Information Systems

Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can be used to provide a variety of very useful security services including digital signatures and non-repudiation.

As the CSO, you’ve been asked to brief the management team on how digital signatures and non-repudiation can be provided through a PKI and what the potential benefits to their use would be.

Research using the web to identify how digital signature and non-repudiation services can be provided under a PKI and what benefits these services and features could provide the company. Provide a set of talking points for use in briefing the management team.

Sample Solution

Information Systems

This is a field of constant change and challenges, and one that requires training and preparation. What steps do you think you will take to stay current in forensic investigation? How will an industry certification in Computer Hacking Forensic Investigation help your career? Are there any other certifications that could be useful in your career pursuits? List them with links to helpful resources you want to share with your classmates.

Sample Solution

Information Systems

Give an example when you might find steganography useful. Why you would consider using it instead of another type of encryption?

How and why do hackers leave the backdoor open for themselves? Use any current topic or article related to penetration techniques.

Sample Solution

Information Systems

Topic:

  1. Incident Management
  2. Access Management Primary focus should be on these steps.

STEP 7

As a team you may select a different game template or keep the same one from the one your team used in Part 1.

STEP 8

Each team member should do the research to discover the Objective, Scope, and Value of the selected process and function for their part of the project, part 2.

Objective of Incident Management

Objective of Access Management


Scope of Incident Management

Scope of Access Management


Value of Incident Management

Value of Access Management

STEP 9: Game name is “Pair Up” I’m the screenshots, link and sample PPT of this game.

Link: https://tekhnologic.wordpress.com/2016/12/27/10-powerpoint-games/

Just like part 1, each member should build the game with their selected knowledge process and function.

Sample Solution

Information Systems

Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.
Recommend methods organizations can use to address the challenges associated with BYOD policies.
Provide full citations and references, formatted according to Strayer Writing Standards.
For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.

Sample Solution

Information systems

Post: Please address the following in a properly formatted research paper:

What are mobile forensics and do you believe that they are different from computer forensics?
What is the percentage of attacks on networks that come from mobile devices?
What are challenges to mobile forensics?
What are some mobile forensic tools?
Should the analysis be different on iOS vs Android?

Sample Solution

Information Systems

Research and compare two significant international laws that relate to the practice of information security. What are the pros and cons of these laws? How are these laws relevant for today? Document your sources.

What are some challenges and associating methods used to protect against cybercrime today? Will these methods be relevant in the future? Why or why not? Support your answer using literature support. include intext citation.

Sample Solution

Information Systems

Present the effects of a cybersecurity incident on a company, including a discussion of related cybersecurity laws.

Research and select a case study of a company that has experienced a cybersecurity incident. The case study must be from within the last two years.

Create a PowerPoint presentation (10-12 slides) using the company from the case study and include the following:

Description of the company and cybersecurity incident, including a link to the case study.
Discussion of any cybersecurity laws that have been violated and potential effects on the company.
Explanation of recommendations to the stakeholders regarding the action that should be taken to address the effects of the cybersecurity incident.
Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style.

Sample Solution

Information Systems

This week, you will finalize your presentation from Wk 5 by designing a deployment plan to promote your innovation project to the executive team of your organization.

Create a 10- to 15-slide presentation to add to your Wk 5 individual assignment.

Prepare an introduction or executive summary.

Develop a deployment strategy and schedule for introducing the innovation project to the market.

Determine key go-to-market considerations, which may include plans for:

Advertising
Marketing
Sales channels/distribution
Communications or promotion
Estimate the cost and analysis for:

Development or manufacturing
Delivery
Infrastructure and product support
Estimate high-level financial considerations, including the potential size of the market for the company and profitability.

Justify the innovation investment.

Determine alternative investments or a non-investment (i.e., what if the executive team disapproves the project?).

Determine future product plans, evolution, etc. (e.g., what’s next for this product in the market?).

Conclude with a recommendation or call-to-action statement.

Sample Solution