it’s a group presentation I attached the file look for it and if there is any more information let me know thank you
Category: Cyber security
-
“Secure Network Design and Implementation Plan for the Merger of Company A and Company B” Title: “Securing and Optimizing a Merged Network: Recommendations for Implementation and Risk Management”
INTRODUCTION
You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
• “Company A Network Diagram”
• “Company A Risk Analysis”
• “Company B Network Diagram”
• “Company B Vulnerability Report and Cybersecurity Tools”
SCENARIO
Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.
The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services.
REQUIREMENTS
A. Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
B. Analyze the given network diagram and vulnerability scan for both companies by doing the following:
1. Describe two existing vulnerabilities for each company.
2. Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
• the name of the regulatory compliance requirement
• why the regulatory requirement is relevant to the newly merged company
• how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are applicable to the merged organization, including the following in the description:
• potential network security risks of implementing the topology
• potential performance impacts on the merged network after implementation of the proposed design
• how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
• a cost-benefit analysis for on-premises and cloud infrastructure solutions
• a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission. -
Title: “An Analysis of the Impact of Technology on Education: A Comprehensive Review and Synthesis of Literature”
This assignment will be mostly compiling information located in multiple documents into the format required for the template and filling in the gaps as necessary. There should be a total of 15 pages in this document, but I’m including the definitions list and other material that should fill in 3-4 pages. I am also attaching an exampe of someone else’s CH 1 to use as a guide for formatting and section length. I’m also attaching Ch 2 of MY dissertation to use for additional background information and to leverage the list of references already compiled. If there is a need to add more references to support the writing, please ensure they have a DOI address attached so I can easily find them and add them to the list.
-
Title: Comparison of Forensics Tools for Mac, iPod, and iPhone Devices Introduction: In today’s digital age, the use of Apple products such as Mac, iPod, and iPhone has become widespread. As a result, there is an
Research and compare forensics tools that can examine Mac, iPod, and iPhone devices.
Create a table listing the features they have in common, differences in functions, and price.
Write a short paper stating which one you would choose if you were an investigator for a
small firm, and explain why. -
Title: Enhancing Security Assessment and Testing: Recommendations for a Responsible Program
Your audience for this presentation will be the executive leadership of the organization that you have been working with throughout this course.
Within your presentation:
Describe how you would analyze the current state of security assessment and testing currently in place.
Considering the real-world challenges, what would you recommend for proactive steps in planning, deploying, operating, and maintaining a responsible security assessment and testing program?
What are the strengths, weaknesses, opportunities and threats (SWOT) of following or not following your recommendations?
Include a cover slide, introductory slide, conclusion slide, and references slide. All of these slides will not count in your required total of slides.
With your references slide, plan to put citations in APA format. Information on APA formatting can be found through then libguideLinks to an external site..
Your independent research on the topic should go beyond what is contained in the texts. Strive toward demonstrating mastery of the subject to your presentation audience. -
“Digital Forensics Investigation of a Suspected Child Pornography Distributor on a Windows 10 Laptop” Introduction: As a digital forensics specialist for DigiFirm Investigation Company, it is my responsibility to assist the local police in their
You
are an experienced digital forensics specialist for DigiFirm
Investigation Company. The local police are investigating a man who they
suspect is distributing child pornography. They have seized his laptop
computer, which runs the Windows 10 operating system. The police are
shorthanded and have contracted with DigiFirm to assist with the
forensic investigation of the laptop. Chris, your team leader, has asked
you to assist with the case.
There
are several examinations you can complete on a computer running Windows
10. Before beginning any digital forensics investigation, it’s a good
idea to plan your approach.
For this assignment:
Write
a report that outlines the steps to be performed in examining the
laptop for evidence of the crime, in order of importance.
Explain why certain steps must be performed before others.
Briefly describe what can and cannot be retrieved from the Windows operating systems.
Your answer must be at least 1 page long. Upload your completed paper
into the assignment drop box by clicking the “Submit” button below.
Your answer will be graded on the strength of your
argument/explanations, as well as the professionalism of your writing
(grammar, punctuation, spelling, cohesive sentences and paragraphs,
etc.).
APA format is NOT required for this paper. -
“Mitigating Cyber Threats: A Comprehensive Report for Technical Stakeholders”
Activity Directions
In this exercise, you will apply the analysis work you have developed during previous modules; if necessary, develop realistic simulated IOC’s and TTP’s based on the organization you selected in Module 1, as well as material you have reviewed in previous modules. The goal of this exercise is for you to develop a realistic cyber threat intelligence report for a technical audience within your organization. This report should allow technical staff to take effective action and mitigate risk associated with cyber threat actors.
Report Content
Your written report will be formal, with actionable mitigation recommendations for a technical audience (educated stakeholders) along with an executive summary. This report will provide a bottom line assessment of the actual, and future, impact to the organization from the activity of the cyber threat actors. Impact should be limited to no more than two pages. You will also provide a description of observed cyber threat actor activity and capabilities. This section should describe exploited vulnerabilities and techniques to subvert or overcome security controls. The report will outline recommended mitigation actions to restore the organization to an acceptable level of risk. The executive summary must be no more than one page.
NOTE: This assignment has a longer page count requirement than other writing assignments you have completed in this course (see below).
Criteria and Requirements
Title page (Remember to use the provided template)
Length
Undergraduate: 10 full pages, double-spaced
References page (for papers with cited sources)
For a complete rubric, see below
The contents of your assignment will be automatically checked for plagiarism. Please see your syllabus for more information.
I have attached the template to get the report started. -
Title: Exploring Microsoft Azure: A Hands-On Lab Exercise and Research Writing Assignment
This assignment requires screenshots of Microsoft Azure lab exercise and research writing. Access to microsoft Azure lab will provided upon hire.
-
“Revision of Assignment per Week 2 Discussion: Correcting Professor’s Comments and Following Instructions”
per our discussion see week 2. please correct the professor’s comments (in red). and follow week 2 instructions. thank you.
-
Nmap and Zenmap Lab Part 1: Screenshots Windows 10 IP address:
Kali IP address:
Using Nmap and Zenmap sets the foundation for enumeration and network identification.
View the “2-3 Nmap and Zenmap Lab” video, located in Class Resources.
Part 1:
In this lab, you will use Nmap and Zenmap, basic scanning, and network topology. Provide screenshots of your Windows 10 IP address, your Kali IP address, Netdiscover, nmap -sn command, Nmap services scan, Nmap intrusive scan, Zenmap network topology, and two additional Nmap scans not covered in the video.
Part 2:
Write a 250- to 500-word summary and address the following:
By running a scan of the Windows 10 VM, identify what operating system is running.
Describe what is meant by an intrusive scan.
Summarize what your two additional Nmap scans do and provide screenshots.
Place all screenshots in Microsoft Word document and submit it to the assignment. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window; this includes the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.