The systems development life cycle

The systems development life cycle (SDLC). The SDLC is the overall process for developing information systems, from planning and analysis through implementation and maintenance. The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase. These activities typically include determining budgets, gathering system requirements, and writing detailed user documentation.

The multimillion-dollar Nike supply chain management (SCM) system failure is legendary as Nike CEO Philip Knight famously stated, “This is what we get for our $400 million?” Nike partnered with i2 to implement an SCM system that never came to fruition. i2 blamed the failed implementation on the fact that Nike failed to use the vendor’s implementation methodology and templates. Nike blamed the failure on faulty software.

Please, provide explanation

Identify the cybersecurity threats and briefly describe them

Refer to the case scenarios below, identify the cybersecurity threats and briefly describe them. (i) Su Lee received a call claiming to be from the authority that her money from the bank has been used in connection to a crime. She was threatened to cooperate else she would be investigated as well; She was asked to transfer her money to a different account, for the time being, send them the necessary details and the money will be returned onee the investigation was over.  (ii) Josh is a jealous husband. He downloaded an app that disguised under a fake app name with suspicious access to messages, call logs and location. John use: this app to monitor the smartphone activities of his wife.

The proliferation of fake news and social bots

Should digital media, such as social media platforms continue to use highly sophisticated but opaque algorithms to adapt users’ experiences on their platforms? The lecture highlighted some examples such as autocompletion or product recommendation where such algorithms can be harmless or even beneficial, but the proliferation of fake news and social bots showcase how these algorithms may steer political conversations in polarizing and misleading ways.

The heuristic evaluation method

OBJECTIVES In this assignment you are asked to apply the heuristic evaluation method to investigate usability issues of an educational website. The objectives of this exercise are:

• Demonstrate an understanding of various usability heuristics and web design principles; • Understand the procedure of applying heuristic evaluation;

• Recognize the strengths and weakness of the heuristic method by applying it to a website

INSTRUCTIONS

1. Compare and contrast two sets of heuristics: University of Virginia (UV) Web Usability Team Heuristics vs. Purdue University Web Site Support Team Heuristics (LITA Guide: p.9-18) and choose one for evaluating the Dallas College Library: https://www.dallascollege.edu/libraries/pages/default.aspx . Both UV Heuristics and Purdue University Heuristics are based on Nielsen’s 10 usability heuristics. Please explain briefly (one paragraph) the rational of your choice.

2. Conduct a heuristic evaluation for this library website and discuss your findings in a heuristics evaluation report. For information about the process of evaluation, please consult (LITA Guide, p.13). The report should adhere to the following organization and requirements:

• Introduction (provide a brief description of evaluation objectives and overall findings)

• Body text (a. report both positive and negative aspects based on your evaluation of each heuristic; b. report severity of the problem; c. provide examples; d. provide remedy recommendations for identified issues;)

•Conclusion (offer a summary statement about the findings and recommendations) •Appendix (include illustrations—at least 5 screen shots that clearly indicate— use annotations—the area of usability concern you described in your report.) Note: your illustrations should appear in the appendix, not in the body of the report.

•Length: Approximately 1,000-1,500 words (without Appendix)

3. Submit your report via the “Assignments & Submisssions>> Assignment 1 Turnitin link in the Canvasclass website. Note: reports should be submitted in an MS Word file. Please do not paste the report in the contents box.

Data breaches

In an organization, you are working, it has been brought to your notice that there are data breaches due to emails hacking. As the person involved in framing the company’s security policies provide details of the various policy changes you will bring regarding email usage to avoid these data breaches.

Skills in applying information security tools

This assessment is designed to assess your technical skills in applying information security tools. In
this assignment, you have to study and apply steganography techniques to embedded data within a
file. In addition, you have to understand Linux file systems and apply access control technologies.
The assessment is also assessing your skills to analyses information security principles against
security techniques including steganography and access control. In completing this assessment
successfully, you will be able to investigate IS security, risk threats and propose the suitable security
controls, which will help in achieving ULO-1, ULO-2, ULO-3, and ULO-4.
Task Specifications
This assessment includes three tasks as follows:

Task-1:
Steganography is the practice of concealing a file, message, image, or video within another file,
message, image, or video. Use Steghide tools available in Kali Linux/Linux to hide a text file that

includes your group students IDs on audio file. You have first to create audio file with no more than
30 second to record your group students IDs only. Then, you have to create text file to include group
details include first and last name for each student in your group. Finally, use Steghide tools (use
security as passphrase) to embedded your text file into the created audio file.
In your report, you have to provide screenshot demonstrate the steps with the commands you
followed during the process of installation of Steghide, and the way use used to hide group
information text file into audio file and finally the steps to extract the text file from audio for
verification of your work.

Task-2:
Access control is granting or denying approval to use specific resources. Technical access control
consists of technology restrictions that limit users on computers from accessing data.
In this task you have to work in a group to understand Access Control List (ACL) and files system
security using Linux environment. You have to complete the followings tasks using kali Linux or any
Linux OS:

1. Fill the following table with the information related to all member of your group:
Sn.
No
APIC Student ID First Name Last Name
1 {Student-ID1} {FirstName-1} {LastName-1}
2
3
Table 1: Group information
2. Create main directory named BIS3004 and set it permission to full access, fill the following
table:
Task Command/s
Create directory named :BIS3004
Set full access to BIS3004 directory
Table 2: Create Directories APIC
3. Create sub directories within BIS3004 directory according to Table-3:
Task Command/s
– Create directory {FirstName-1}
– Set read and write access permission only

– Create directory {FirstName-2}
– Set read access permission only

– Create directory {FirstName-3}
– Set read and execute access permission
only

Table 3: Create Student ID directories
Please note, {FirstName-x} is the first name of the APIC student according to Table-1.

4. Create users, with names according to the group member student IDs for of your group as
shown in Table-4

Task Command/s
– Create user {Student-ID1}
– Write ACL to enable:
1. full permission to {FirstName-1}
2. read and write permission to
{FirstName-2} and
3. read permission only to other
directories.

– Create user {Student-ID2}
– Write ACL to enable:
1. full permission to {FirstName-2}
2. read and execute permission to
{FirstName-1}
3. read permission only to other
directories.

Table 4: Create users
4. Create two groups and fill Table-5:
Task Command/s
– Create group {LastName-1}
– Add {Student-ID1} and {Student-ID2} users
to {LastName-1} group
– Write ACL that {LastName-1} group users
will get full access to {FirstName-1}
directory and read access to {FirstName-2}
directory.

– Create group {LastName2}
– Add ‘{Student-ID2} and {Student-ID3} to
{LastName-2} group
– Write ACL that {LastName-2} group users
will get full access to {FirstName-2}
directory and write and execute access to
{FirstName-1} directory.

Table 5: Create groups
Use the commands available in Linux or Kali Linux to complete the above tables. In your report, you
have to provide screenshot to demonstrate the steps you followed during the process of conducting
the assignment tasks and requirements according to your group details provided in Table-1 (student
ID, first name and last name).
Task-3:
Discuss with clear demonstration, how the steganography and access control techniques that you
conducted in Task-1 and Task-2, respectively, can achieve confidentiality, integrity, and availability
(CIA). You have to provide justification during your discussion.

Submission
1. You must submit a report in word format file include your answers for Task-1, Task-
2 and Task-3 with the required screenshots for Task-1 and Task-2. ALL SCREEN SHOTS
MUST SHOW THE USED PC TASK BAR WHICH SHOW DATE AND TIME. You must
include cover page that include group student ID and full name.
2. You have also to submit the created audio file that embedded your group information text
file for Task-1 (make sure to use: security as passphrase)
The two files must be submitted separately not in single compress file.

Business continuity and business impact analysis

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business.  Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs). Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy. Review your peer’s disaster recovery plan and offer advice on the cybersecurity around their plan.

The Firewall function of a Router

The Firewall function of a Router is made up of rules. By using Firewall Rules, form
the below rules:
1. Block a website IP address from accessing your Wifi.
2. Block your browser from sending or receiving network traffic from your device.
3. For both rules:
o Present the steps and explain your choices.
o Test the rule and display the output to support your rule.

 

While solving part (E) you have to:
o While naming the rules use this format: block “website name”. block
“browser name”.
o Indicate the steps were used
o Present screenshot for the steps.
o Present the final output

The Virtual OS

Consider the Virtual OS you created previously in this course (you can re-open the VM program to answer these questions). Imagine you were using the VM as part of a cloud server.

Create a PowerPoint-style presentation that includes the following features:

  • One slide that shows the host OS, guest OS, and hypervisor/VMM for your VM setup.
  • Slides that provide an example of a server-side defensive practice you could implement for each of the following security categories (one slide for each category):
    • Deterrent Controls
    • Preventative Controls
    • Detective Controls
    • Corrective Controls

(You may examine the various settings and configuration options in your VM to come up with ideas for each category.)

  • One slide that includes an example of client-side security recommendations you could recommend to customers using the data or application on your VM server.
  • And one or more slides making the case for running a cloud system on a VM instead of on a physical server.

Cyber Incident response requirements

Research and compare the Cyber Incident response requirements for at least two of the major security and privacy compliance standards, such as HIPAA, PCI DSS, FERPA, COPPA, FACTA, ECPA.  Does the policy require an Incident Response capability?  What are the requirements?