Identifying Potential Malicious Attacks, Threats And Vulnerabilities

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.

 

Instructors, training on how to grade is within the Instructor Center.

 

Assignment 1: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

 

Due Week 4 and worth 75 points

 

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

 

1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)
2) 1 – Web / FTP server 6) 3 – File servers
3) 1 – Microsoft Exchange Email server 7) 1 – Wireless access point (WAP)
4) 1 – Network Intrusion Detection System (NIDS) 8) 100 – Desktop / Laptop computers
  9) VoIP telephone system

 

 

 

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

 

Write a four to five (4-5) page paper in which you:

 

  1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
  2. Explain in detail the potential impact of the three (3) selected malicious attacks.
  3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
  4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
  5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
  6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
  7. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

American Court System And Correction.

CJ252: AMERICAN COURT SYSTEMS

Assignment 6: My Cousin Vinny: Trial Techniques and Procedures

FORMAT:

· Typed- 12pt font

· Running Header-

Last Name, First Name

CJ252: A6

· Title Document (save as)-

Last NameFirst NameCJ252A6

ASSIGNMENT:

1) Bill slips a can of tuna in his pocket and forgets to pay. Is this shoplifting? Please explain how mens rea, actus reus, and corpus delecti are involved in this assessment.

2) Stanley and Bill were interrogated at the police station. Both conceded they were advised of their rights. Name one possible 5th amendment issue with the interrogations.

3) Vinny is seen studying a book about Alabama Laws. His research will have to include both procedural and substantive law. Why does he have to study both types of law? What is the difference between procedural and substantive law?

4) Vinny visits Bill and Stanley in jail. What is this meeting called? Why is it important?

5) Lisa tells Vinny she doesn’t think he is cut out for this lawyering stuff. Do defense attorneys have to meet a certain level of competence?

6) Explain the following legal principles:

a. Competence

b. Due diligence

c. Communication

d. Confidentiality

7) Pretrial Steps

a. What crime are Bill and Stanley accused of?

b. What probable cause justified the arrests?

c. Explain “Initial Appearance”

d. Explain “Preliminary Hearing”

e. Explain “Grand Jury”

f. Explain “Arraignment”

8) What happened during the Arraignment of Bill and Stanley? What does Vinny plead for his clients? (Did you catch that the arraignment and the preliminary hearing were out of order, at least out of the order we discussed in class?)

9) Why is the case introduced as “The People of the State of Alabama” vs Bill and Stanley? Why is the victim not a party in the case?

10) Explain the discovery process.

a. What is discovery?

b. Why is it necessary?

11) Describe the part of the movie when Vinny claims he wants discovery (disclosure), but doesn’t know the process for it. How does he find about the discovery process?

12) The Prosecution askes the jury members “Can you participate in an endeavor in which the ultimate disposition might be execution?” What is this process called?

13) Explain the jury selection process.

14) Does trial proceed with a jury trial or a bench trial? Explain the difference.

15) What are the key points offered in the prosecution’s opening statement?

16) What are the key points offered in Vinny’s opening statement?

17) The Prosecution presents its case first and gets to present its witnesses first. When the Prosecution calls its witnesses they call them for Direct Examination.

a. What are the characteristics of Direct Examination?

18) Once the Prosecution calls a witness and goes through Direct Examination then Vinny, the Defense, gets to Cross-Examine the witness

a. What are the characteristics of Cross-Examination?

19) Summarize the following testimonies. What happened on the stand?

  Direct Examination Testimony Cross-Examination Testimony
Old Lady    
Fat Man    
“Redneck” Dude    
Deputy Sheriff    

20) What is impeachment?

21) Which of the prosecution’s witnesses were impeached? Explain.

22) What is an expert witness?

a. How are expert witnesses different from “regular” witnesses?

b. What do you have to demonstrate to present someone as an “expert”?

23) How does Lisa get introduced as an expert witness? What are Lisa’s qualifications for testifying?

24) What are the key points offered during Vinny’s last witness exchange (essentially, his closing statement)?

25) Were any jury instructions offered to the jury?

Describe at least two (2) types of bullying to which Amanda Todd was subjected.

Case Study 2: Bullying: The Amanda Todd Story

Due Week 8 and worth 130 points

 

Recent history illustrates that bullying is a growing problem among today’s youth in the United States.  Amanda Todd, for example, was only fifteen (15) years old when she committed suicide after being bullied by her peers for over a year.

 

Watch the video titled “Amanda Todd’s Story: Struggling, Bullying, Suicidal, Self-harm” (8 min 55 s).

Video Source: ChisVideos. (2012, October 11). Amanda Todd’s Story: Struggling, Bullying, Suicidal,   Self-harm [Video file]. Retrieved from http://www.youtube.com/watch?v=ej7afkypUsc. 

This video can be viewed from within your online course shell.

 

Use your textbook, the Internet, and / or Strayer Library to research articles on bullying cases that occur today.

 

Write a two to three (2-3) page paper in which you:

  1. Describe at least two (2) types of bullying to which Amanda Todd was subjected.
  2. Identify at least three (3) consequences that Amanda Todd experienced as a result of being bullied, and discuss her attempts to deal with them.
  3. Recommend two (2) strategies that you believe Amanda’s parents, teachers, and authorities could have used in order to reduce episodes of bullying of Amanda and thus prevent Amanda’s suicide.
  4. Compare at least two (2) similarities and two (2) differences between the bullying cases that take place today with those cases that took place when you attended high school.
  5. Explain the key contributing factors that you believe led to bullying behaviors. Next, suggest at least three (3) ways in which prevention programs can reduce bullying cases overall.
  6. Use at least two (2) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Describe how and why information systems are used today.

Instructors, training on how to grade is within the Instructor Center.

Assignment 1: Ethical Issues in Information Systems

Due Week 6 and worth 150 points

Choose one (1) ethics issue found within Chapter 4 of the textbook.

You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.

Write a two to three (2-3) page research paper in which you:

  1. Summarize the issue that you have chosen.
  2. Express your own opinion of, or position on, the issue that you have chosen.
  3. Identify two to three (2-3) human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
  4. Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your response.
  5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe how and why information systems are used today.
  • Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
  • Explain how to secure information systems resources that focus on both human and technological safeguards.
  • Identify how to mitigate risks as well as plan for and recover from disasters.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about management information systems using proper writing mechanics.