Communication tools and technology used for virtual collaboration

Team protocols ‘ Complete Section 1 of your Project Portfolio. To do this you are required to: ‘5’? . Identity and describe protocols and roles and responsibilities which apply to teams when working virtually. «- Identity and describe communication tools and technology used for virtual collaboration. . Determine and report on areas to improve in relation to team protocols for working collaboratively in a virtual environment. Make Sure you have answered all questions in Section 1.

Evaluation methods used when forecasting for planning

In 100 words each explain each of the following evaluation methods used when forecasting for planning:

Judgmental or Intuitive Methods

The Delphi Method

Extrapolation and Trend Analysis

Trend Extrapolation

Gompertz and Fisher-Pry Substitution Analysis

Analogies

 

Analysis of system passwords

This practical task requires you to perform a detailed analysis of system passwords as part of an ethical hacking engagement. You will first crack then analyse a sample password file from a client, then advise them on the weaknesses discovered. You will also provide recommendations for ways to improve their password hygiene and access control in general.

Your task is as follows:

  • Crack the password file supplied using any suitable tool, and report the contents
  • Analyse the contents of the password file using commonly accepted password hygiene and system security standards
  • Make recommendations for improving user access control supported by literature

Range of accessibility using IT Security Audit

Make an assessment of an office’s compliance or any department within your range of accessibility using IT Security Audit.

1. Access the IT Audit Manual from this website, https://www.undp.org/content/dam/albania/docs/STAR/IT%20AUDIT%20MANUAL.pdf

 

2. Access the IT Audit Checklist sample from this website, https://ctinc.com/wp-content/uploads/2015/08/IT-Audit-Checklist-CTI-Technology.pdf

 

3. Make documentation of a DIY version of IT Security Audit with the following requirements:
a. Defining the Scope of your Audit
b. Creating a Threat List
c. Past Due Diligence and Predicting the Future
d. Prioritizing Your Assets and Vulnerabilities
e. Implementing Network Access Control
f. Implementing Intrusion Prevention
g. Implementing Identity and Access Management
h. Creating Backups
i. Email Protection and Filtering
j. Preventing Physical Intrusion

Describe the similarities and differences between viruses and worms

Describe the similarities and differences between viruses and worms. Worms often use a buffer overflow attack to replicate. Describe what a buffer overflow attack is and how it can be mitigated.

 

Information security program

Develop an information security program that aligns with organizational strategies by evaluating business requirements, applicable laws, regulations, standards, and best practices, Integrate confidentiality, integrity, and availability (CIA) concepts into the development of an information security program, Evaluates and recommend information and security technologies to support the information security program, Evaluate and discuss the fundamental reasons why information systems security is such a critical element in today’s business, government, education, and home technology-based environments, Review and develop the key elements of an information systems security management program, Perform and document a risk-based analysis of information systems security for an organization, including the identification of threats, vulnerabilities, and countermeasures, Explain the various controls available for protection against internet attacks, including authentication, integrity check, firewalls, and intruder detection systems.

Information security policy

What is information security policy? Why it is critical to the success of the information security program, What are some of the challenges in shaping policy?

  • Distinguish the differences between standards, policies, procedures, and guidelines.
  • What factors should be considered in determining if a policy is considered static or dynamic?

Prepare a 350- to 1,050-word paper that fully discusses the topic questions

Network security

How important is it to understand networking for a security practitioner? How do OSI and TCP/IP relate to network security? How does each aid in network security? Does either provide more effective security?

Attack and Penetration Test Plan

Option #1: Attack and Penetration Test Plan, Prepare a written proposal for the penetration test plan that describes your firm’s approach to performing the penetration test and what specific tasks, deliverables, and reports you will complete as part of your services.

Scenario: You are the owner and operator of a small information security consulting firm. You have received a request from one of your clients, Infusion Web Marketing, to provide a written proposal for performing a penetration test on the company’s production Web servers and corporate network.

Environment:

Scope

Production e-commerce Web application server, thee-commerce Web application server is acting as an external point-of-entry into the network:

  • Ubuntu Linux 10.04 LTS Server (TargetUbuntu01)
  • Apache Web Server running the e-commerce Web application server
  • Credit card transaction processing occurs on all web servers.

Intrusive or Non-Intrusive

Intrusive. The test will include penetrating past specific security checkpoints.

Compromise or No Compromise

No compromise. The test can compromise with written client authorization only.

Scheduling

Between 2:00 a.m-6:00 a.m. MST weekend only (Saturday or Sunday)

Deliverables:

Based on the scenario above, provide a written attack and penetration testing plan. The plan should include these sections:

  • Table of Contents
  • Project Summary
  • Goals and Objectives
  • Tasks
  • Reporting
  • Schedule.

Your penetration testing plan should be two to three pages in length and should discuss and cite at least three credible or academic references other than the course materials. The Library is an excellent place to search for credible academic sources. Document and citation formatting should be in conformity with Guide to Writing and APA Requirements.

Helpful Resources:

The SANS Institute provides several resources that you might find helpful for this assignment: http://www.sans.org/reading-room/whitepapers/testing

The National Institute for Standards and Technologies (NIST) also provides guidance on the topic of security and penetration testing: http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf

Web application architectures

Information on web application architectures, client and server-side controls, encoding schemes, and data storage including AJAX, XML, and JSON. Also include the vulnerabilities and remediation methods associated with session management, blind SQL injection, and cross-site request forgery.