...Share how you might get yourself into a "creative mode" or overcome "creative block". Getting into a creative mode for me usually takes quite a bit of time. Though if I were to choose one specific time, it would be when I’m in bed. If I have a really big project due for school or for work I tend to keep a notebook next to me on my nightstand. I think that time right before my brain decides to call it a night is perfect, because it allows me to be with my thoughts. It’s quiet, transcendent and very peaceful time for me. So if I think of anything that might help with a current a project I’m working on, I take a note about and I would expound up on it in the morning. If I’m down to very short amount of time I have to prepare a project, I would have to sit in a very quiet room where I have no disturbances. Even the television on with no volume distracts me. Creative block is something I always deal with. I’m not the most creative of people. So when I’m preparing a project it generally takes me quite a long time to allow my creativeness to display on paper. So to overcome a creative block I like to relax. I either take a quick nap, turn the television on and watch a show or two or go outside and play with my two dogs. I enjoy playing with the dogs the most. There is something about being outside when it’s nice and cool that really allows me to think clearly. Well it was a pleasure sharing my thoughts on how I overcome a creative block and get into a creative...
Words: 294 - Pages: 2
...Week 2 Assignment 6/13/16 EBay Cyber Attack It seems that no one and many companies are not safe any longer while on the internet numerous companies have been targeted by hackers as of late. One of these such global companies is EBay it was targeted between February and March of 2014. Hackers targeted EBay and were able to find loopholes in which information was able to be stolen from the global giant. Email addresses, birthdays, passwords physical addresses and phone numbers were some of the things stolen from the website. The company said that it did not find any issues with finances such as credit card information was not compromised during the attack. On the day that the attack happened stocks fell on the New York Stock Exchange down to 3.2 percent. EBay was not able to find out exactly how many accounts were compromised at the time of the attack and the aftermath of it. Hackers were able to get into the network through hacked employee accounts that allowed access into the network. EBay did not noticed this until two weeks after the attack actually took place. PayPal accounts that were linked to the accounts that were compromised were not breached in the attack. The police and many security analysts assisted in finding out more information about the attack and just how the hackers were able to get into the employee accounts. EBay recommended to the members of the site to change passwords immediately and verify PayPal. Information as soon as possible. During this attack...
Words: 639 - Pages: 3
...1. Which of the following statements best describes risk? The probability of loss of a valued resource 2. In which of the IT domains is a hub considered a major component of risk? Unknown—NOT USER DOMAIN 3. How does risk management impact an organization? Affects the survivability 4. Which of the following is not a technique for dealing with vulnerabilities? Cost-benefit analysis 5. Which of the following statements about threats is not accurate? Threats can be eliminated completely 6. What would you most commonly do to reduce the potential risk from a threat/vulnerability pair? Reduce the vulnerability 7. After implementing several security controls, what should be done to ensure the controls are performing as expected? Continuous monitoring 8. What is the most common target of perpetrators initiating an exploit? Public-facing servers 9. Which of the following is a U.S. organization that publishes the Special Publication 800 (SP 800) series of documents? NIST 10. What U.S. organization routinely publishes free cybersecurity-related alerts and tips, and includes the ability to subscribe to e-mail alerts for cybersecurity topics? Unknown—NOT CVE 11. Companies are expected to understand and abide by any laws that apply to them. What is this commonly called? Compliance 12. To which of the following would HIPAA apply? Health insurance companies 13. What is the first step you would take when creating a HIPAA compliance plan? Assessment 14. Which agency enforces...
Words: 347 - Pages: 2
...Part 1 of 1 - | 100.0 Points | Question 1 of 15 | 7.0 Points | What type of firewall keeps track of state tables to filter network traffic? | | A.Packet filter | | | B.Application layer proxy | | | C.Stateful packet inspection | | | D.Network address translation | | Answer Key: C | | | Question 2 of 15 | 7.0 Points | What is a primary benefit of a multi-homed firewall? | | A.Availability | | | B.Failover | | | C.Address translation | | | D.Isolation of subnets | | Answer Key: D | | | Question 3 of 15 | 7.0 Points | Which firewall is able to protect only a single host from malicious network activity? | | A.Hardware | | | B.Software | | | C.Open source | | | D.None of the above | | Answer Key: B | | | Question 4 of 15 | 7.0 Points | When performing a risk assessment, what is the amount of potential harm from a threat, expressed as a percentage? | | A.Exposure factor (EF) | | | B.Single loss expectancy (SLE) | | | C.Intangible value | | | D.Annualized loss expectancy (ALE) | | Answer Key: A | | | Question 5 of 15 | 7.0 Points | When performing a risk assessment, what is the amount of potential loss that can be experienced due to any compromise of an asset for a specific threat within a year? | | A.Exposure factor (EF) | | | B.Single loss expectancy (SLE) | | | C.Intangible value | | | D.Annualized loss expectancy (ALE) | | Answer...
Words: 656 - Pages: 3
...Define why change control management is relevant to security operations in an organization - Change control is an approach to managing changes that are made to a product or system with the purpose of ensuring that only necessary changes are made, changes are documented, that services are not unnecessarily disrupted, and that resources are used efficiently. What type of access control system uses security labels? - A (LBAC) Label-base access control system Describe two options you would enable in a Windows Domain password policy. - Password must meet complexity and Minimum password length Where would patch management and software updates fall under in security operations and management? - The System Administrator or other authorized personnel are responsible for informing local administrators about patches that correlate to the software that is used by the organization. Is there a setting in your GPO to specify how many logon attempts will lock out an account? Name two parameters that you can set to enhance the access control to the system. - Yes, The account lockout threshold policy can be modified to specify the number of attempts before a lockout. You can increase access control to the system by forcing users to change their password every 30 days and by ensuring that users do not have Administrator access to their local machines What are some password policy parameter options you can define for GPOs that can enhance the CIA or system access? - Setting...
Words: 405 - Pages: 2
...If I was to be selected to become a consultant for the America One Car dealership company, in the suburbia of Washington D.C, I would have to take a close look at creating a network that not only fills the needs of this small business, but does not come at an extreme cost. Creating this network will need to take into consideration both the security of the company tradecraft, but also the security of sensitive customer data stored on the premises. Since the company is relatively small, DSL will be the choice of internet acces Building the Local Area Network for the AOC dealership will have to focus on the small size of the business. The company currently doesn’t employ many people and an overabundance of technology might also take away from that small business feel to the company. Looking at the company, it is broken up into different sections: The sales department, management, sales floor and service department. Previous conversations with the AOC general manager alluded to the fact that most available technology needed to be in the hands of the sales associates and service department didn’t need desktop computers. So the current breakdown of desktop computers is one desktop computer for the general manager, four computers for the sales and finance office and four more computers on the sales floor. One technology that I was able to convince the general manager of undertaking was the use of WiFi. While the idea of security of a WiFi network can always be a concern, I assured...
Words: 917 - Pages: 4
...Case Study 2 January 24, 2013 ISSC 340: Local Area Network Technologies American Military University This document is a proposal for a full network solution to support multiple users and services at the America One Car (AOC) dealership located in Washington DC. The following will include a description of recommended internet service provider (ISP), network cable and infrastructure to include all network equipment, i.e. routers, switches, wireless access points, file and storage server, print server and email server. It also includes the proposed number of network wall drops in each office, the number of phones both VoIP and POTS, total number and type of workstations, and total number and types of printers. This will address the best solution that will meet the company needs while keeping the total cost as low as possible without hindering the network performance. First we will discuss the recommended internet access method and the minimum recommendation for you ISP. The best option for a small business with the possibility of future expansion would be to use a commercial service provider. It is recommended that you use an Ethernet internet that will provide you with a fast, reliable solution that is cost effect and easily upgradable if required. Windstream offers a dedicated Ethernet line with bandwidth speeds up to 1Gbps, having a dedicated Ethernet connection will allow for uninterrupted network access that will not be affected by other users during high traffic...
Words: 1522 - Pages: 7
...Part 1 of 1 - | 100.0 Points | Question 1 of 15 | 7.0 Points | Which of the following is not a primary objective of information security? | | A.Confidentiality | | | B.Integrity | | | C.Privacy | | | D.Availability | | Answer Key: C | | | Question 2 of 15 | 7.0 Points | Which of the following has the ultimate and final responsibility for network security in an organization? | | A.IT management | | | B.Network administrator | | | C.Senior management | | | D.IT security staff | | Answer Key: C | | | Question 3 of 15 | 7.0 Points | Security ________ are goals an organization strives to achieve through its security efforts. | | A.baselines | | | B.guidelines | | | C.objectives | | | D.None of the above | | Answer Key: C | | | Question 4 of 15 | 7.0 Points | Which IT domain in a typical IT infrastructure typically includes routers, circuits, switches, firewalls, and equivalent gear at remote locations? | | A.LAN Domain | | | B.LAN-to-WAN Domain | | | C.WAN Domain | | | D.System/Application Domain | | Answer Key: C | | | Question 5 of 15 | 7.0 Points | The lack of ____________ is both a strength and weakness of workgroups. | | A.user accounts | | | B.peers | | | C.shared resources | | | D.central authority | | Answer Key: D | | | Question 6 of 15 | 7.0 Points | What does a client/server environment have that a peer-to-peer...
Words: 614 - Pages: 3
...Name: Fabian Calle-Calle Date: 11 Feb 2015 ISSC340 Week 2 Assignment (3% of Grade) Lesson 2 Review: Wide Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What is a T1 circuit? (Word count: 15-25) A T1 circuit is the most common connectivity method in the United States and Japan and it is 24 different channels of voice and data that carries signals at a speed of up to 1.544 mbps 2. A statistical multiplexer provides each user with … (Word count: 15-25) The ability to have a faster connection depending on the transmission trends by switching between channels according to the demand of the network 3. What does a SONET add/drop multiplexer do? (Word count: 15-25) It provides the capability to add or drop part of the transmission payload without the overhead of completely demultiplexing and remultiplexing the entire signal. 4. Describe an ATM cell … (Word count: 15-25) It is a data frame that is always 53 bytes long that serves as the basic unit of ATMs packets switching technology 5. Which technologies provide affordable high-speed connections for home-based networks? (Word count: 15-25) There are three main methods of connecting to the internet that is available for an affordable price. Cable Internet which is the most common, and reliable this method provides a good amount of speed for a reasonable price. DSL connections is the cheapest high speed connection that...
Words: 302 - Pages: 2
...CHEAT SHEET PMP Exam Cheat Sheet The purpose of this is to help you memorize information to dump onto scrap paper prior to starting exam. It is important that information used on this sheet is information that will be helpful to you on the exam. Every time you sit down to study, start by writing out your “cheat sheet” to see how much you remember. You will remember more each time. This document is an example of what I used for the test and includes step by step instructions to create each piece. You should come up with whatever tricks work for you. I make no guarantees that this will work for you or that there are no errors in here. All I can say is that it worked for me and I hope this helps you find something to work for you. Most of the benefit is in learning to create the spreadsheet not in actually using it. However, it’s a nice feeling to start the test by documenting things you know instead of starting by answering a question you don’t! Good luck and happy studying. By PMPExamPrep 1 CHEAT SHEET Part A: Process group and Knowledge Area Matrix from P 38 PMBOK 2000 Edition Process Groups Step 1: Fill in negative C0 Knowledge space with X (cells with I P E C^ Areas no processes). • Starting at the top X PIM X of Closing – go down 6 and over 1 S X X • Skip space in X T X X Closing and do “Down and up” C X X X • From top of Q X X Executing drop one and do 3 in a HR X X X row. • In inititating, block Comm X out all except Risk X X X Scope Proc X X Step 2: You need a...
Words: 1760 - Pages: 8
...Assignment 7: Key requirements for writing SQL server audits to Windows Security Log x American Military University ISSC 431 Professor Christopher Weppler 20 April 2016 Security audits are is a report that identifies and brings about weaknesses of an organization. Security audits allow companied to focus on items that they have to improve on. There are multiple types of security audits: informal audits, formal audits, internal audits, external audits and automated audits (Basta, 2011). Therefore the goal of an audit is to provide accurate view of the organizations internal security controls in order to improve the organization’s security plan. When an audit is first being conducted it needs to be first planned out and everyone needs to prepare for it. In the planning phase, the audit scope is determined. The systems, departments and items that are being audited are determined (Basta, 2011). Some examples of items that get audited are the web server management, e-mail server management, file server administration, web applications, server security, databases and many other components. Some vendors contain their own unique automatic tools in order to help the auditing go a little smoother, such as logging user and database activity. In Microsoft SQL server allows the function to track the logging activities throughout all levels of the database. In order to create audits in Microsoft SQL...
Words: 356 - Pages: 2
...ISSC 363 Risk Consultant 24 January 2016 Risk Consultant A risk assessment is a way to identify, evaluate, quantify, and prioritize risks (Gibson, 2011). They are primarily used to assess the overall security of a network from the eyes of an attacker in order to protect the network from intruders (Schmittling, n.d.). There are no regulations instructing organizations on how systems need to be controlled or secured, however there are regulations requiring systems be secure in one way or another (Schmittling, n.d.). The rationale for conducting an assessment include: cost justification, productivity, breaking barriers, self analysis, and communication (Schmittling, n.d.). Adding security adds an extra expense that may not seem justifiable to a company. Businesses may not understand that an intrusion could cost more than proper security equipment and it is important for a security risk analysist to relay this important information. Productivity can be increased by properly formalizing a formalizing a review and implementing self analysis features (Schmittling, n.d.). Conducting a risk assessment can also break down barriers between the organization's management and the IT staff as they work together to secure the network. By making the security risk assessment system easy to use, management will be able to take part in the security of the network which will in turn make security a part of the business's culture. Risk assessments can boost communication...
Words: 792 - Pages: 4
...Geography United Arab Emirates occupies a total area of about 83,600 square kilometers (32,400 square miles), along the south-eastern tip of the Arabian Peninsula between 22°50 and 26°N and between 51° and 56°25 E. The UAE has 1 318 km of continental coastline along the Persian Gulf. The inflation rate, exchange rate and currency stability are important factors to consider in International trade, economically, the UAE has a 4% of GDP growth in 2012 with a lower inflation rate of 1.1%, In terms of days and cost of import procedure (United Arab Emirate). The Urbanization rate of the region is 84% (UAE) which would contribute to the product awareness in necessary part of the region since the urbanization rate is high. The common languages in UAE are Arabic (official), Persian, English, Hindi, and Urdu with major religion is Islam. Note English is also common language in this region because of presence of foreign expatriate working over there (Languages spoken in Dubai). The major natural resources that contribute to the GDP of the region are petroleum and natural gas. The fisheries of the UAE are entirely artisanal in nature and there is no major aquaculture industry in the country. The Country is arid nature; there are no inland fisheries in the UAE. In the UAE seafood is eaten as part of everyday meals and for special occasions, and additionally both the quickly growing UAE population and the increase in tourism and major developments drive increased seafood consumption, The...
Words: 2369 - Pages: 10
...Recent cyber-attack and mitigation techniques ISSC 361 American Public University System April 9, 2016 Computer-based attacks have been going on the around the world. Individuals or governments hacking into individuals or rival governments systems. Private corporations are hacking each other in the quest of power. They have been several recent computer-based attacks that every information security expert should be aware of. This short paper will discuss one of these recent attacks, which provoked a collective blackout, the Cyber-Attack Against Ukrainian Critical Infrastructure and present an overview of some mitigation techniques. The Cyber-Attack Against Ukrainian Critical Infrastructure was conducted using a malware called BlackEnergy. This attack targeted six Ukrainian energy organizations was perpetrated by attacker from outside the organizations. This attack has had effect on about 225000 customers of Ukrainian regional electric power distribution companies (Lee 2016). The intruders organized the attack by conducting a recognition of the network of the victim. The attacks took place with an interval of 30 minutes from each other affecting many central and regional installations (Vicinanzo 2016). The attackers, controlled the breakers from distance by using distance control administration tools already in place on the operating system or “distance industrial control system (ICS) client software through virtual private network (VPN)” after gaining rightful access to...
Words: 893 - Pages: 4
...Chapter 1—AIS overview (3 Questions = 4.5 points) Purpose of/value provided by AIS 1. Improving the quality and reducing the costs of products or service 2. Improve efficiency and effectiveness of the value chain and supply chain 3. Share knowledge 4. Improve the internal control structure 5. Improve decision making Key Role if the AIS 1. Collecting and storing data 2. Providing information for decisions 3. Safeguarding assets Value Chain Activities 1. Inbound Logistics------ receiving and storage 2. Operations -------------- manufacturing and repackaging 3. Outbound Logistics---- distribution shipping 4. Marketing & Sales------ advertising, selling 5. Service-------------------- repair, maintenance Characteristic of Useful Information 1. Relevant 2. Reliable 3. Timely 4. Verifiable 5. Understandable 6. Accessible 7. Complete Chapter 2/SUA Purpose/use of general ledger, subsidiary ledgers, special journals and cash prelist General Ledger= contains summary level data for every asset, liability, equity and revenue, and expense account...(accounts receivable) Subsidiary Ledger= contains detailed data for any general ledger account with many individualized subaccounts.... (Separate account for each accounts receivable) General Journal= used to record infrequent or non-routine transaction, such as loan payments Specialized Journal= records large numbers of repetitive...
Words: 2842 - Pages: 12