Category Archives: CIS 502 Complete Class Solution

Need help with your exams and quizzes?

Visit www.hwgala.com

search through our website for Exams and Quizzes Solutions, Assignments and Discussion Questions and ACE your class.If you cannot find what you are looking for, email us at
writersorg@gmail.com

CIS 502 Week 11 Discussion Questions

CIS 502 Week 11 Discussion Questions – Strayer

Click On The Link Below to Purchase:
http://www.hwmojo.com/products/cis-502-week-11-discussions

 

Week 11 DQ 1
“Course Conclusion” Please respond to the following:
• You have just completed 10 weeks of a security management course. Imagine you have been asked to create a one-day training course highlighting the important elements of what you have just learned in the past 10 weeks.

o Create a hierarchy of five (no more or no less) of the most important topics that you believe need to be addressed in this one-day course that best fits the course title of “Theories of Security Management: The Essentials Presented in One Day.” Give a detailed rationale for each of the five topics.

Week 11 DQ 2
“Course Summary” Please respond to the following:
• Using 140 characters or less (the length of a Tweet), summarize the importance of this class to someone unfamiliar with the concepts.
• Discuss how you can apply the learning outcomes of this course to your professional and personal life.

CIS 502 Week 11 Discussion Questions – Strayer University New

CIS/502 Week 11 Discussion Questions – Strayer New

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-502-Week-11-Discussion-Questions-Strayer-New-CIS502W11D.htm

 

Week 11 DQ 1
“Course Conclusion” Please respond to the following:
• You have just completed 10 weeks of a security management course. Imagine you have been asked to create a one-day training course highlighting the important elements of what you have just learned in the past 10 weeks.

o Create a hierarchy of five (no more or no less) of the most important topics that you believe need to be addressed in this one-day course that best fits the course title of “Theories of Security Management: The Essentials Presented in One Day.” Give a detailed rationale for each of the five topics.

Week 11 DQ 2
“Course Summary” Please respond to the following:
• Using 140 characters or less (the length of a Tweet), summarize the importance of this class to someone unfamiliar with the concepts.
• Discuss how you can apply the learning outcomes of this course to your professional and personal life.

CIS 502 Week 9 Assignment 3 – Strayer University New

CIS/502 Week 9 Assignment 3 – Strayer New
Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-502-Assignment-3-Strayer-New-CIS502A3.htm

 

Assignment 3: Cybersecurity
Due Week 9 and worth 50 points
Cybersecurity is such an important topic today and understanding its implications is paramount in the security profession. Compliance, certification, accreditation, and assessment are critical in understanding the legal and ethical procedures to follow as a security professional. In support of cybersecurity initiatives, the National Initiative for Cyber Security Education (NICE) has published several initiatives in regard to protecting national security. The following document titled, “National Initiative for Cybersecurity Education”, located at http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce- Framework-Summary-Booklet.pdf, will be used to help you complete the assignment.
Write a three to five (3-5) page paper in which you:
1. Examine the National Initiative for Cyber Security Education and describe the initiative.
2. Assess the value of the NICE framework. Discuss the importance of this framework in regard to 
the security profession and individual organizations.
3. Suggest three (3) examples that illustrate the importance of the National Initiative for Cyber Security Education initiative.
4. Describe the expected outcomes of this initiative.
5. Evaluate how organizations can implement the NICE framework to prevent internal and external attacks.
6. Determine how the NICE framework addresses the legal and ethical issues in the field of information security.
7. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
 Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
 Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
The specific course learning outcomes associated with this assignment are:
 Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks.
 Describe the legal and ethical issues inherent in information security.
 Use technology and information resources to research issues in security management.
 Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

CIS 502 Week 8 Discussion Questions – Strayer University New

CIS/502 Week 8 Discussion Questions – Strayer New

Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-502-Week-8-Discussion-Questions-Strayer-New-CIS502W8D.htm

 

Week 8 DQ 1
“Physical Security” Please respond to the following:
• From the e-Activity, identify three physical security measures the organization uses to secure the organization’s assets. Explain how physical security adds protection to defense-in-depth.
• Imagine a local financial company just expanded its operations into five branches connected over a broadband network connection. The company has expanded rapidly due to customer demand and has not implemented any security measures. Differentiate physical security from logical security and recommend a list of security measures for the local financial company. Justify each security measure you recommend.

Week 8 DQ 2
“Environment Security” Please respond to the following:
• Imagine you are the CISO of a small company that has experienced fire incidents in the computer room and lost several important computer assets. Determine the environmental security measures you would recommend. Justify your response.
• From the e-Activity, evaluate the effectiveness of the physical and environmental security measures used by the organization you researched in regard to protecting the organization’s assets. Cite all sources.

CIS 502 Week 8 Case Study 4 – Strayer University New

CIS/502 Week 8 Case Study 4 – Strayer New
Click On The Link Below to Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-502-Week-8-Case-Study-4-Strayer-New-CIS502W8C.htm

 

Case Study 4: Remote Access Attacks
Due Week 8 and worth 100 points

TAPE LIBRARY
Remote Tape Library
BLDG 3
4-Windows PC
Ethernet
Router
Firewall
3-CISCO IDS Sensors

28-Windows PC
Ethernet
BLDG 4
30-Windows PC
Ethernet
BLDG 2
Main Bldg
10-Terminals 40 Windows PCs
ROOM 10

10-Terminals
RADIUS SERVER
Firewall

VPN Server
WEB Server
IDS Monitor
2-File Servers UNIX SYSTEM V
Ethernet
8-DISK DRIVES
4-Tape drive

System 1000
Quick Finance Company Network Diagram
Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional.
Write a five to eight (5-8) page paper in which you:
1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy.
2. Analyze the above case and network diagram, and describe how each access point is protected or unprotected.
3. Evaluate and describe the vulnerabilities of the Quick Finance Company’s network based on the network design.
4. Rank the top three (3) most likely network-based attacks in the order they are likely to occur and suggest countermeasures for each.
5. Recommend mitigation procedures to reduce or eliminate business interruptions.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
 Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
 Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 
The specific course learning outcomes associated with this assignment are:
 Describe the details and the importance of application security models and their implementation from a management perspective.
 Explain access control methods and attacks.
 Compare and contrast network-based attacks and countermeasures.
 Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved.
 Use technology and information resources to research issues in security management.
 Write clearly and concisely about the theories of security management using proper writing 
mechanics and technical style conventions.

CIS 502 Week 7 Case Study 3 – Strayer University New

CIS/502 Case Study 3: Mobile Devices Security
Click hwmojo.com link below to purchase A graded assignment

http://www.hwmojo.com/products/cis502-case-study-3

We have all assignments, case studies, exams and discussions for CIS 502 and other classes. Visit our website www.hwmojo.com or email us at support@hwmojo.com

CIS 502 Case Study 3: Mobile Devices Security
Due Week 7 and worth 100 points
The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware.
Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf.
Write a five to eight (5-8) page paper in which you:
1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report.
2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices.
3. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices.
4. Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this.
5. Several challenges of controlling information online are set forth in the section of the article titled, “Controlling Information Online – A New Frontier in Information Security”. Determine what you believe is the greatest challenge in regard to controlling information online.
6. Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• €Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• €Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 502 Week 4 Case Study 2 – Strayer University New

CIS/502 Case Study 2: Social Engineering Attacks and Counterintelligence
Click hwmojo.com link below to purchase A graded assignment

http://www.hwmojo.com/products/cis502-case-study-2

We have all assignments, case studies, exams and discussions for CIS 502 and other classes. Visit our website www.hwmojo.com or email us at support@hwmojo.com

CIS 502 Case Study 2: Social Engineering Attacks and Counterintelligence
Due Week 4 and worth 100 points
Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at
http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo.
Write a five to eight (5-8) page paper in which you:
1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs.
2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks.
3. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures.
4. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• €Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• €Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 502 Week 3 Case Study 1 – Strayer University New

CIS/502 Case Study 1: Advanced Persistent Threats Against RSA Tokens
Click hwmojo.com link below to purchase A graded assignment

http://www.hwmojo.com/products/cis502-case-study-1

We have all assignments, case studies, exams and discussions for CIS 502 and other classes. Visit our website www.hwmojo.com or email us at support@hwmojo.com

CIS 502 Case Study 1: Advanced Persistent Threats Against RSA Tokens
Due Week 3 and worth 100 points
Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents:
• €“APT Summit Findings” located in the online course shell
• €“RSA Security Brief” located in the online course shell 
Write a five to eight (5-8) page paper in which you:
1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system.
2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why.
3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization.
4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• €Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• €Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 502 Week 9 Assignment 3 – Strayer University New

CIS/502 Assignment 3 Cybersecurity
Click hwmojo.com link below to purchase A graded assignment

http://www.hwmojo.com/products/cis502-assignment-3

We have all assignments, case studies, exams and discussions for CIS 502 and other classes. Visit our website www.hwmojo.com or email us at support@hwmojo.com

CIS 502 Assignment 3: Cybersecurity
Due Week 9 and worth 50 points
Cybersecurity is such an important topic today and understanding its implications is paramount in the security profession. Compliance, certification, accreditation, and assessment are critical in understanding the legal and ethical procedures to follow as a security professional. In support of cybersecurity initiatives, the National Initiative for Cyber Security Education (NICE) has published several initiatives in regard to protecting national security. The following document titled, “National Initiative for Cybersecurity Education”, located at http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce- Framework-Summary-Booklet.pdf, will be used to help you complete the assignment.
Write a three to five (3-5) page paper in which you:
1. Examine the National Initiative for Cyber Security Education and describe the initiative.
2. Assess the value of the NICE framework. Discuss the importance of this framework in regard to 
the security profession and individual organizations.
3. Suggest three (3) examples that illustrate the importance of the National Initiative for Cyber Security Education initiative.
4. Describe the expected outcomes of this initiative.
5. Evaluate how organizations can implement the NICE framework to prevent internal and external attacks.
6. Determine how the NICE framework addresses the legal and ethical issues in the field of information security.
7. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• €Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• €Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 502 Week 6 Assignment 2 – Strayer University New

CIS/502 Assignment 2: Critical Infrastructure Protection
Click hwmojo.com link below to purchase A graded assignment

http://www.hwmojo.com/products/cis502-assignment-2

We have all assignments, case studies, exams and discussions for CIS 502 and other classes. Visit our website www.hwmojo.com or email us at support@hwmojo.com

CIS 502 Assignment 2: Critical Infrastructure Protection
Due Week 6 and worth 50 points
Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.
The following documents titled, “National Infrastructure Protection Plan”, located at http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf, and “Critical Infrastructure Protection”, located at http://www.gao.gov/assets/590/587529.pdf, may be used to complete the assignment.
Write a three to five (3-5) page paper in which you:
1. Examine the Department of Homeland Security’s: a. mission 
b. operations
c. responsibilities
2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets.
3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure.
4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure.
5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion.
6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• €Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• €Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.