Shared Flashcard Set

Details

CIS 560 Complete Class
CIS 560 Complete Class, CIS 560 Week 1,CIS 560 Week 2,CIS 560 Week 3,CIS 560 Week 4,CIS 560 Week 5,CIS 560 Week 6,CIS 560 Week 7,CIS 560 Week 8,CIS 560 Week 9,CIS 560 Week 10,CIS 560 Week 11,
16
Computer Science
Post-Graduate
04/11/2018

Additional Computer Science Flashcards

 


 

Cards

Term

CIS 560 Week 1 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-1-discussion/

 

 

 

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

 

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

Definition

CIS 560 Week 1 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-1-discussion/

 

 

 

“Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

 

Think of an organization that you are familiar with.  Assume that you are the IT Manager concerned with access control.  Chose an area (I.e. Network, etc.) that you consider to be the most important with regards to access control. What is the biggest threat (other than the users themselves) for that area?  What would be some of your potential vulnerabilities in that area?  Explain your responses

Term

CIS 560 WEEK 2 DISCUSSION

 

 

 

https://hwacer.com/Tutorial/cis-560-week-2-discussion/

 

 

 

 

Acceptable Use Policy and Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.

I need specific items, not just a general discussion of the importance of the AUP.

 

(Hint: Not everything in an AUP is also part of Access Control.  I’m only concerned with what is associated with access control)

 

 

Definition

CIS 560 WEEK 2 DISCUSSION

 

 

 

https://hwacer.com/Tutorial/cis-560-week-2-discussion/

 

 

 

 

Acceptable Use Policy and Access Control”  Please respond to the following IN YOUR OWN WORDS:

 

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control.

I need specific items, not just a general discussion of the importance of the AUP.

 

(Hint: Not everything in an AUP is also part of Access Control.  I’m only concerned with what is associated with access control)

 

Term

CIS 560 Week 3 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-3-discussion/

 

 

 

 

Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

 

  1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
  2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.
Definition

CIS 560 Week 3 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-3-discussion/

 

 

 

 

Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

 

  1. Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
  2. The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.
Term

CIS 560 Week 4 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-4-discussion/

 

 

“The human aspect”  Please respond to the following:

 

  1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
  2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money.

 

Definition

CIS 560 Week 4 Discussion

 

 

https://hwacer.com/Tutorial/cis-560-week-4-discussion/

 

 

“The human aspect”  Please respond to the following:

 

  1. Assume that you have to hire someone who will have a high level of access in your company. What kinds of considerations should an HR person have when hiring someone like this?  Some organizations check your credit score.  Is that fair?
  2. What kinds of controls would you have in an accounting environment to avoid potential embezzlement?  Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money.
Term

CIS 560 WEEK 5 DISCUSSION

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-discussion/

 

 

 

 

CIS 560 WEEK 5 DISCUSSION

“Physical Security Access”  Please respond to the following IN YOUR OWN WORDS:

Assume you are interviewing for the position of IT Security Manager.  The Chief Security Officer hands you the case from our e-activity and asks you to suggest ways that the data center could have prevented the intruders from being able to enter the building. She also asks you to determine which of these methods is the most predictable and explain why.  What is your response?

Later in the interview, she asks you to propose some methods that could be applied to data protection even if assets like servers, laptop computers, and tablets were stolen. She asks you which of these methods you believe would be the most effective and why.  What is your response?

 

 

Definition

CIS 560 WEEK 5 DISCUSSION

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-discussion/

 

 

 

 

CIS 560 WEEK 5 DISCUSSION

“Physical Security Access”  Please respond to the following IN YOUR OWN WORDS:

Assume you are interviewing for the position of IT Security Manager.  The Chief Security Officer hands you the case from our e-activity and asks you to suggest ways that the data center could have prevented the intruders from being able to enter the building. She also asks you to determine which of these methods is the most predictable and explain why.  What is your response?

Later in the interview, she asks you to propose some methods that could be applied to data protection even if assets like servers, laptop computers, and tablets were stolen. She asks you which of these methods you believe would be the most effective and why.  What is your response?

 

 

Term

CIS 560 Week 6 Discussion

 

 

 

https://hwacer.com/Tutorial/cis-560-week-6-discussion/

 

 

 

 

“Enterprise Access Control”  Please respond to the following IN YOUR OWN WORDS:

Read the article in the e-Activity.  It suggests that many medical facilities may have been complacent about data security.  If your were a CSO (Chief Security Officer) or CCO (Chief Compliance Officer) of a facility that did not have good access controls, how would you bring your facility into compliance? What steps would you take?

Also, separately, explain whether you believe health care should or shouldn’t be accessible via mobile devices, and why or why not

 

Go to e-Week’s Website and read “Health Care Data Breaches Increase by 32 Percent: Ponemon Report”, located at http://www.eweek.com/c/a/Health-Care-IT/Health-Care-Data-Breaches-Increase-by-32-Percent-Ponemon-Report-233543/.

Definition

CIS 560 Week 6 Discussion

 

 

 

https://hwacer.com/Tutorial/cis-560-week-6-discussion/

 

 

 

 

“Enterprise Access Control”  Please respond to the following IN YOUR OWN WORDS:

Read the article in the e-Activity.  It suggests that many medical facilities may have been complacent about data security.  If your were a CSO (Chief Security Officer) or CCO (Chief Compliance Officer) of a facility that did not have good access controls, how would you bring your facility into compliance? What steps would you take?

Also, separately, explain whether you believe health care should or shouldn’t be accessible via mobile devices, and why or why not

 

Go to e-Week’s Website and read “Health Care Data Breaches Increase by 32 Percent: Ponemon Report”, located at http://www.eweek.com/c/a/Health-Care-IT/Health-Care-Data-Breaches-Increase-by-32-Percent-Ponemon-Report-233543/.

Term

CIS 560 WEEK 7 DISCUSSION

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-discussion/

 

 

 

 

 

Definition

CIS 560 WEEK 7 DISCUSSION

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-discussion/

 

 

 

 

 

Term

CIS 560 WEEK 8 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-560-week-8-discussion/

 

 

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

Definition

CIS 560 WEEK 8 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-560-week-8-discussion/

 

 

 

 

Access Control and VPN “ Please respond to the 2 of the following IN YOUR OWN WORDS:

 

  • Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.
  • Our text discusses concepts like identification, authentication, authorization, and accounting in the context of access control and policy. As an IT security manager, which of these would you likely focus on for your organization and why?
  • Encryption is a necessary security tool, but there is also overhead involved.   Again, as IT security manager, under what conditions should you be sure to use encryption as a security measure?

 

 

Term

CIS 560 WEEK 9 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-560-week-9-discussion/

 

 

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

 

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.
Definition

CIS 560 WEEK 9 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-560-week-9-discussion/

 

 

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.

‘Penetration Testing and Vulnerability Scanning” Please respond to the following:

 

 

 

  • In your own words, provide and explain at least 3 advantages and 3 disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.
Term

CIS 560 Week 5 Midterm Exam

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-midterm-exam/

 

 

 

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

Definition

CIS 560 Week 5 Midterm Exam

 

 

 

https://hwacer.com/Tutorial/cis-560-week-5-midterm-exam/

 

 

 

Midterm Exam: Chapters 1 through 8

 

 

CIS 560 Week 5 Midterm Exam

Midterm Exam: Chapters 1 through 8

 

 

 

Term

CIS 560 Week 11 Final Exam

 

 

 

https://hwacer.com/Tutorial/cis-560-week-11-final-exam/

 

 

 

 

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

 

Final Exam: Chapters 9 through 15

Definition

CIS 560 Week 11 Final Exam

 

 

 

https://hwacer.com/Tutorial/cis-560-week-11-final-exam/

 

 

 

 

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

Final Exam: Chapters 9 through 15

CIS 560 Week 11 Final Exam

 

 

Final Exam: Chapters 9 through 15

Term

CIS 560 Week 10 Term Paper

 

 

 

https://hwacer.com/Tutorial/cis-560-week-10-term-paper/

 

 

 

 

CIS 560 Week 10 Term Paper -The Human Element

 

Human nature is the single greatest vulnerability in any control system and cannot be ignored. Organizations should always take human behavior into account when designing access plans and strategies. Human beings can pose unintentional threats when they accidentally delete data. Hackers may be motivated by financial data when they attack a system or use social engineering skills to gain access to restricted data. Consider human nature and organizational behavior in this term paper.

Write an eight to ten (8-10) page paper in which you:

Propose five (5) techniques that organizations should apply to mitigate the threats arising from human nature.

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place.

Examine what an organization could possibly learn when a policy is implemented to observe personnel in an ongoing manner.

Propose five (5) best practices that you would use to handle human nature and organizational behavior.

 

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Definition

CIS 560 Week 10 Term Paper

 

 

 

https://hwacer.com/Tutorial/cis-560-week-10-term-paper/

 

 

 

 

CIS 560 Week 10 Term Paper -The Human Element

 

Human nature is the single greatest vulnerability in any control system and cannot be ignored. Organizations should always take human behavior into account when designing access plans and strategies. Human beings can pose unintentional threats when they accidentally delete data. Hackers may be motivated by financial data when they attack a system or use social engineering skills to gain access to restricted data. Consider human nature and organizational behavior in this term paper.

Write an eight to ten (8-10) page paper in which you:

Propose five (5) techniques that organizations should apply to mitigate the threats arising from human nature.

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place.

Examine what an organization could possibly learn when a policy is implemented to observe personnel in an ongoing manner.

Propose five (5) best practices that you would use to handle human nature and organizational behavior.

 

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Term

CIS 560 Week 3 Assignment 1 Access Restrictions

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-3-assignment-1-access-restrictions/

 

 

 

 

 

 

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment.

Write a four to five (4-5) page paper in which you:

Identify the business you have selected.

Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.

Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.

Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.

Determine the type of access levels you would provide to a contractor or consultant.

 

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Definition

CIS 560 Week 3 Assignment 1 Access Restrictions

 

 

 

 

https://hwacer.com/Tutorial/cis-560-week-3-assignment-1-access-restrictions/

 

 

 

 

 

 

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment.

Write a four to five (4-5) page paper in which you:

Identify the business you have selected.

Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.

Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.

Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.

Determine the type of access levels you would provide to a contractor or consultant.

 

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

Term

CIS 560 Week 4 Case Study 2

 

 

https://hwacer.com/Tutorial/cis-560-week-4-case-study-2/

 

 

 

 

Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client, automate and simplify router provisioning and updates, and enable a scalable VPN solution to support up to 30,000 workers.

Write a four to five (4-5) page paper in which you:

1.Evaluate the deployment cost savings realized by Cisco, and determine if it was significant.

2.Analyze how the solution deployed by Cisco improved:

a.employee productivity

b.satisfaction

c.retention

3.Discuss how Cisco was able to achieve VPN scalability to support thousands of users.

 

4.When thousands of employees telecommute and work in virtual offices, there are benefits to the environment. Discuss the environmental impact of the Cisco telecommuting and virtual offices solution.

Definition

CIS 560 Week 4 Case Study 2

 

 

https://hwacer.com/Tutorial/cis-560-week-4-case-study-2/

 

 

 

 

Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client, automate and simplify router provisioning and updates, and enable a scalable VPN solution to support up to 30,000 workers.

Write a four to five (4-5) page paper in which you:

1.Evaluate the deployment cost savings realized by Cisco, and determine if it was significant.

2.Analyze how the solution deployed by Cisco improved:

a.employee productivity

b.satisfaction

c.retention

3.Discuss how Cisco was able to achieve VPN scalability to support thousands of users.

 

4.When thousands of employees telecommute and work in virtual offices, there are benefits to the environment. Discuss the environmental impact of the Cisco telecommuting and virtual offices solution.

Term

CIS 560 Week 7 Assignment 2

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-assignment-2/

 

 

 

 

 

Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization.

Write a four to five (4-5) page paper in which you:

Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access.

Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of:

configurability

established standards

implementation challenges

cost

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

Definition

CIS 560 Week 7 Assignment 2

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-assignment-2/

 

 

 

 

 

Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization.

Write a four to five (4-5) page paper in which you:

Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access.

Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of:

configurability

established standards

implementation challenges

cost

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

Term

CIS 560 Week 7 Assignment 2

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-assignment-2/

 

 

 

 

 

Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization.

Write a four to five (4-5) page paper in which you:

Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access.

Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of:

configurability

established standards

implementation challenges

cost

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

Definition

CIS 560 Week 7 Assignment 2

 

 

 

https://hwacer.com/Tutorial/cis-560-week-7-assignment-2/

 

 

 

 

 

Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization.

Write a four to five (4-5) page paper in which you:

Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.

Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access.

Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access.

Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of:

configurability

established standards

implementation challenges

cost

Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

Supporting users have an ad free experience!