please go to chapter 3, sampliong and procedures, please write the page of red colored highlighted.
Please check for the template also
Category: Cyber security
-
Sampling and Procedures: Red Colored Highlights Sampling and Procedures: Red Colored Highlights In chapter 3 of our textbook, we will be exploring the important topic of sampling and procedures in research. Sampling refers to the process of selecting a subset of
-
“Building a Proactive Security Culture: Addressing Human and Legal Factors in Security Awareness Training” “Improving Readability and Organization in Academic Writing”
Overview
Establishing a proactive security culture in an organization is key to limiting security risks and limiting the dangers of complacency within the organization. This proactive security mindset is important to establish from the top of the organization down. Security awareness training is the first line of defense and is a foundational component of any well-rounded cybersecurity initiative. If the personnel are not actively aware, your cybersecurity defense structure can fall apart regardless of how much you invest in technology.
For this project, you will answer questions related to a security awareness training case study. This project pulls concepts together from your case study papers and course discussions, and it serves as the foundation for why integrating legal and human factors into a security awareness training program is important. Refer to your module readings and resources for extra help.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe the fundamental concepts of legal and human factors in regard to cybersecurity
Scenario
In a course announcement, your instructor will provide you with a scenario on which you will base your work. Use the scenario to address the critical elements.
Prompt
Specifically, you must address the critical elements listed below.
Security Awareness Training Case StudyIdentify security gaps or opportunities in training related to human factors. Describe the impact associated with not addressing each gap or opportunity to individuals and the organization.
Identify security gaps or opportunities in training related to legal factors. Describe the impact associated with not addressing each gap or opportunity to individuals and the organization. Note: You do not need to quote specific laws here; focus on the concepts.
Explain why a proactive security mindset is beneficial for all levels of the organization. Provide examples that support your explanation.
What to Submit
Your polished, finalized submission should be 1 to 2 pages in length (plus a cover page and references) and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least one reference, which should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_200_Project_One_Neo_Anderson.docx.
Project One Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Human FactorsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerIdentifies security gaps or opportunities in training related to human factors and describes the impact associated with not addressing each gap or opportunityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Legal FactorsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerIdentifies security gaps or opportunities in training related to legal factors and describes the impact associated with not addressing each gap or opportunityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Proactive Security MindsetMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains why a proactive security mind-set is beneficial for all levels of the organization and provides examples that support the explanationAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas10
Total:100% -
“Uncovering Hidden Vulnerabilities: A Comparative Analysis of Grammar-Based Fuzzing Tools on Linux Systems”
project title: Reaching Deeper Security Threats Using Grammar-Based Fuzzers and Understanding their Effectiveness.
github link: https://github.com/carolemieux/perffuzz
Tools must be implemented using Linux:
1. PerfFuzZ
2. TreeLine
3. SlackLine
4. SlowFuzz -
Title: “Implementing an IT Solution for Streamlining Inventory Management: A Proposal and Project Overview”
See PDF attached labeled “IT Capstone toipc approval form revised” for topic of the capstone project. Also attached is an IT capstone proposal template that my school would like to be used.
Per the requirements:
Discuss (suggested length of 15–20 pages) your project in a narrative proposal by doing the following:
A. Proposal Overview (suggested length of 2–4 pages) : Create an IT proposal and project overview by doing the following:
1. Identify the problem.
2. Propose an IT solution.
3. Explain the plan to implement this proposed project.
B. Review of Other Work (suggested length of 3–4 pages) : Provide a review of four other works that have been completed on your topic and that you will use as background for this proposed project.
Note: These other works may include interviews, white papers, research studies, or other types of work by industry professionals.
1. Describe how each work reviewed relates to the proposed development of this project.
C. Rationale (suggested length of 1–2 pages) : Provide a rationale showing the need for your proposed project.
D. Current Project Environment (suggested length of 2–3 pages) : Provide a description of the current state of the project environment or the current state of affairs that makes your proposed project necessary.
E. Methodology (suggested length of 1–2 pages) : Explain how you will apply a standard methodology (such as ADDIE or SDLC) for the implementation of your project.
F. Project Goals, Objectives, and Deliverables (suggested length of 3–5 pages) : Explain the goals, objectives, and deliverables for the project, including the following information:
1. Provide a table showing the relationship between goals and their supporting objectives, including outcomes or deliverables.
2. Provide a description of project goals, objectives, and deliverables.
G. Project Timeline with Milestones (suggested length of 1–2 pages) : Provide a projected timeline with milestones for your project, including the duration and start and end dates of each milestone.
H. Outcome (suggested length of 1–2 pages) : Reflect on how you will measure the success and effectiveness of this project.
I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. -
Title: The Impact of Social Media on Mental Health: A Critical Analysis Thesis Statement: The increasing use of social media has had a significant impact on mental health, leading to both positive and negative effects on individuals and society as a whole.
Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper.
Include at least 3 references supporting your paper research. -
Title: The Impact of Social Media on Mental Health: A Comprehensive Analysis Thesis Statement: The increasing use of social media has had a significant impact on mental health, both positively and negatively, and it is important to understand the various factors and
Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics that you will cover in your paper. When choosing topic, make sure you are able to find relevant information and current examples to support your topic. Submitting 3 or more references outside the textbook as part of the outline will make this easier for you going forward!
ALL TOPICS MUST HAVE BEEN APPROVED IN WEEK 1. -
Title: Cybersecurity Assessment Presentation to the Board Slide 1: Introduction – Introduce yourself and your role in the company – Briefly explain the purpose of the presentation – Outline the agenda for the presentation Narration: Hello
take your full cyber assessment conducted in the Week 7 assignment, and present those findings to the board. Use the weekly resources to gain an understanding of what information to communicate to your audience and how this can be done effectively. Specifically, the goal is to determine what the board deems relevant and how this presentation will serve to persuade and inform decision-making and action moving forward.
Your presentation should include the following:
There is no expectation for you to add new references or information. You’re merely communicating the information in week seven effectively.
Each slide should have no more than four bullet points with concise wording.
The presentation should be informative and engaging for an audience of board members to readily absorb the information contained therein.
Provide narration for each slide (excluding title and references) using the audio recording feature in PowerPoint or NCU’s Kaltura tool.
Length: 12-15 slides with notes (100-150 words per slide), not including title and references slides
References: Include a minimum of 5 scholarly references used in the Week 7 assignment. -
“Exploring the Use of Mixed Methodology in Investigating [Topic] in [Field/Industry] using IEEE Referencing Format”
I need you to help me write my dissertation; it should be 15,500 words in IEEE referencing format. I will provide you with the dissertation proposal and writing structure, as well as anything else you might need.
There is no specific software or coding required for the dissertation, and the data to be used based on the dissertation is secondary; it should be mixed with quantitative and qualitative data.
The referencing format is (IEEE Format)
Furthermore, a two-week update and progress are expected to be made for my supervisor, as this is meant for adjustment and correction. The project plan and timelines can be found in the proposal. -
“Developing a Hybrid Model for Predicting Stock Market Trends Using Quantitative and Qualitative Data” Introduction The stock market is a complex and dynamic system that is influenced by a multitude of factors, making it difficult to accurately predict its trends. However
I need you to help me write my dissertation; it should be 15,500 words in IEEE referencing format. I will provide you with the dissertation proposal and writing structure, as well as anything else you might need.
There will be some specific software or coding required for the dissertation since a model is to be developed and the data to be used based on the dissertation is secondary; it should be mixed with quantitative and qualitative.
The referencing format is (IEEE Format) -
Title: Incident Analysis Brief: Strengthening Cybersecurity Posture Through Fundamental Security Design Principles Scenario Analysis and Recommendations for Implementing Fundamental Security Design Principles in an Organization
Overview
This project is to create an incident analysis brief for your manager. Cybersecurity incidents will occur regardless of the level of protection and prevention an organization has in place. The response to the incident is what may make or break an organization. As you progress through your degree, you will build your skills to address all stages of incident response: preparation, detection and analysis, containment, eradication and recovery, and post-incident activity.
A critical aspect of incident response is using the information gained from an incident to improve the organization’s security. The insight helps security professionals develop solutions that reduce the likelihood of similar incidents in the future. It also helps balance the potential negative impacts on the people, processes, and technologies the solutions ultimately affect. In this project, you will examine a past incident and use the Fundamental Security Design Principles to develop recommendations that will protect the organization in the future.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe fundamental principles of cybersecurity
Scenario
In a course announcement, your instructor will provide you with a scenario to base your work on. In the scenario, you are a security analyst creating an incident analysis brief that explains to the security or IT director explaining how to apply the Fundamental Security Design Principles to strengthen the organization’s security posture following the incident described in the case. The scenario will provide all the specific technical information you need for your brief. You should address each critical element in the Project Two prompt, speaking broadly to your analysis and recommendations based on your research from the course materials in previous modules.
Prompt
Using evidence from the scenario, prepare an incident analysis brief for your manager. Limit your analysis to one security objective and two Fundamental Security Design Principles from the lists below.
Security Objective (Choose One):
Confidentiality
Integrity
Availability
Fundamental Security Design Principles (Choose Two):
Separation (of domains and duties)
Isolation
Encapsulation
Modularity
Simplicity of design (economy of mechanism)
Minimization of implementation (least common mechanism)
Open design
Complete mediation
Layering (defense in depth)
Least privilege
Fail-safe defaults and fail secure
Least astonishment (psychological acceptability)
Minimization of trust surface (reluctance to trust)
Usability
Trust relationships
Specifically, you must address the critical elements listed below:
Scenario Analysis: Using your work in the case study analyses (Modules Two through Four) and other course resources as reference, select the security objective you think is most relevant to the organization in the case.Describe why the loss of your selected security objective (confidentiality, integrity, or availability) reflects the greatest overall negative impact on the organization. Use evidence from the scenario and your coursework to support your selection.
Summarize the negative impacts on people, processes, and technologies associated with the loss of your selected security objective.
Recommendations: Select two Fundamental Security Design Principles as criteria, and recommend solutions to remedy the loss of the selected security objective based on your assessment of the incident.Explain how your solution implements the selected Fundamental Security Design Principles. Provide evidence from the scenario and your coursework to support your selections.
Describe how your solution balances impacts on people, processes, and technologies.
Explain which aspect of your solution you would recommend to your manager as the most important to the organization. Support your response with evidence from the coursework or scenario
What to Submit
Your submission should be 3 to 5 pages in length (plus a cover page and references) and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Include at least three references, which should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_200_Project_Two_Neo_Anderson.docx.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Scenario Analysis: Greatest Overall Negative ImpactMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes why the loss of the selected security objective reflects the greatest overall negative impact on the organization with evidence from the scenario and coursework to support the selectionAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
Scenario Analysis: Negative ImpactsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerSummarizes the negative impacts on people, processes, and technologies associated with the loss of the selected security objectiveAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
Recommendations: Implementation of Fundamental Security Design PrinciplesMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how the solution implements the selected Fundamental Security Design Principles with evidence to support the selectionsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
Recommendations: Balancing ImpactsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how the solution balances impacts on people, processes, and technologiesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
Recommendations: Importance to OrganizationMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains which aspect of the solution is most important to the organization with evidence to support the explanationAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant19
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas5
Total:100%