Describe how this ambiguity impacted your algorithm.

While creating your algorithm,did you find any of the requirementsto be ambiguous (e.g., unclear, inexact, open to interpretation)?

Identify one (1) such ambiguity. Provide the following:a. State a requirement which you feel has some ambiguity (use 1-3 sentences).

Describe how this ambiguity impacted your algorithm (use 1-3 sentences).

Did you compensate for this ambiguity in your algorithm (yes or no)?d. If you did, describe how you compensated. Or, if you did not compensate

Describe how you could compensate (either way, use 1-3 sentences).

Describe how data crawl techniques affect innformation system security.

Describe how data crawl techniques affect information system security

In this assessment, you are required to provide a complete report of your research topic, that you chose by completing the following aspects:

Highlighting the challenges/problems in your chosen research topic,

Identification of any gaps in the literature by: discussing areas/issues that you believe have been addressed in the current literature;

Highlighting areas/issues that have not been addressed or adequately addressed; and discussing your view(s) on the issue(s) that you see as being critical.

Summarize the future research directions based on the identified gaps.

What will the growth of your organization look like with respect to computer networking?

Network Design

Defined topics and questions for Write-up

Budget

How much are you planning to spend on the networks initial design?

How much do you want to spend on upgrading, and maintaining your network over the next 6 months?

Users

How many users do you expect on your network at a given time?

What type of credentials will each user need to gain network access?

Security

What software/hardware requirements do you need to keep your network secure?

What configurations will you use to maximize the security you put in place?

Organizational Growth

What will the growth of your organization look like with respect to computer networking?

As the organization expands, how do you plan on maintaining network reliability?

With the questions defined, write 1-2 pages explaining why you think it is important to establish and answer a set of network design questions prior to purchasing network equipment and installing it. You will need to be certain to include the subjects you discussed in Part A. Explain what you think are the benefits of going through this process. Explain the drawbacks (if any) of not doing this step.   For your write-up, include at least 2 reference sources for this assignment.

Write-up requirements:

1-2 page minimum (double-spaced)

Completed spell check

APA style references

Doc or .docx file

What are the main elements of a vulnerability management process,tailored to Mercury USA and the transportation sector?

Vulnerability Management Process Recommendation

In this section, present a recommended VM process for Mercury USA. Highlight the major VM process components as you learned in your studies. Explain how your recommendation meets the business needs of Mercury USA. Consider the transportation sector and the overall scenario in context. The text and questions below represent specifics to focus on while writing the memorandum. Do not include the specific text of the questions in your final submission.

What are the main elements of a vulnerability management process,tailored to Mercury USA and the transportation sector?

How will you plan for and define the scope of a VM process?

How will you identify the assets involved?

How will you scan and assess vulnerabilities?

What is/are the industry standard scanning tools? Support your findings.

What frequency of scanning do you recommend and why?

How will you report the results of scanning and recommended countermeasures?

Critically evaluate security technologies and the problems and issues with information security and risks and the current strategies for management to mitigate them.

Traditional KPIs or metrics for evaluating business risks are inefficient for understanding cyber risks

Critically evaluate various security technologies.

Evaluate and discuss risk control and risk management measures.

Word count 1,200 Assessment task details provide a description of the task“Traditional Key Performance Indicators (KPIs)or metrics for evaluating business risks are inefficient for understanding cyber risks”.

In light of the above statement,critically evaluate security technologies and the problems and issues with information security and risks and the current strategies for management to mitigate them, and write a report on your findings. Support your arguments and discussion with relevant examples and references.

The report should be 1200 words and show evidence of research in the available, relevant literature and you should use the IEEE referencing system, supplying full details of all references used.

Guidance: The purpose of the assignment is for you to conduct an in-depth investigation into information security and risk measures.

Discuss the role security has in the software development life cycle and how the inclusion of security in these processes might change the overall SDLC.

Software development and security

Attached module,explored the topics of software development and security, as well as,two different software development life cycles.

Discuss the role security has in the software development life cycle and how the inclusion of security in these processes might change the overall SDLC. Give reasons for your choices.

Provide support for those choices using sources from your textbook or the Saudi Digital Library to support your viewpoint.

In preparing your response, include at least three source from professional or academic literature such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.

How is big data being used?What recommendations would you make to the organization regarding other big data sources that should be used?

Big data sources

Consider an organization’s use of big data sources. Feel free to draw conclusions and examples from your own company or one in which you are familiar.

How is big data being used?What recommendations would you make to the organization regarding other big data sources that should be used? In response to your peers, discuss an additional recommendation based on their responses.

Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process.

Cybersecurity Strategy and Plan of Action

Building from those standards, guidelines, and practices, the Framework provides a common
taxonomy and mechanism for organizations to:

1) Describe their current cybersecurity posture 

2) Describe their target state for cybersecurity 

3) Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process

4) Assess progress toward the target state

5) Communicate among internal and external stakeholders about cybersecurity risk.

Describe a process of how an employee that cannot log in can be provided access.

Cloud Security

Questions

For this question,consider a solution where each of the devices approved by Vertika get an authentication token K, put on the device by Vertika’s IT department. Possession of this authentication token is a factor in authenticating to the cloud as an employee the other part is a valid username and password.

Would you consider this setup to be a cloud? Why (not)? half page

On a conceptual level,how would you authenticate an employee, using his/her username, password,and the
token on their device? With this approach, are you vulnerable to replay attacks, or people learning the value of K? Why (not)?

Can a disgruntled designer currently employed by Vertika enable a competitor to gain access to confidential files in particular,files that the disgruntled designer is authorised to access?

Describe a process of how an employee that cannot log in can be provided access.

What are key issues that the organization needs to consider from a legal,ethical,and policy standpoint?

Assessment Instructions

You must complete Assessment 1 before you can complete the other assessments in the course.If you have not yet done so, read the Integrated Action Learning Project description linked in the Resources under the RequiredResources heading.For this assessment, write a report for your selected organization’s integrated action learning project containing a solutions analysis, aneeds and risk analysis, and a legal and ethical analysis. Compile these three analyses into a report.

Solutions Analysis

This analysis addresses key questions related to your proposed solutions to your IT problem. The result should be a one- to two-pagesummary that answers the following questions:

What solutions do you propose?How do your solutions address the specific organizational problems that you have identified, and how do they address the keystakeholder concerns?

How are the solutions connected to global or domestic (or both) IT trends and solutions?

How does what you are proposing keep the organization in line with what is happening in the industry?

What model or architecture do you propose for your solution (or solutions)?

What technology or technologies do you recommend as part of the solution?

What are the specific IT principles that support your proposed solution?

What are key issues that the organization needs to consider from a legal,ethical,and policy standpoint?

What are risks associated with the solution (or solutions) proposed,and how might they be minimized?