Case Study: Information Security Risk Assessment – Answer Sheet

Case Study: Information Security Risk Assessment – Answer Sheet

 

 

Table-1

AssetsVulnerabilitiesThreatsProbability (the numerical value)Impact

(the numerical value)

Risk

(the numerical value)

Risk = Probability x Impact

 

 

 

     
 

 

 

     
 

 

 

     

 

 

Probability (the numerical value)Your Justification (Why you assigned that value for the probability)
  
  
  

 

 

Impact (the numerical value)Your Justification (Why you assigned that value for the impact)
  
  
  

 

 

 

Table-2

Definition of RiskPriorityRisk Response (Risk Acceptance, Risk Mitigation, Risk Avoidance, Risk Transfer, etc.)
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat> 

Match policies, standards, procedures, and guidelines described in Chapter-5 with the security roles described in Chapter-6. There are two sample rows. Fill out five extra rows similarly.

NAME:

TODAY’S DATE:

ISEC 610 Homework 2

Question 1

Match policies, standards, procedures, and guidelines described in Chapter-5 with the security roles described in Chapter-6. There are two sample rows. Fill out five extra rows similarly.

Document exampleSecurity roleDescription of the relationship
IDS/IPS maintenance/monitoring procedureSecurity Engineer (SE)SE develops this procedure. SE performs IDS/IPS maintenance and monitoring according to this procedure. SE is responsible for updating this procedure.
Organization-wide security policiesSecurity Director (SD)SD manages the development and implementation of global security policies
   
   
   
   
   

 

Question 2 – Weekly learning and reflection

In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically not just about what was presented but also what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities,

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

This is a required assignment, worth 100 points, and must be submitted by the due date. Late assignments will not be accepted.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Submit your Practical Connection Assignment here.

Research Paper: Microsoft Software Development Security

Research Paper: Microsoft Software Development Security

Overview

The purposes of this assignment is:

1) To analyze and inspect main components of Microsoft SDLC (Secure Development Lifecycle Process).

2) To describe and explain security features and essential security configuration of Microsoft .NET framework and ASP.NET.

Research

Please refer to following resources to complete this project:

· Textbook Chapter 26 and Chapter 29

· SDLC: https://www.microsoft.com/en-us/securityengineering/sdl/practices

· .NET: https://docs.microsoft.com/en-us/dotnet/standard/security/

· .NET:https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/DotNet_Security_Cheat_Sheet.md

· ASP.NET: https://support.microsoft.com/en-us/help/891028/asp-net-security-overview

· Other resources you find

Write

Part 1: Microsoft SDLC Practices

· Carefully review the Microsoft SDLC page.

· Prepare a 250-300 word overview of the Microsoft SDLC practices. Summarize all 12 of the practices in SDLC.

· Select one of the following practices. In one paragraph, research and summarize available tools in the market:

· Practice #4 – Threat modeling

· Practice #9 – Perform Static Analysis Security Testing (SAST)

· Practice #10 – Perform Dynamic Analysis Security Testing (DAST)

· Practice #11 – Perform Penetration Testing

Part 2: .NET Security Guidelines

Describe essential items in a.NET security guidelines in 150-200 words. Use the textbook, Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.

 

Part 3: ASP.NET Security Guidelines

Describe essential items in a ASP.NET security guidelines in 150-200 words. Use the textbook, Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.

write a 1.5 page research hypothesis based on the proposed project attached. Include several references. 

write a 1.5 page research hypothesis based on the proposed project attached. Include several references.

this is the data i will be using for machine learning.

https://www.kaggle.com/datasets/saurabhbagchi/credit-card-fraud-detection

Theoretical Project

Theoretical Project

 

 

 

Name of Student

Instructor

Institution

Course

Date

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Theoretical Project

Fraud Detection System Using Machine Learning

Fraud Detection through Machine Learning enables the system users to run an automated transaction processing on the dataset. The involved Machine Learning model detects all potential fraudulent activities and flags. The fraud detection system using Machine learning remains the future for fraud detection in every financial institution since the ancient rules-based fraud detection systems have failed in their detection role since they cannot align with current technological advancements.

The Project Idea

The primary idea of this project is to facilitate self-learning to enable the system to adapt to new, unknown fraud patterns for detection. Unlike rules-based systems, this idea is based on machine learning, noting the fraudulent transactions that portray strange trends that are different from genuine ones. Machine learning algorithms detect the trends and can differentiate those between scammers and authentic customers (Akinbohun & Atanlogun, 2018). In the banking industry, this idea has successfully helped banks eliminate fraudulent transactions by fraudsters.

Furthermore, the implementation will immediately replace inconsistent and ineffective traditional fraud detection techniques. Over the past decades, banks, and other financial institutions have used rules-based systems associated with manual evaluation to detect fraud (Zhou et al., 2018). However, this project aligns with the current technology that has led fraudsters to increase in sophistication, such that the traditional systems cannot help anymore. The technology can assist machines in predicting and responding to suspicious activities in the system by fraudsters.

Work To Be Performed

This project’s primary task is collecting and clustering the previously recorded data for fraud prevention and risk management programs. The gathered data will include information regarding legitimate and fraudulent transactions (Mallidi & Zagabathuni, 2021). After collection, the data will have a ‘legitimate or fraudulent transactions or clients’ label.

After collection, the data will be used to “teach” the machine learning software to detect whether a specific client or transaction is fraudulent or legitimate. A successful fraud detection system will need to gather more data on fraud trends. This maximum data collection will have many examples that algorithms can learn for accurate detection (Mallidi & Zagabathuni, 2021). After training the machine learning algorithm, the software becomes specific to the transactions and is said to be ready for use in the fraud management model. Therefore, the work will primarily train the algorithm by subjecting it to as huge data as possible to learn the patterns and update it from time to time since it is not infallible.

The project manager, the bank director (project sponsor), bank employees, and the software developers are involved.

Literature Review Behind the Motivation for Doing Project

According to Yee et al. (2018), the dominance of online-related transactional activities has raised fraudulent incidences worldwide. These activities have contributed to considerable losses to individuals and the banking sector. Despite the presence of multiple cybercrime practices within the banking sector, credit card fraudulent activities dominate, making online customers vulnerable to losing their money. Therefore, Yee et al. (2018) demonstrate that preventing fraud activities via a machine learning and data mining is a crucial strategy for eliminating illegal monetary acts. Initially, data mining approaches played a critical role in studying the trends and characteristics of legitimate and fraudulent transactions based on anomalies and normalized data.

 

 

References

Akinbohun, F., & Atanlogun, S. K. (2018). Credit Card Fraud Detection System in Commercial Sites. European Journal of Engineering and Technology Research, 3(11), 1-5.

Mallidi, M. K. R., & Zagabathuni, Y. (2021). Analysis of Credit Card Fraud Detection using Machine Learning models on balanced and imbalanced datasets. International Journal of Emerging Trends in Engineering Research, 9(7).

Yee, O. S., Sagadevan, S., & Malim, N. H. A. H. (2018). Credit card fraud detection using machine learning as data mining technique. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-4), 23-27.

Zhou, H., Chai, H. F., & Qiu, M. L. (2018). Fraud detection within bankcard enrollment on mobile device based payment using machine learning. Frontiers of Information Technology & Electronic Engineering, 19(12), 1537-1545.

Heath Information Technology Interoperability Report (Individual Assignment, 50 points)

Heath Information Technology Interoperability Report (Individual Assignment, 50 points)

Heath information technology (HIT) Interoperability is crucial for electronic health records (EHRs) to exchange data and for health care providers to access patients’ records. While many standards, such as those discussed in chapter 11, have been created to facilitate HIT interoperability, its development remains a work in progress. In this assignment, you need to research on HIT interoperability and write a report to answer the following questions.

  • What is interoperability and why is it important to Health IT? (1/3-1/2 page)
  • What is the current status of HIT interoperability? (1/2-1 page)
  • What are the challenges in achieving HIT interoperability and how to overcome them? (2/3 -1 page)
  • What are the nationwide initiatives in advancing HIT interoperability? (1/2 page)

Formats:

  • 2-3 pages in length (single spaced, 12 font); references list is excluded from the page count.
  • Provide appropriate sub-titles.
  • A complete list of references should be included at the end of your paper, following APA format.
  • Plagiarism is not acceptable and should be avoided.

Grading Rubric

CriteriaPoints
This report provides a critical review of HIT interoperability.20 points
This report is well-written, well-developed, covering all the questions.20 points
This report is well-organized following the report structure, using titles, headings, and numbering, appropriately.5 points
The report provides a complete list of references which is properly formatted using APA style.5 points

A final report which describes and documents your analysis and design efforts of the proposed solution. Your report must include at a minimum

A final report which describes and documents your analysis and design efforts of the proposed solution. Your report must include at a minimum

  • A brief description of the problem, functionality of your proposed information system solution, and the business benefits gained by implementing it.
  • Artifacts such as use case diagrams, activity diagrams, context level data flow diagrams, E-R diagrams, user interfaces etc. used in your information needs/requirements specification and the systems design.
  • List of the hardware and software required to meet the needs of your business problem.
  • A brief discussion on what kind of a project methodology do you envision to use to implement your proposed solution. Include in your discussion the possible project scope and risk issues, you may encounter.

Note: For 1st and 2nd bullet points, you can use your assignment work and add it to the report

Select a period to highlight at right. A legend describing the charting follows.

Book.xlsx

Sheet1

Project Planner
Select a period to highlight at right. A legend describing the charting follows.Period Highlight:1Plan DurationActual Start% CompleteActual (beyond plan)% Complete (beyond plan)
ACTIVITYPLAN STARTPLAN DURATIONACTUAL STARTACTUAL DURATIONPERCENT COMPLETEPERIODS
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899##################
Sprint 1 Initiation (Oct 14 – Oct 28)
Create Project Vision11517100%
Identify Scrum master and stakeholder11517100%
Form Scrum Team11575100%
Obtain Necessary Developmental and Managerial Approvals1157675%
Create Product Backlog1159750%
Sprint 2 Planning and Preparing (Oct 29 – Nov12)
Create deliverables161516150%
Choose overall software layout16151670%
Choose all the analytic tools to be implemented16151670%
Estimate tasks16151670%
Create user stories and tasks16152380%
Create sprint backlog16152380%
Sprint 3 Implementation (Nov 14 – Nov 28)
Create deliverables31153110%
Create tasks for newly raised issues31153110%
Conduct daily standup31153110%
Groom prioritized product backlog31153110%
Sprint 4 Implementation (Nove 29 – Dec 13)
Create deliverables46154610%
Create tasks for newly raised issues46154610%
Conduct daily standup46154610%
Groom prioritized product backlog46154610%
Sprint 5 Implementation (Dec 14 – Dec 28)
Create deliverables61156110%
Create tasks for newly raised issues61156110%
Conduct daily standup61156110%
Groom prioritized product backlog61156110%
Sprint 6 Review and Retrospect (Dec 29 – Jan 12)
Create and conducts necessary tests for de development team76157610%
Demonstrate and validate software76157610%
Request and evaluate team’s feedback on project execution76157610%
Provide accessed to the Dashboard to data analytics for review76157610%
Create and conducts necessary tests for de development team76157610%
Demonstrate and validate software76157610%
Request and evaluate team’s feedback on project execution76157610%
Sprint 7 Release (Jan 13 – Jan 27)
Ship Deliverables91159110%
Retrospect Project91159110%

Project Planning Phase.docx

 

 

Swift trade corp project plan

June 26, 2022

Baseline Project Plan

 

Scope Statement:

Project objective –

Develop a business intelligence dashboard to be used by the Analytics and Marketing departments to conveniently analyze data and present key insights in an easy-to-use and intuitive manner.

 

Justification for the project –

This project attempts to solve operational problems encountered by data analytics professionals at Swift Trade Corp. The business intelligence dashboard will facilitate the process of presenting data and other important business metrics important to the company’s performance.

 

Execution approach –

The Scrum framework will be utilized for this project. A team of nine collaborating individuals with targeted expertise will be organized and tasks will be shared among them. A Project Manager will lead this team to ensure efficient and timely deliveries.

The structure of the team will be as follows:

 

· 2 Software Developers

· 2 Full Stack Developers

· 2 Business Analysts

· 1 Statistician

· 2 UX Designer

· 1 Project Manager

 

 

Timeline –

Based on the specification of the job and other related past deliveries, this is predicted to be a short-term project, set to range between 3-4 months.

The project will begin on October 24, 2022. The time of completion for each consecutive sprint will be 2 weeks. Assuming no major implications were encountered, the release of the finished software to a production environment is scheduled to take place on January 16, 2023.

 

Timeline/SprintWorking Phase:Objectives
1st Sprint (Oct 14 – Oct 28)

 

Initiation· Create project vision

· Identify Scrum Master and stakeholder

· Form Scrum team

· Obtain Necessary Developmental and Managerial Approvals

· Create Product Backlog

2nd Sprint (Oct 29 – Nov 12)

 

Planning and Preparing· Create deliverables

· Choose overall software layout

· Choose all the analytic tools to be implemented

· Create user stories and tasks

· Estimate tasks

· Create sprint backlog

3rd Sprint (Nov 14 – Nov 28

4th Sprint (Nov 29 – Dec 13)

5th Sprint (Dec 14 – Dec 28)

Implementation· Create deliverables

· Create tasks for newly raised issues

· Conduct daily standup

· Groom prioritized product backlog

6th Sprint (Dec 29 – Jan 12)Review and Retrospect· Create and conduct necessary tests for the development team

· Demonstrate and validate software

· Request and evaluate team’s feedback on project execution

· Provide access to the Dashboard to data analytics for review

· Create and conduct necessary tests for the development team

· Demonstrate and validate software

· Request and evaluate team’s feedback on project execution

7th Sprint (Jan 13 – Jan 27)Release· Ship Deliverables

· Retrospect Project

 

 

 

Proposed System

Name of Software Offer: DashViz – A Business intelligence Dashboard with sophisticated tools for data exploration.

 

System development recommendation-

After an exhaustive investigation heavily focused on the business’ demands, the Information Systems team has provided its definite professional opinion. Developing the Business Intelligence Dashboard from the ground up, using a secure web-based approach appears to be the most suitable method.

This method of implementation provides the highest level of customization, which will be fitted to our business needs and allows for ease of access for both internal and external users to the application without the need to download any software.

 

 

Utilization Purposes-

The development of this dashboard will be heavily focused on the manipulation of data and visual, dynamic representation of the data types most used by Swift Trade Corp.

· Product data- Data displaying products features, important for supply chain, inventories, and pricing.

· Customer information data – This provides details about the customers buying from our website and their purchases.

· Sales data- Includes all the transactions for the current day and historic accountings. Used to optimize prices, predict demand, and develop a marketing plan.

 

Benefits of the Software-

· The Business intelligence dashboard will aid professionals to quickly gain insights into the most important aspects of their data

· Dashboards are vital for better decision making

· The Administration department, Managers and Stakeholders will benefit by reviewing the bigger picture of operations.

· The Marketing department will gain deeper insights into the market’s movement and take business decisions accordingly.

· managers to review the bigger picture of business operations

· Provides the ability to view real time financial results such as revenue and expenses.

 

Other Alternatives-

The team has weighed the alternatives, some of which include using existing out-of-the-box software which can be costly and lacks customizability, in some cases the risk of exposure of sensitive business data has been an important deciding factor. The alternative yielding the highest software efficiency and performance is the app-based approach, but there are known issues to this; Accessibility computers using different operating systems can be complex, employees report to use primarily use Windows as their operating System, but a significant number utilize MacOS and Linux which both have an Arm-based architecture compared to the x-64 x-86.

A backwards combability extension can be arranged, though it would drastically prolong the timeline for this project and compromises performance.

 

Feasibility Assessment

Ideas

A. cost estimates -> budget allocation and estimated expenditures will be included in a cost estimate table’

 

B. Intangible benefits

 

C. Technical

The only technical risk the company faces with the creation of the new dashboard is a security issue or bugs. There will be ongoing maintenance for the software which is to be included in the cost analysis.

 

D. Operational

All staff will be trained on the new dashboard to recognize their key performance indicators and management will coach everyone who is lacking in KPIs.

 

E. Inclusions/Exclusions

Marketing will gain insight into key performance indicators

 

 

Management Issues

Ideas

Team selection

Processing functions

Organizational

Constraints

Goals

Deadlines

 

Expectations/Assumptions

Mia, Paul and John are all of the software developers who will be creating the dashboard.

John will deal with the entire testing processes and will write and perform the test plans

 

Communications:

Successful communication will be ensured through communication management plans

Weekly Status reports of the project update will be generated for all stakeholders and upper management.

 

Exclusions from scope

Fake information about the corporation **Todelete

 

Name: Swift Trade Corp

 

About the company: E-Commerce company that focuses on selling a variety of products (ex. Amazon, Ebay)

 

Project begins: January 16, 2023.

Ends: Jan 13 – Jan 27)

 

 

Swift Trading Corp.

Project Charter

Prepared: June 26, 2022

Project Name: Project Plan

 

Project Manager: Jorge Alvarez

 

Customer: Analysis/Marketing

 

Project Sponsor: Erik Helms

 

Project Start/End (projected): 10/24/2022 – 1/16/2023

 

Project Overview:

This project will implement a business intelligence dashboard to allow the analytics and marketing departments to conveniently and efficiently analyze data and present key insights that will save the company time and effectively relay information.

 

Objectives:

· Solve operational problems

· Facilitate the data presentation process

· Facilitate other business metrics related to company performance

Key Assumptions:

· System will be built in house

· Interface will be a web browser

· Achieving the highest level of customization

· Allow access to internal and external users

· System will negate the need to download software

 

Stakeholders and Responsibilities:

StakeholderRoleResponsibilitySignatures
Jorge NarvaezProject ManagerPlanning, Monitoring, ExecutionJorge Narvaez
Erik HelmsMarketing DirectorMonitoring, ResourcesErik Helms
Jonathan GilesCIO (Chief Investment Office)Monitoring, ResourcesJonathan Giles
Erica WinsteadAnalytics DirectorSystem functionality, ResourcesErica Winstead

Artificial intelligence(AI) may result in a significant operating cost reduction

Artificial intelligence(AI) may result in a significant operating cost reduction

Artificial intelligence is a very important subjectnowadays, but not everyone understands the scale of its value for the business. Thus, the existing AI technology can increase the productivity of the business by 50%. With the help of AI learning, Netflix managed to save USD 1 billion in 2017. When a company is using AI, 34% of customers spend more money on their products and services. Apart from this, 49% are thinking about buying something from the company more often in case it uses AI. These facts should be enough to assure you that artificial intelligence can be very beneficial. And here are a few ways of how you can use AI to reduce costs, improve efficiency and make your business more successful.

Artificial intelligence can help to reduce the mistakes and improve the overall efficiency of your company. For example, for the above-mentioned issue, you can use an AI personal assistant. Using your calendar, it will schedule calls and meetings, send you reminders, and so on. The probability of a human error will be reduced significantly, which means that you won’t waste the budget on fixing mistakes. Moreover, you will be able to spend the time saved on something more important.

3D printing help to reduce costs and improve competitiveness in a manufacturing industry

3D printing makes it possible to assemble ideas at a faster pace. In some instances, it could be possible for 3D concepts to be designed and printed on the same day but in terms of large-scale manufacturing, it is certainly faster than conventional methods. This can help companies to reduce manufacturing time from months to days while ensuring that they remain ahead of their competitors.

Inspite the challenges, 3D printing will change the way of manufacturing

However, in the main, these are not challenges that cannot be overcome with some careful forward thinking and planning. The manufacturing industry is filled with competition and that means that these challenges are nothing more than hurdles to overcome. This is because the industry has to not only think about the technical benefits that 3D printing for manufacturing can bring, but also the value it can add to a business.

It is crucial that businesses do not only identify applications and parts that they can create with 3D printing, but their manufacturing strategy as a whole and how 3D printing should fit into that. This is down to the fact that the technology can enhance innovation and value to overall operations. So, it is not about finding products that fit the technology but ensuring that the technology suits the product and the company working model

ANSWER B

Challenges, which companies have to deal in Artificial intelligence, such are:

Requires financial investment and can be quite costly. Robots and other products of artificial intelligence replacing humans can become the cause of unemployment. Robots and other products of artificial intelligence do not possess such human qualities, as creativity or emotional intelligence.

Challenges, which companies have to deal in 3d printing, such as:

  • Manufacturing costs
  • (Lack of) Expertise
  • Software development and capabilities
  • Recyclability
  • The cost of the equipment
  • The materials available for your industry
  • Post processing needs

please type 300 words for summary above the passages