Category Archives: CIS 341 Complete Class Solution

Need help with your exams and quizzes?

Visit www.hwgala.com

search through our website for Exams and Quizzes Solutions, Assignments and Discussion Questions and ACE your class.If you cannot find what you are looking for, email us at
writersorg@gmail.com

CIS 341 Week 8 Assignment 2 – Strayer University New

CIS/341 Week 8 Assignment 2 – Strayer
Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-341-Assignment-2-Strayer-NEW-CIS341A2.htm

 

Assignment 2: Identifying Potential Risk, Response, and Recovery
Due Week 8 and worth 75 points
In Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities, you were recently hired as an Information Security Engineer for a videogame development company. After viewing a growing number of reports detailing malicious activity, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. He asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After review of your report, the CIO requests that you develop a follow-up plan developing a strategy for dealing with all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk previously identified.
Write a four to five (4-5) page paper in which you:
1. For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
2. For each malicious attack and threat identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
3. For each vulnerability identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
4. For each vulnerability identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. 
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by 
organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

CIS 341 Week 1 – 11 Discussion Questions – Strayer University New

CIS/341 Discussion Questions Week 1-11
A Graded Solutions
Follow the link below to purchase CIS 341 Discussion Solutions

http://www.hwmojo.com/products/cis-341-discussion-questions

We have all assignments and case studies for CIS 341 and many other Strayer classes. Email us ewood6449@gmail.com if you need help. We can help you get A for your classes.

CIS 341 Week 1 Discussion 1

“Providing Security Over Data” Please respond to the following:
The CIA Triad offers three security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the means in which each of the three tenets are addressed to mitigate risk and enhance security in your chosen environment.
The use of mobile devices to create or access data has gained worldwide appeal and has obtained critical mass. From the e-Activity, summarize the attack and describe how you would mitigate the threat.

CIS 341 Week 1 Discussion 2

“The Changing World of Business” Please respond to the following:
The Internet has revolutionized how some businesses operate. From a security perspective, compare and contrast the brick-and-mortar business environment to an e-Commerce environment.
Considering your experiences, provide a detailed account of how a UC application was successfully used to solve a business challenge. If you do not have an example of a successful use, identify and explain in detail a situation where you believe the use of a UC application could have been used to solve a business challenge.

CIS 341 Week 2 Discussion 1

“Malicious Attacks” Please respond to the following:
In your own words, describe both DoS and DDoS attacks and provide an example that details an actual DoS or DDoS attack. Identify the threats and vulnerabilities from the example you provided and identify how they could have been mitigated.
The use of a Trojan horse or Trojan by an attacker to steal data or gain privileged remote access to a computer is on the rise. Provide in detail an example of the use of Trojans for malicious purposes. Identify threats and vulnerabilities that could allow the execution of a Trojan horse attack and identify how they could have been mitigated.

CIS 341 Week 2 Discussion 2

“Risk Management” Please respond to the following:
With regards to risk-response planning, there are four responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Contrast each of these responses and develop a unique scenario supporting each.
In recent years, the need for business continuity plans and disaster recovery plans has become a high priority for organizations of all sizes. Examine the importance of business continuity and disaster recovery plans, citing examples of each used in practice.

CIS 341 Week 3 Discussion 1

“Access Control” Please respond to the following:
Compare and contrast physical access controls and logical access controls. Further explain how both physical and logical access controls are related to implementing a security policy.
Compare and contrast discretionary access control and mandatory access control. Additionally, choose a business sector and identify which access control method you would institute and why it would be your choice.

CIS 341 Week 3 Discussion 2

“Security Administration” Please respond to the following:
From the e-Activity, summarize the ethical dilemma and describe how you would mitigate the vulnerability.
Explain the role of operations and administration in the effective implementation of a security policy and assess how security policies assist management with respect to communicating the organization’s security tone and culture. Additionally, include the importance of security policies to management and overall organizational security.

CIS 341 Week 4 Discussion 1

“Security Monitoring” Please respond to the following:
Considering your place of employment or your home computing environment, discuss in detail how in-depth (or layered defense) is employed to enhance security in your chosen environment.
Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one example identifying when one would be more appropriate to use than the other.

CIS 341 Week 4 Discussion 2

“Security Testing” Please respond to the following:
Compare and contrast the three categories of security testing methods. Additionally, develop a unique scenario for each of the testing categories and identify why your choice is the best test for the scenario you created. Justify your choice.
A testing road map may include both vulnerability testing and penetration testing. Compare and contrast vulnerability testing and penetration testing, and provide an example of each.

CIS 341 Week 5 Discussion 1

“Risk Management ” Please respond to the following:
Provide and explain two examples of emerging information technology security threats, common response techniques, and the steps required to recover from the attack if it was successfully executed against your organization.
Compare and contrast qualitative risk analysis and quantitative risk analysis, and provide examples identifying a situation when each would be useful.

CIS 341 Week 5 Discussion 2

“Mitigating Risk” Please respond to the following:
Provide and explain an example of an information technology security threat. Analyze how administrative, detective, preventative, and corrective could be used to mitigate the threat.
A Business Impact Analysis (BIA) determines the extent of the impact that a particular incident would have on business operation over time. Identify and provide examples of how people, systems, data, and property will impact a BIA.

CIS 341 Week 6 Discussion 1

“Cryptography” Please respond to the following:
Compare and contrast transposition ciphers and substitution ciphers. Provide one example of each. Outline how the cipher was used and analyze the vulnerabilities of each cipher.
Develop a unique scenario that requires encryption, select the appropriate method (symmetric, asymmetric, or a combination), and justify your choice.

CIS 341 Week 6 Discussion 2

“Cryptography in Practice” Please respond to the following:
It is not uncommon for two or more organizations to collaborate to develop or enhance a product offering. Considering the shared data is extremely sensitive and must be top secret at all costs, formulate a possible solution with consideration to symmetric or asymmetric cryptography and describe the advantages and disadvantages of any solution employed.
The introduction of wireless networks has offered the availability of high throughput communications without the expense of a cabled network. However, this convenience comes at the cost of potentially reduced security. Formulate a possible encryption solution with consideration to WEP, WPA, WPA2, and 802.11i, and describe the advantages and disadvantages of any solution employed.

CIS 341 Week 7 Discussion 1

“Network Security Devices” Please respond to the following:
Select one layer of the OSI model and identify and discuss two vulnerabilities that exist within the layer you selected. Additionally, identify at least one control within the same layer designed to mitigate the identified vulnerability.
From the first e-Activity, discuss why you chose that specific firewall and how it can be incorporated into an enterprise network to enhance security.

CIS 341 Week 7 Discussion 2

“Securing of Network Traffic” Please respond to the following:
Identify and discuss the importance of Virtual Private Networks (VPN) with regard to securing remote network traffic.
Despite the importance of organizational networks, there are countless examples of network breaches. From the second e-Activity, explain the attack scenario and identify at least one control that could have mitigated the threat.

CIS 341 Week 8 Discussion 1

“The Impact of Malware” Please respond to the following:
Identify and discuss the fundamentals of computer viruses and how to mitigate the risks associated with computer viruses. Additionally, provide an example of a computer virus in the wild and discuss the documented damages caused.
Identify and discuss the fundamentals of computer spyware and how to mitigate the risks associated with spyware. Additionally, provide an example of computer spyware in the wild and discuss the documented damages caused.

CIS 341 Week 8 Discussion 2

“Attack Prevention Tools and Techniques” Please respond to the following:
Honeypots and are sacrificial hosts and services deployed on the perimeter of a network to monitor potential hacking activity. Discuss the fundamentals of honeypots and honeynets and identify potential positive and negative consequences of deploying them.
The vast majority of corporate and home computers are connected to a computer network. Identify and discuss how network infrastructure defenses can be employed to mitigate the risk of attack.

CIS 341 Week 9 Discussion 1

“Security Standards” Please respond to the following:
A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security.
The Payment Card Industry Data Security Standard (PCI DSS) is an international standard developed to maintain security over payment card transactions. Analyze a minimum of two provisions of the PCI DSS standard. In your discussion of the two provisions, analyze how the provisions assist in maintaining security over the payment card transaction.

CIS 341 Week 9 Discussion 2

“Information Security Education and Training” Please respond to the following:
Compare and contrast certificate programs and post-secondary degree programs.
Considering the different methods and levels of education and training and professional certifications available, develop an individual development plan that will assist you in meeting your information systems security goals.

CIS 341 Week 10 Discussion 1

“Professional Certifications” Please respond to the following:
Describe the information system job that you would like to hold. Identify which certifications you will need or will be helpful to perform the job and explain your reasoning.
Explain why you should not measure your value or abilities only by the number of certifications you hold.

CIS 341 Week 10 Discussion 2

“Compliance Laws” Please respond to the following:
From the e-Activity, describe the situation where the company was noncompliant and the ramifications to the company and the stakeholders.
Describe the steps and actions that should have been taken in order to maintain compliancy with the law.

CIS 341 Week 11 Discussion 1

“Course Takeaway” Please respond to the following:
Share two new insights about networking security fundamentals you have discovered from this course.
Explain how this type of course is essential for every network security professional.

CIS 341 Week 11 Discussion 2

“Course Wrap-up” Please respond to the following:
Explain five or more key topics discussed during this course that you would like to teach a friend who has a minimal level of information systems security knowledge.
Discuss how you can apply the learning outcomes of this course to your professional and personal life.

CIS 341 Week 10 Technical Project Paper – Strayer University NEW

CIS/341 Week 10 Technical Project Paper – Strayer

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-341-Week-10-Technical-Project-Paper-Strayer-NEW-CIS341TP.htm

 

Technical Project Paper: Information Systems Security
Due Week 10 and worth 110 points
You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified.
1) Firewall (1) 4) Desktop computers (4)
2) Windows 2008 Active Directory Domain 5) Dedicated T1 Connection (1) Controllers (DC) (1)
3) File Server (1)
Write a ten to fifteen (10-15) page paper in which you:
1. Identify and analyze any potential physical vulnerabilities and threats that require consideration.
2. Identify and analyze any potential logical vulnerabilities and threats that require consideration.
3. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy.
4. Identify all potential vulnerabilities that may exist in the documented network.
5. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.
6. For each physical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
7. For each logical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
8. For each physical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
9. For each logical vulnerability and threat identified, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Explain the role of access controls in implementing a security policy.
• Explain how businesses apply cryptography in maintaining information security.
• Analyze the importance of network principles and architecture to security operations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

CIS 341 Week 8 Assignment 2 – Strayer University NEW

CIS/341 Week 8 Assignment 2 – Strayer

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-341-Assignment-2-Strayer-NEW-CIS341A2.htm

Assignment 2: Identifying Potential Risk, Response, and Recovery
Due Week 8 and worth 75 points
In Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities, you were recently hired as an Information Security Engineer for a videogame development company. After viewing a growing number of reports detailing malicious activity, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. He asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After review of your report, the CIO requests that you develop a follow-up plan developing a strategy for dealing with all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk previously identified.
Write a four to five (4-5) page paper in which you:
1. For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
2. For each malicious attack and threat identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
3. For each vulnerability identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
4. For each vulnerability identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. 
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by 
organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

CIS 341 Week 6 Case Study 2 – Strayer University NEW

CIS/341 Week 6 Case Study 2 – Strayer

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-341-Week-6-Case-Study-2-Strayer-NEW-CIS341W6C.htm

Case Study 2: Public Key Infrastructure
Due Week 6 and worth 50 points
You are the Information Security Officer at a small software company. The organization currently utilizes a Microsoft Server 2008 Active Directory domain administered by a limited number of over-tasked network administrators. The remainder of the organization comprises mostly software developers and a relatively small number of administrative personnel. The organization has decided that it would be in its best interest to use a public key infrastructure (PKI) to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, digital certificates would be used to sign software developed by the company to demonstrate software authenticity to the customer.
Write a two to three (2-3) page paper in which you:
1. Identify and analyze the fundamentals of PKI.
2. Analyze positive and negative characteristics of a Public and In-house CA.
3. Provide a sound recommendation for either a Public CA or an In-house CA.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
The specific course learning outcomes associated with this assignment are:
• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

CIS 341 Week 4 Assignment 1 – Strayer University NEW

CIS/341 Week 4 Assignment 1 – Strayer

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-341-Assignment-1-Strayer-NEW-CIS341A1.htm

Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Due Week 4 and worth 75 points
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 – Firewalls
2) 1 – Web / FTP server
3) 1 – Exchange Email server
4) 1 – Network Intrusion Detection System (NIDS)
5) 2 – Windows 2008 Active Directory Domain Controllers (DC)
6) 3 – File servers
7) 1 – Wireless access point (WAP) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five (4-5) page paper in which you:
1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.
4. Illustrate in writing the potential impact of all identified vulnerabilities to the network and the organization.
5. Include at least three (3) references (no more than 2-3 years old) from material outside the textbook.
Your assignment must follow these formatting requirements:
6. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
7. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by 
organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.