Categories
Telecommunications Engineering homework help

Discuss and share your thoughts on the evolution of ieee standards and issues that come with securing wireless/mobile devices and or data.

Discuss and share your thoughts on the evolution of IEEE standards and issues that come with securing wireless/mobile devices and or data. You are welcome to discuss best practices and additional elements that help keep data secure discussed in chapters 10 and 11.

Categories
Telecommunications Engineering homework help

Mckillip, j. (july 2000).

To position yourself in the best possible way to succeed in your career field, you need to start researching your professional development now. As part of this, focus on the voluntary professional certifications (McKillip, 2000) your career field offers it’s professionals. First, consider what career you want to have. Second, visit Monster.com and search for jobs that relate to your career. Read thru several of the job postings and determine what voluntary professional certifications your industry recognizes and rewards professionally.
The career field I chose is cyber security analyst…
Submit an approx 250 word response in .doc or .rtf file format on a voluntary professional certification in or related to your career field. Grading will be based on:
– Topic coverage
– Personal reflection
– Correct APA format – citations, references, paragraph and double-spacing, etc.
– Writing standards
Reference
McKillip, J. (July 2000). Voluntary Professional Certifications: Requirements and Validation Activities. Society for Industrial and Organizational Psychology. Retrieved online 31 Jan 2011 from here.

Categories
Telecommunications Engineering homework help

Provide elaboration and detail in your answer.

Based on this weeks reading discuss how Risk Management is a critical element to the Security Systems engineering.  Provide elaboration and detail in your answer.

Categories
Telecommunications Engineering homework help

Read on to find out how they did it and what lessons you can take away for shoring up your organization’s defenses.

Security expert Chris Nickerson is often asked by clients to conduct penetration testing of their on-site security. Watch Nickerson and his team recently pull off a $24,000.
Nickerson and crew recently took on such an exercise for a client he describes as “a retail company with a large call center.” With some prep work, Nickerson says the team was able gain access to the company’s network and database quite easily. Read on to find out how they did it and what lessons you can take away for shoring up your organization’s defenses.
Social engineering: Anatomy of a hack

Categories
Telecommunications Engineering homework help

Based on your understanding of securing your environment, what are some of the common safeguards your recommend to ensure trust is viable in your organization.

In Chapter 3 the word “Trust” is defined as related to information security.  Based on your understanding of securing your environment, what are some of the common safeguards your recommend to ensure trust is viable in your organization.
Example: USE ONLY AS EXAMPLE
Hello everyone, 
This week we are discussing trust and how is it best defined in relation to information security. Throughout my time in the military, I have heard the phrase, “special trust and confidence” more times than I can count to include during each promotion ceremony for myself or other military members. This phrase is included due to the trust that senior leadership is giving to those promoting service members as they take on additional responsibility and management roles. Additionally, for Federal, State, and Department of Defense employees that require a security clearance to perform certain duties, a similar phrase can be found due to the need to appropriately safeguard information for the sake of national security. While much of the responsibility falls on the individual to remain “trustworthy”, a certain percentage of responsibility must also fall on the company or entity that issues such trust, in the event the trust in the person is either misplaced or misjudged. Therefore, other mechanisms must be set in place to limit the potential for damage in the event an individual is deemed not to be trustworthy. Some common examples include physical security mechanisms such as the use of multi-factor authentication, high-security locks, intrusion detection systems, and the practice of securing any and all sensitive information in safes. (Jacobs, 2015) Additional safeguard include deterrence methods such as administrative policies and having employees sign acceptable use policies. For access to classified or sensitive information, one such safeguard method we learned about in the week one reading was the utilization of the Bell-LaPadula model, of which employed the “no write down, no read up approach”. (Jacobs, 2015) Other safeguard methods include the use of rule-based, role-based, and access control lists to limit the potential for not-trustworthy actions to occur. There is also asymmetric encryption, which utilizes both a public and a private key for the sender and receiver. (Jacobs, 2015)
-Chris
Reference: 
Jacobs, S. (2015). Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons, Incorporated.

Categories
Telecommunications Engineering homework help

Identify relations, contradictions, gaps, and inconsistencies in the literature.

Instructions
Research Paper: Use the Ideal Paper attached
Submit a research paper based on your week 4 Idea Paper. The final paper should be at least 5 pages not including cover page and references.  Paper organization will include:
Introduction: Clearly define the problem or issue. Starts out broad and becomes more and more specific.
Body: Present the relevant literature and ideas. Identify relations, contradictions, gaps, and inconsistencies in the literature. Possible solutions to any problem(s) identified.
Conclusion
References (at least ten).

Categories
Telecommunications Engineering homework help

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.

Categories
Telecommunications Engineering homework help

Engineering information security: the application of systems engineering concepts to achieve information assurance.

Week 2 Discussion – Question #2 
As the demand for systems and applications continue to grow, organizations are striving to get things correct the first time as barriers are high and alternatives are plentiful.  Review the elements systems engineering discussed in Chapter 2 and select the most critical element and one you see commonly overlooked.
Use only as example!
Example:
Hello class,
I hope this week finds you all doing well. This week we are discussing the elements of system engineering. I will admit I have not delved into the systems engineering process in my previous studies too extensively before this course. From my previous life experiences though I would have to be one of the more critical steps that is often overlooked would be the process of investigating alternative solutions (Jacobs, 2015). I know it sounds like this should be something done all of the time, but I know from what little project experience I do have people tend to focus in on one main plan and not want to budge. Meanwhile an alternative solution could make the system implementation go much smoother, or there are more cost effective options available to the team. In reality this task is paired with another in our reading which seems to walk hand in hand and that is modeling the system (Jacobs, 2015). By modeling the system the systems engineers can lay out a roadmap of the system, and see where potential alternatives may be helpful.
By investigating alternative systems, and modeling each one the systems engineers can lay out each of the models and see the value of each in different functionality areas, as well as lay out the cost of the individual models, and performance based information. This side by side comparison of alternatives will allow the management to decide which option is the best fit overall and thus save time in the long run by not having to continuously go back to the drawing board as they say. In the words of this week’s reading exploring the alternatives will help examine the performance, cost-benefit, and trade-off analysis for each of the alternative designs (Jacobs, 2015). I thought the reading from this week was extremely interesting, and I am working a bit ahead because of my operational requirements while deployed, but I look forward to reading what you all have to say about the reading. Best of luck to you all.
Mike
References
Jacobs, S. (2015). Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons, Incorporated.

Categories
Telecommunications Engineering homework help

Select an accrediting body to ensure ia is not only a process but a part of organizational culture going forward

Instructions
Compose a 1-page well documented paper that proposes your plan on the paper. Your proposal should be based on the following scenario.
Heavy Metal Engineering (HME), a manufacturing organization that creates metal shell casings for very high-end washer and dryer products has suppliers and customers world-wide, as well as world-wide offices. HME the US Corporate office in NY hires you as a professional Information Assurance consultant.
HME is looking to receive some significant third party funding for an international joint venture but was told they would be denied because they do not have any kind of Information Assurance plan to keep all data assets secure. You are required to create a comprehensive IA strategy that includes the following:
A detailed overview of what Information Assurance entails covering all the basics for an IA strategy (what will be protected and from what)
A plan or strategy for IA implementation including a framework
A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.
Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward
An incident response and disaster recovery plan in the event of intrusion and disaster
All sections should be clearly labeled and a separate section in each area specifically for justifications of your selection/proposal.
Your thoughts must be solidified with viable sources consistent with graduate level work. No more than 2 sources may be used with ND or no author. Scholarly and Peer reviewed sources are expected to be used throughout the bulk of this paper.

Categories
Telecommunications Engineering homework help

Provide examples.

DNS
Network activity can be classified as normal, suspicious, or malicious. How is network activity differentiated? Provide examples.