The paper must use APA 6th ed., 7th printing formatting 1. Wk 1 For this exercise, students will search the web and identify three globally recognized information security certifications and an...

1 answer below »
13 Discussion topics 500 words each.


The paper must use APA 6th ed., 7th printing formatting  1. Wk 1 For this exercise, students will search the web and identify three globally recognized information security certifications and an IT-related job that utilizes each certification. Students will be describing each certification, the importance of certification, and what jobs/careers are appropriate with that certification 2. 1 a -Hack Me - Research a recent hacking or security breach and write a summary of the event.  3. 2. What are Sarbanes-Oxley and HIPAA and what role do they play in information security?   4. 2 a - Now that you know what SOX and HIPAA are, search the internet and identify a case where SOX and HIPPA could have prevented a security breach or fraud.  5. Students will search the internet and identify a company /business, state or government that experienced a disaster (natural or manmade disaster). The students will analyze the impact of the disaster and compare the outcome to the company’s business continuity plan (BCP) and disaster recovery plan (DRP). Where the plans followed? What were the lessons learned? (Abstract, Conclusion and References) 6. Visit the web site of a city, county, or state government agency. Look for information about the agency’s disaster recovery plan. Does it have such a plan? If your web search is inconclusive, contact the agency directly and talk to its IT manager about the agency’s disaster recovery plan. Summarize your findings in a brief report.  7. As you search the web, identify What is Randsomeware and what is a Randsomeware Attack. Write a brief 3 page summary defining randsomeware and the impact it is having on State and Local Government, Colleges and Universities, and Private Enterprises. 8. Physical Security Analysis - Students will visit 3 businesses, at least one should be a bank, one may be virtual be via (web, youtube). Students are to identify all of the physical security measures they see. How many and what are some of the common physical securities between the different businesses. Which business appears to spend more money on physical security? 9. Take an inside look at Googles Datacenter and Write a one-page summary identifying all of the physical security measures Google has in place. https://www.youtube.com/watch?v=XZmGGAbHqa0&feature=youtu.be a. Search the internet for a request for information (RFI), request for proposal (RFP) or request for quotation (RFQ) in search for any alternative authentication access technology. Students are to print the technical requirements and be prepared to explain to the class why the requested access technology is the right fit. 10. Most web browsers now use 128-bit encryption to exchange data with secure web sites. But what does this mean? Is this symmetric or asymmetric cryptography? What is 128-bit encryption? In terms of the software available to the general public is 128-bit encryption the strongest? How does this compare to encryption tools used by corporations or government agencies? Go online and conduct research to answer this question. 11. Go online and search for information about the SDLC. How many different versions of the SDLC can you find? How do they differ? Summarize your findings in a brief report or presentation to share with the class. 12. Students are to prepare a brief summary of and the various types of firewalls (packet filtering, stateful inspection, application firewalls, proxy, intrusion detection and prevention and provide an example of each and when to use it. (Abstract, Conclusion and References) 13. Students are to prepare a presentation describing four of your favorite security principles you learned out during the Security course. Students should describe the four principles, explain why they chose those principles and provide an example of each principle in action. Students should also explain how the principles would add value to their IT careers moving forward.
Answered Same DayMar 05, 2021

Answer To: The paper must use APA 6th ed., 7th printing formatting 1. Wk 1 For this exercise, students will...

Tanaya answered on Mar 10 2021
142 Votes
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here