Template and pdf attached for assignment
Overview
In this case study assignment, we will continue to investigate the
Fundamental Security Design Principles at work in a real-world scenario.
Through the lens of data protection, we will analyze the following
principles:
Least Privilege
Layering (Defense in Depth)
Fail-Safe Defaults / Fail Secure
Modularity
Usability
Note: You will be engaging with this scenario again in the Module Three discussion.
Case Study Scenario
You are a cybersecurity analyst working at a prominent regional
hospital. On Monday morning, the organization’s technology help desk
received a call from Dr. John Beard, a long-time resident physician. Dr.
Beard called them to report that his company laptop was stolen from his
car after he stopped to work out at a local gym on his way home from
the office.
A representative from the help desk informed you of the theft and
also mentioned that Dr. Beard stated that his laptop case contained a
USB thumb drive that he purchased to “back up” important patient files
he saved onto his laptop. Dr. Beard also revealed that his daily planner
“might have” been in the bag and that the planner had his hospital
computer user name and password written on the back cover. Prior to
ending the call, Dr. Beard told the representative that he would call
her back if his daily planner turned up.
As your conversation with the help desk representative wound down,
she commented that Dr. Beard has many different computer “issues” that
keep her team busy. She recalled talking to Dr. Beard about the
hospital’s policy against accessing patient files remotely and his
annoyance with her inability to help him “get work done” while away from
the hospital. And just a week ago, a junior member of her team
completed a service ticket to reconfigure Dr. Beard’s laptop to grant
him administrative rights. The service request stuck out because it did
not have a “reason” indicated (a company policy requirement) but was
still approved by James Davis, the hospital’s senior system
administrator and close personal friend of Dr. Beard.
Prompt
After reading the scenario above, complete the Fundamental Security
Design Principles mapping table in the Case Study Template and answer
the short response questions. You’ll notice that the listed Fundamental
Security Design Principles differ from those presented in previous
activities. In the cybersecurity trade, there are many different design
principles and frameworks. Successful practitioners learn to work with
many different (but conceptually similar) principles to achieve their
security goals.
Specifically, you must address the critical elements listed below:
Fundamental Security Design Principles Mapping: Fill in the table in
the Module Two Case Study Template by completing the following steps
for each control recommendation:
Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X.
Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation.
Explain your choices in one to two sentences, providing a selection-specific justification to support your decision.
Short Response Questions:
How might you work with someone like Dr. Beard to cultivate a security mind-set
that is more in line with the organization’s ethical norms? Hint:
Consider his attitude, his past behaviors, and his opinion about
organizational policies.
How would you help the hospital better secure its
patient files? Make sure to incorporate at least one data state
(data-at-rest, data-in-use, or data-in-motion) and one of the control
recommendations from your completed table in your response.
What to Submit
Submit your completed Fundamental Security Design Principles map and
short response answers in the Module Two Case Study Template. Your
submission should be 1–2 pages in length (plus a cover page and
references, if used) and written in APA format. Use double spacing,
12-point Times New Roman font, and one-inch margins. Use a filename that
includes the course code, the assignment number, and your name—for
example, CYB_100_1- 4_Neo_Anderson.docx.
Module Two Case Study Activity Rubric
Criteria Proficient (100%) Needs Improvement (65%) Not Evident (0%) Value
Mapping: Fundamental Security Design Principle Specifies which Fundamental Security Design Principle applies to at least 8 of the control recommendations Specifies which Fundamental Security Design Principle applies to fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 20
Mapping: Security Objective Indicates which security objective (CIA) best applies to 8 or more control recommendations Indicates which security objective (CIA) best applies to fewer than 8 control recommendations Does not address critical element, or response is irrelevant 20
Mapping: Explain Explains choices with relevant justifications for at least 8 of the control recommendations Explains choices with relevant justifications for fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 25
Short Response: Cultivating Mindset Explains how you might work with
someone like Dr. Beard to cultivate a security mindset that is more in
line with the organization’s ethical norms Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10
Short Response: Better Secure Explains how you would help the
hospital better secure its patient files incorporating at least one data
state (data-at-rest, data-in-use, or data-in-motion) and one of the
control recommendations from your table Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 20
Articulation of Response Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors
related to citations, grammar, spelling, or organization that negatively
impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 5
Total: 100%
Category: Computer science
-
“Applying Fundamental Security Design Principles to a Real-World Scenario: A Case Study Analysis” CYB_100_2-2_Neo_Anderson.docx
-
“Enhancing Presentations with Effective Powerpoint Editing”
This is a Powerpoint edit.
Instruction will be attachted please read carefully.
Follow each task correctly.
2 supporting files will be added -
“Grading and Providing Feedback on a Student Assignment: Evaluating a Paper on Local Area Networks”
Teaching technology provides instructors the opportunity to grade and assess many hands-on projects with a specific predicted outcome. However, along with the hands-on assignments, we are also tasked with grading writing assignments. A student will not automatically know what we mean when we assign a low grade without meaningful information to accompany the grade. In this assignment, you will practice evaluating student work and offering constructive feedback to learners.
Instructions
You will use the Learner Evaluation Assignment Grading Rubric to grade this Completed Assignment written by a student in an undergraduate program. The student wrote the Completed Assignment based on the Student Assignment Description. Submit the Learner Evaluation Assignment Grading Rubric, which allows a maximum of 9 points. In addition, provide the student with qualitative feedback about areas where the student can improve.
Your assignment will be graded according to the following criteria:
Evaluate the format and style of a student assignment.
Evaluate grammar within a student assignment.
Evaluate content and focus within a student assignment.
Provide qualitative feedback on a student assignment that helps the student understand areas needing improvement.
Student Assignment Description
These are the directions that were provided for the student paper that you are going to evaluate:
Please write a 2-page scholarly paper that describes a local area network. Use 12-point font, double-space, and write the paper in third person. Include a minimum of two references with a listed author and date of publication, cited with APA style.
Completed Assignment
This is the paper that the student produced.
How would I describe a local area network? Wow, that is a tough question to answer. The network usually has locations in various cities and is connected to a mane location in a larger city.
Telephone line are used to connect the networke from one town to another town across the country. A switch and a hub may be used in the different towns to pass data to the clinets in the towns(Cisco, 2007). If the netork goes down in one town it may go down in another town since all of the equipment is connected by the telephone lines. Thes lines are called circuits, but I prefer to call them telephone lines.
I have seen this happen in my job where I am a nerwok administrator for a company that I will not name at this time. If you go to the website of http://www.cisco.com you will find more information about a local area network that you can read in your spare time. You can also find drawings of netwoks that are popular with some companies. I did not use the drawings for this paper since it was only two pages.
In conclusion, this is a tough question to answer, so I guess I could say the that it is best to go to the Cisco website to look at the best designs.
Do not rewrite the student assignment. Your task is to evaluate this assignment.
Please use the following rubric as a basis for grading the above assignment:
Learner Evaluation Assignment Grading Rubric
Does Not Meet Objective
(0-1 point) Meets Most Objectives
(2 points) Meets Most Objectives
(2 points)
Format and style (includes APA usage, third person) Misuses APA, does not use font, spacing or style listed in the assignment. Generally meets the objectives, with minor problems. Meets all of the format, style and APA guidelines listed in the assignment.
Grammar (Spelling, punctuation, word usage) Misspells words, uses incorrect punctuation, employs a poor choice of words. Minor issues with spelling, punctuation, and word choice. No errors in spelling, punctuation, and word choice.
Content focus (on topic) The focus of the paper drifts from the topic and does a poor job of topic identification. The focus of the paper stays within the scope of the assignment, but does little to elaborate on the issue. The focus is on the scope of the assignment and elaborates on the topic to add value to the paper. -
“Voiceover Presentation Assistance for Dissertation Defense”
I need a female help me to present my dissertation, record it like a voiceover (no visual needed) in 10 mins
-
My Favorite Hobby: Painting Slide 1: Title Page – Title: My Favorite Hobby: Painting – Subtitle: By [Your Name] Slide 2: Introduction to Painting – Image of a painting – Brief description of painting
For this assignment, you will create a 5-slide PowerPoint presentation about your favorite hobby or pastime. You can choose one hobby to describe in detail or describe a different hobby on each slide. Each slide should include written or bulleted content describing the hobby, why you enjoy it, etc. Proper grammar is required. Please note that all content must be written in your own words. Plagiarized information will not be accepted. All images, tables, and text should enhance the topic.
In your presentation, you must include the following elements at least once:
A title page (with the topic of the presentation and your name as the subtitle)
An image (from your computer, a stock image, or an online image. When using images from online, be sure to include the citation.)
A shape (inserted from the ‘shape’ option in the ‘illustrations’ group.)
A table (Select the size from the ‘tables’ group and include text that compliments your topic)
A Speaker Note (A note below a slide in the note viewer)
The following must be applied to the whole document:
A Theme of your choice (Selected when you initially created the presentation)
Transitions (Visual effects between each slide- 5 total)
Animations (Visual effects added to an object on each slide- 5 total)
A footer- using the Header & Footer feature (with your name on each slide- 5 total)
Slide numbers- using the Header & Footer feature (5 total) -
Designing a System for an Online Bookstore Title: “Building an Efficient System for an Online Bookstore: Design and Implementation”
find the attached PDF for more details. and those are the design tools that you can use :
Online tool to draw Context Diagram and DFD
https://online.visual-paradigm.com/drive/#diagraml…
Tool to design input and output form
https://www.jotform.com/ -
Title: The Risks and Responsibilities of Relying on AI for Academic Writing
Answer these questions (in about 350 words):I
Describe the perils and ethics of relying on AI to answer and write your paper for you.
What are the legal and ethical issues associated with AI -
“Computer Skills Quiz: Word, Excel, Access, and PowerPoint”
Hello, this is a computer skilled quizlet. Word
Excel
Access
Powerpoint May all be enclunded.
Please read each question carefully before submitting. Log my be provided for skills quiz. -
“Creating a Data Flow Diagram for Course Registration and Payment Process” “Designing a Data Flow Diagram for a Business System”
Overview
A data flow diagram (DFD) shows how information flows within an
information system. A DFD is a representation of the data flow and does
not imply the activity order. A DFD is a model of a real-world business
system represented through a hierarchy of abstracts through leveling.
Lower levels of a DFD reflect more detail, and higher levels of a DFD
reflect less detail. A logical system diagram describes the business
events that take place and the data required for each business event,
focusing on what information is flowing and what information is
transmitted. A DFD will not go into technical (hardware and software)
aspects of the system; it will show inputs and outputs from external
sources, showing the path of data and how it flows through the system.
Prompt
For this activity, you need to create a data flow diagram reflective of the following:
Your experience registering for a course and then following the process through payment (or using financial aid).
Access course catalog
Review course options
Select course to register for
Complete registration
Pay for course
Your DFD must include the listed processes and at least two
subprocesses (levels) within two of the five main processes. Your
diagram can reflect up to three levels: zero (the context diagram), one
(subprocess), and two (functionality). The various levels of detail are:
Level zero: Represents the overview of the entire system you are critiquing
Level one: Breaks down the main functions of the system into smaller subprocesses
Level two: Further breaks down subprocesses of level one
Use the symbols from the Gane and Sarson symbol set needed to illustrate data flow within your diagram:
External entity = Square ⬜
Data flow = Arrow →
Process = Rounded square ▢
Data stored = Rectangle ▭
Specifically, you must address the following rubric criteria:
Data Flow Diagram: Your diagram must be completed
without any missing components. It needs to show how information flows
within a system process. Remember: only DATA flows on data flows.
Hierarchical Leveling: Whether your diagram has one
or three levels, it needs to illustrate how each level is broken down
into smaller business events.
Data Flow Notation: Your diagram should include
accurate and appropriate data flow notation. Whenever you are referring
to a process, use a rounded square symbol. Whenever you are referring to
data that is being stored, use a rectangle. It depends on the business
process, but you may or may not have to use all Gane and Sarson symbols.
Logical System Functionality: Your diagram also needs to illustrate how business events are broken down into smaller subprocesses.
What to Submit
Upload a .doc, .pdf, or .jpeg file of your diagram. You can use a
tool of your choice to help you create the data flow diagram, but we
recommend using Lucidchart, draw.io, or Microsoft Visio.
Getting Started in Lucidchart: The Basics
Visio 2016 Tutorial
Microsoft Azure Dev Tools for Teaching (link to access Visio)
Draw.io Quick Start Video Tutorial (1:35)
Draw.io Diagram Software
Module Two Activity Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Data Flow Diagram Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Illustrates a complete data flow diagram by showing how information flows within a system process Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include more details of the complete process Does not attempt criterion 25
Hierarchical Leveling Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Illustrates how each hierarchical level is broken down into smaller business events Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include more breakdown of information transmitted throughout system Does not attempt criterion 20
Data Flow Notation Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Includes accurate data flow notation (processes, data stores, external entities, and data flows) based on the selected system Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include correcting inaccurate symbols to show the part of the data flow
(e.g., using a square to show a process instead of using a rounded
square) Does not attempt criterion 15
Logical System Functionality Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Designs a diagram that shows business events broken down into subprocesses Shows progress toward
proficiency, but with errors or omissions; areas for improvement may
include showing both the business event and the associated subprocesses Does not attempt criterion 20
Articulation of Response Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Clearly conveys meaning with correct
grammar, sentence structure, and spelling, demonstrating an
understanding of audience and purpose Shows progress toward
proficiency, but with errors in grammar, sentence structure, and
spelling, negatively impacting readability Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas 10
Citations and Attributions Uses citations for ideas requiring attribution, with few or no minor errors Uses citations for ideas requiring attribution, with consistent minor errors Uses citations for ideas requiring attribution, with major errors Does not use citations for ideas requiring attribution 10
Total: 100% -
“Exploring the Impact of Hydraulics, IoT, and Machine Learning in Modern Industries”
Good evening students. The Final Paper is Due May 18th 2024 and no late submissions will be accepted. Final paper: Write a 1500-word research paper. The research paper has to be written individually. The presentation should be between 15-20 minutes long. Let me know what you will be writing about by April 20 2024. Examples of project topics: How does hydraulics impact the agriculture industry, What are the threats within IoT and how to secure them? or What type of algorithms are used within ML to make them think like a human? Topics covered in class:
Pneumatics & Hydraulics
Filters & Operational Amplifiers
IoT: Internet of things
Machine learning
Sensors
Paper should have a title page, table of content, your research and a conclusion. Your research paper should include at least 3 scholarly journals/articles/books. Presentations for your research will be on May 4th and May 11th. Research paper is due May 18th
Let me know if you have any questions. Thank You, Prof.