Entries by Daphne Hanson

Communication tools and technology used for virtual collaboration

Team protocols ‘ Complete Section 1 of your Project Portfolio. To do this you are required to: ‘5’? . Identity and describe protocols and roles and responsibilities which apply to teams when working virtually. «- Identity and describe communication tools and technology used for virtual collaboration. . Determine and report on areas to improve in […]

Analysis of system passwords

This practical task requires you to perform a detailed analysis of system passwords as part of an ethical hacking engagement. You will first crack then analyse a sample password file from a client, then advise them on the weaknesses discovered. You will also provide recommendations for ways to improve their password hygiene and access control […]

Range of accessibility using IT Security Audit

Make an assessment of an office’s compliance or any department within your range of accessibility using IT Security Audit. 1. Access the IT Audit Manual from this website, https://www.undp.org/content/dam/albania/docs/STAR/IT%20AUDIT%20MANUAL.pdf   2. Access the IT Audit Checklist sample from this website, https://ctinc.com/wp-content/uploads/2015/08/IT-Audit-Checklist-CTI-Technology.pdf   3. Make documentation of a DIY version of IT Security Audit with the […]

Information security program

Develop an information security program that aligns with organizational strategies by evaluating business requirements, applicable laws, regulations, standards, and best practices, Integrate confidentiality, integrity, and availability (CIA) concepts into the development of an information security program, Evaluates and recommend information and security technologies to support the information security program, Evaluate and discuss the fundamental reasons […]

Information security policy

What is information security policy? Why it is critical to the success of the information security program, What are some of the challenges in shaping policy? Distinguish the differences between standards, policies, procedures, and guidelines. What factors should be considered in determining if a policy is considered static or dynamic? Prepare a 350- to 1,050-word paper […]

Network security

How important is it to understand networking for a security practitioner? How do OSI and TCP/IP relate to network security? How does each aid in network security? Does either provide more effective security?

Attack and Penetration Test Plan

Option #1: Attack and Penetration Test Plan, Prepare a written proposal for the penetration test plan that describes your firm’s approach to performing the penetration test and what specific tasks, deliverables, and reports you will complete as part of your services. Scenario: You are the owner and operator of a small information security consulting firm. You […]

Web application architectures

Information on web application architectures, client and server-side controls, encoding schemes, and data storage including AJAX, XML, and JSON. Also include the vulnerabilities and remediation methods associated with session management, blind SQL injection, and cross-site request forgery.