with.  Then, you will choose the regulation associated with that business.

 

 

CIS 542 Week 2 Discussion

CIS 542 Week 2 Discussion

Week 2 Discussion

Your Rating:

  • 1
  • 2
  • 3
  • 4
  • 5

“eBusiness and Personal Security Vulnerabilities Please respond to the following:

 

 

 

 

Latest A+ Graded at link below

 

 

 

 

https://hwacer.com/Tutorial/cis-542-week-2-discussion/

 

 

 

 

  • Of all the security threats listed in Chapter 3, select the one (1) you believe to be the most commonly perpetrated. Determine which security threat has the potential to cause the most damage. Justify your responses.
  • Go to the Open Web Application Security Project (OWASP) Website and review the OWASP top 10 Web Application Security Risks. Next, describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.

Week 2 Discussion

Your Rating:

  • 1
  • 2
  • 3
  • 4
  • 5

“eBusiness and Personal Security Vulnerabilities Please respond to the following:

  • Of all the security threats listed in Chapter 3, select the one (1) you believe to be the most commonly perpetrated. Determine which security threat has the potential to cause the most damage. Justify your responses.
  • Go to the Open Web Application Security Project (OWASP) Website and review the OWASP top 10 Web Application Security Risks. Next, describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.

Week 2 Discussion

Your Rating:

  • 1
  • 2
  • 3
  • 4
  • 5

“eBusiness and Personal Security Vulnerabilities Please respond to the following:

  • Of all the security threats listed in Chapter 3, select the one (1) you believe to be the most commonly perpetrated. Determine which security threat has the potential to cause the most damage. Justify your responses.
  • Go to the Open Web Application Security Project (OWASP) Website and review the OWASP top 10 Web Application Security Risks. Next, describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.

CIS 542 Week 2 Discussion

Week 2 Discussion

Your Rating:

  • 1
  • 2
  • 3
  • 4
  • 5

“eBusiness and Personal Security Vulnerabilities Please respond to the following:

  • Of all the security threats listed in Chapter 3, select the one (1) you believe to be the most commonly perpetrated. Determine which security threat has the potential to cause the most damage. Justify your responses.
  • Go to the Open Web Application Security Project (OWASP) Website and review the OWASP top 10 Web Application Security Risks. Next, describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.

Week 2 Discussion

Your Rating:

  • 1
  • 2
  • 3
  • 4
  • 5

CIS 542 Week 2 Lab Assignment 1

CIS 542 Week 2 Lab Assignment 1

 

Week 2 Lab Assignment 1: Evaluating Web Server Vulnerabilities

Due Week 2 and worth 30 points

Each lab will be submitted based on the following:

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-2-lab-assignment-1/

 

 

 

 

 

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

 

 

CIS 542 Week 2 Lab Assignment 1

Week 2 Lab Assignment 1: Evaluating Web Server Vulnerabilities

Due Week 2 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

 

 

CIS 542 Week 2 Lab Assignment 1

Week 2 Lab Assignment 1: Evaluating Web Server Vulnerabilities

Due Week 2 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

 

CIS 542 Week 2 Lab Assignment 1

Week 2 Lab Assignment 1: Evaluating Web Server Vulnerabilities

Due Week 2 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

CIS 542 Week 1 Discussion

CIS 542 Week 1 Discussion

 

 

“Client Server and Distributed Computing” Please respond to the following:

  • There are several advantages and challenges of using a client / server network configuration. Choose one (1) advantage and one (1)challenge that are specially relevant to applications in a Web environment. Explain why you chose the advantage and challenge that you did, and provide one (1) real-world example of each environment.
  • Web application developers have to be mindful of security vulnerabilities when they develop their Web applications (e.g., online banking). Select one (1) Web application and determine the major security vulnerabilities related to that Web application,Recommend key actions that developers could take in order to mitigate these challenges.

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-1-discussion/

 

 

 

CIS 542 Week 1 Discussion

“Client Server and Distributed Computing” Please respond to the following:

  • There are several advantages and challenges of using a client / server network configuration. Choose one (1) advantage and one (1)challenge that are specially relevant to applications in a Web environment. Explain why you chose the advantage and challenge that you did, and provide one (1) real-world example of each environment.
  • Web application developers have to be mindful of security vulnerabilities when they develop their Web applications (e.g., online banking). Select one (1) Web application and determine the major security vulnerabilities related to that Web application,Recommend key actions that developers could take in order to mitigate these challenges.

 

 

 

CIS 542 Week 1 Discussion

“Client Server and Distributed Computing” Please respond to the following:

  • There are several advantages and challenges of using a client / server network configuration. Choose one (1) advantage and one (1)challenge that are specially relevant to applications in a Web environment. Explain why you chose the advantage and challenge that you did, and provide one (1) real-world example of each environment.
  • Web application developers have to be mindful of security vulnerabilities when they develop their Web applications (e.g., online banking). Select one (1) Web application and determine the major security vulnerabilities related to that Web application,Recommend key actions that developers could take in order to mitigate these challenges.

 

CIS 542 Week 11 Discussion

CIS 542 Week 11 Discussion

 

 

Course Conclusion” Please respond to the following:

  • You have just completed ten (10) weeks of this Web application security course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10 weeks.
  • Create a hierarchy of no more or no less than five (5) of the most important topics that you believe a one-day course entitled “Web Application Security: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics.

 

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-11-discussion/

 

 

 

Course Conclusion” Please respond to the following:

  • You have just completed ten (10) weeks of this Web application security course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10 weeks.
  • Create a hierarchy of no more or no less than five (5) of the most important topics that you believe a one-day course entitled “Web Application Security: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics.

 

 

 

Course Conclusion” Please respond to the following:

  • You have just completed ten (10) weeks of this Web application security course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10 weeks.
  • Create a hierarchy of no more or no less than five (5) of the most important topics that you believe a one-day course entitled “Web Application Security: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics.

 

 

CIS 542 Week 11 Discussion Course Conclusion” Please respond to the following: You have just completed ten (10) weeks of this Web application security cours
CIS 542 Week 11 Discussion Course Conclusion” Please respond to the following: You have just completed ten (10) weeks of this Web application security cours

CIS 542 Week 10 Lab Assignment 10

CIS 542 Week 10 Lab Assignment 10

 

 

CIS 542 Week 10 Lab Assignment 10

Week 10 Lab Assignment 10: Implementing a Security Development Lifecycle (SDL) Plan

 

 

 

Latest A+ Graded at link below

 

 

 

 

https://hwacer.com/Tutorial/cis-542-week-10-lab-assignment-10/

 

 

 

 

Due Week 10 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

 

CIS 542 Week 10 Lab Assignment 10

Week 10 Lab Assignment 10: Implementing a Security Development Lifecycle (SDL) Plan

Due Week 10 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

CIS 542 Week 10 Lab Assignment 10

Week 10 Lab Assignment 10: Implementing a Security Development Lifecycle (SDL) Plan

Due Week 10 and worth 30 points

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.
    1. completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

CIS 542 Week 10 Discussion

CIS 542 Week 10 Discussion

 

 

“Standards” Please respond to the following:

  • Chapter 15 mentions several Web Application Security Organizations. Each organization has its own specialialization. Use the Internet to review some of these organizations’ websites. Determine which of the organizations is the most helpful for you in terms of your area of interest. Provide a rationale for your response..
  • Imagine that you are the corporate Informations System Security Officer (ISSO). Determine the key actions that you would take in order to ensure that Web applications are compliant with the applicable security standards. Select one (1) such standard and explain how you would keep it in compliance.

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-10-discussion/

 

 

 

“Standards” Please respond to the following:

  • Chapter 15 mentions several Web Application Security Organizations. Each organization has its own specialialization. Use the Internet to review some of these organizations’ websites. Determine which of the organizations is the most helpful for you in terms of your area of interest. Provide a rationale for your response..
  • Imagine that you are the corporate Informations System Security Officer (ISSO). Determine the key actions that you would take in order to ensure that Web applications are compliant with the applicable security standards. Select one (1) such standard and explain how you would keep it in compliance.

 

 

“Standards” Please respond to the following:

  • Chapter 15 mentions several Web Application Security Organizations. Each organization has its own specialialization. Use the Internet to review some of these organizations’ websites. Determine which of the organizations is the most helpful for you in terms of your area of interest. Provide a rationale for your response..
  • Imagine that you are the corporate Informations System Security Officer (ISSO). Determine the key actions that you would take in order to ensure that Web applications are compliant with the applicable security standards. Select one (1) such standard and explain how you would keep it in compliance.

 

CIS 542 Week 4 Discussion

CIS 542 Week 4 Discussion

 

“Web Application Security” Please respond to the following:

  • Imagine that you are the IT Security Officer for a large university, and you have been assigned the task of implementing Web security.Propose the key actions that you would take to implement security in order to eliminate single points of failure. Provide a rationale for your response.
  • Access Control is one (1) of the most important security mechanisms when one designs a secure network, Website, or data transmission environment. Suggest the approach that you would take to utilize access control in your environment. Recommend the major actions that you can take to assure that proper type of access and level of access and control are being used.

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-542-week-4-discussion/

 

 

 

 

“Web Application Security” Please respond to the following:

  • Imagine that you are the IT Security Officer for a large university, and you have been assigned the task of implementing Web security.Propose the key actions that you would take to implement security in order to eliminate single points of failure. Provide a rationale for your response.
  • Access Control is one (1) of the most important security mechanisms when one designs a secure network, Website, or data transmission environment. Suggest the approach that you would take to utilize access control in your environment. Recommend the major actions that you can take to assure that proper type of access and level of access and control are being used.

“Web Application Security” Please respond to the following:

  • Imagine that you are the IT Security Officer for a large university, and you have been assigned the task of implementing Web security.Propose the key actions that you would take to implement security in order to eliminate single points of failure. Provide a rationale for your response.
  • Access Control is one (1) of the most important security mechanisms when one designs a secure network, Website, or data transmission environment. Suggest the approach that you would take to utilize access control in your environment. Recommend the major actions that you can take to assure that proper type of access and level of access and control are being used.