4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1&paperId=2770842379&&attemptId=e04e… 1/8
ECS5100_202030_CRN194 - COMPUTER SECURITY: FOUNDATIONS - 202030 - CRN194 - VERMA
Week Eleven Assignment
Ruthvik Reddy Gidde
on Thu, Apr 09 2020, 9:58 PM
75% highest match
Submission ID: e04e812f-f995-4888-aa4e-706edceed872
Attachments (1)
Week #11 Assignment.docx
1
Running Head: 1 IT SECURITY POLICY
4
1 IT SECURITY POLICY
IT SECURITY POLICY
Name: Ruthvik Reddy Gidde
Institution: New England College
Date: 04/09/2020
2 AN IT SECURITY POLICY IDENTIFIES AND OUTLINES THE PROCEDURES
AND RULES FOR ANY INDIVIDUAL WHO ACCESSES AND USES AN
ORGANIZATION'S IT RESOURCES AND ASSETS.
(http://safeassign.blackboard.com/)
Week #11 Assignment.docx
Word Count: 401
Attachment ID: 2770842379
75%
http://safeassign.blackboard.com/
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1&paperId=2770842379&&attemptId=e04e… 2/8
Steps
3 SCOPE AND ACCESSIBILITY: It is the first step where one needs to deal with all
student’s information, systems, network accessibility.
Data classification: 3 IN THIS STEP, ONE NEEDS TO SPECIFY ALL THE
INFORMATION WHICH IS CLASSIFIED EITHER AS PUBLIC OR PRIVATE /
"CONFIDENTIAL."
Managing data: One must handle secured data for classified category.
Context management: Entails addressing all the required students’ contexts.
Supporting data: 4 ONE NEEDS TO FOLLOW ALL THE SUPPORTING DATA OF
THE STUDENT'S STATUS, WHETHER THE STUDENTS ARE EXISTING /
DROPOUTS / EXPELLED TO FOLLOW THE ROLES AND RESPONSIBILITIES,
PROCESS, AND PROCEDURES.
Specific data: Used for authenticating student’s data. 3 STUDENTS NEED TO PROVIDE
DATA VERIFICATION WITH SECURE TECHNOLOGY.
Consequences: 5 THEY INCLUDE ALL THE OUTCOMES OF PROVIDING THE
DATA TO THE DROPOUT STUDENTS.
3 ACCEPTABLE USE OF STUDENT POLICY: 6 ACCEPTABLE USER POLICY IS
ACKNOWLEDGED BY THE ADMINISTRATORS THROUGH THE STUDENT’S
DATA THAT ARE UPLOADED AND UPDATED REGULARLY (RAUNIO &
WAGNER 2017).
3 CONFIDENTIAL DATA POLICY: 7 CONFIDENTIAL DATA POLICY THAT
FACILITATES PRIVATE HANDLING OF ALL THE STUDENT’S DATA BY THE
ADMINISTRATION AND INDIVIDUAL STUDENT.
4 AUTO-GENERATED EMAIL POLICY: 5 AUTO-GENERATED EMAIL IS SENT
TO STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO CHECK ANY STATUS OF
THEIR DATABASE BY THE COMPANY'S EMAIL SYSTEM TO WEB-BASED
EMAIL APPLICATIONS OR SERVER-SIDE APPLICATIONS.
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1&paperId=2770842379&&attemptId=e04e… 3/8
4 MOBILE DEVICE POLICY: 8 MOBILE DEVICES ARE REQUIRED FOR A
FLEXIBLE AND PORTABLE APPLICATION TO ACCESS STUDENT
INFORMATION BY GENERATING OTP AT THE LOG.
4 NETWORK SECURITY POLICY: 9 A SECURE NETWORK ARCHITECTURE IS
REQUIRED ...
2. Institution: New England College
Date: 04/09/2020
2 AN IT SECURITY POLICY IDENTIFIES AND OUTLINES
THE PROCEDURES
AND RULES FOR ANY INDIVIDUAL WHO ACCESSES AND
USES AN
ORGANIZATION'S IT RESOURCES AND ASSETS.
(http://safeassign.blackboard.com/)
Week #11 Assignment.docx
Word Count: 401
Attachment ID: 2770842379
75%
http://safeassign.blackboard.com/
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 2/8
Steps
3 SCOPE AND ACCESSIBILITY: It is the first step where one
needs to deal with all
student’s information, systems, network accessibility.
3. Data classification: 3 IN THIS STEP, ONE NEEDS TO
SPECIFY ALL THE
INFORMATION WHICH IS CLASSIFIED EITHER AS PUBLIC
OR PRIVATE /
"CONFIDENTIAL."
Managing data: One must handle secured data for classified
category.
Context management: Entails addressing all the required
students’ contexts.
Supporting data: 4 ONE NEEDS TO FOLLOW ALL THE
SUPPORTING DATA OF
THE STUDENT'S STATUS, WHETHER THE STUDENTS ARE
EXISTING /
DROPOUTS / EXPELLED TO FOLLOW THE ROLES AND
RESPONSIBILITIES,
PROCESS, AND PROCEDURES.
Specific data: Used for authenticating student’s data. 3
STUDENTS NEED TO PROVIDE
DATA VERIFICATION WITH SECURE TECHNOLOGY.
Consequences: 5 THEY INCLUDE ALL THE OUTCOMES OF
PROVIDING THE
DATA TO THE DROPOUT STUDENTS.
3 ACCEPTABLE USE OF STUDENT POLICY: 6
4. ACCEPTABLE USER POLICY IS
ACKNOWLEDGED BY THE ADMINISTRATORS THROUGH
THE STUDENT’S
DATA THAT ARE UPLOADED AND UPDATED
REGULARLY (RAUNIO &
WAGNER 2017).
3 CONFIDENTIAL DATA POLICY: 7 CONFIDENTIAL
DATA POLICY THAT
FACILITATES PRIVATE HANDLING OF ALL THE
STUDENT’S DATA BY THE
ADMINISTRATION AND INDIVIDUAL STUDENT.
4 AUTO-GENERATED EMAIL POLICY: 5 AUTO-
GENERATED EMAIL IS SENT
TO STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO CHECK
ANY STATUS OF
THEIR DATABASE BY THE COMPANY'S EMAIL SYSTEM
TO WEB-BASED
EMAIL APPLICATIONS OR SERVER-SIDE APPLICATIONS.
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 3/8
5. 4 MOBILE DEVICE POLICY: 8 MOBILE DEVICES ARE
REQUIRED FOR A
FLEXIBLE AND PORTABLE APPLICATION TO ACCESS
STUDENT
INFORMATION BY GENERATING OTP AT THE LOG.
4 NETWORK SECURITY POLICY: 9 A SECURE NETWORK
ARCHITECTURE IS
REQUIRED TO PROTECT THE DATA INTEGRITY HAVING
THE RISK OF
SECURITY MEASURES WITH SOME PROCEDURES, AUTO-
GENERATED OTP,
LOGS AND FIREWALL AUTHENTICATION, RSA
PASSCODE FOR A SECURE
CONNECTION WHEN THE STUDENTS ACCESS THE DATA
REMOTELY.
Password Policy: A password policy is useful in enabling
students to protect their information
against cyber-attack. The students need to set an alphanumeric
password in their user
account.
Responsibility of handling the system in an authenticated way.
References
6. 10 RAUNIO, T., & WAGNER, W. (2017). 10 TOWARDS THE
PARLIAMENTARISATION OF FOREIGN AND SECURITY
POLICY? WEST
EUROPEAN POLITICS, 40(1), 1-19.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information
security policy compliance model
in organizations. computers & security, 56, 70-82.
Citations (10/10)
1 Another student's paper
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 4/8
Matched Text
7. 8 Another student's paper
9 Another student's paper
10 https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
IT SECURITY POLICY
Source - Another student's paper
IT SECURITY POLICY
Suspected Entry: 65% match
Uploaded - Week #11 Assignment.docx
AN IT SECURITY POLICY IDENTIFIES AND
8. OUTLINES THE PROCEDURES AND RULES FOR
ANY INDIVIDUAL WHO ACCESSES AND USES AN
ORGANIZATION'S IT RESOURCES AND ASSETS
Source - Another student's paper
An IT Security Policy, It distinguishes the rules and
procedures for all the individuals accessing and using
an organization's IT assets and resources
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
SCOPE AND ACCESSIBILITY
Source - Another student's paper
Scope and accessibility
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 5/8
Suspected Entry: 86% match
Uploaded - Week #11 Assignment.docx
IN THIS STEP, ONE NEEDS TO SPECIFY ALL THE
INFORMATION WHICH IS CLASSIFIED EITHER AS
PUBLIC OR PRIVATE / "CONFIDENTIAL."
Source - Another student's paper
In this step need to specify all the information which
are classified either public or private / “confidential"
9. Suspected Entry: 84% match
Uploaded - Week #11 Assignment.docx
STUDENTS NEED TO PROVIDE DATA
VERIFICATION WITH SECURE TECHNOLOGY
Source - Another student's paper
for authenticating students data need to provide data
verification with secure technology
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
ACCEPTABLE USE OF STUDENT POLICY
Source - Another student's paper
Acceptable use of student Policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
CONFIDENTIAL DATA POLICY
Source - Another student's paper
Confidential Data Policy
Suspected Entry: 89% match
Uploaded - Week #11 Assignment.docx
ONE NEEDS TO FOLLOW ALL THE SUPPORTING
DATA OF THE STUDENT'S STATUS, WHETHER
THE STUDENTS ARE EXISTING / DROPOUTS /
EXPELLED TO FOLLOW THE ROLES AND
RESPONSIBILITIES, PROCESS, AND
PROCEDURES
10. Source - Another student's paper
Supporting data — need to follow all the supporting
data of student’s status whether the students are
existing / dropouts / expelled to follow the roles and
responsibilities, process and procedures
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
AUTO-GENERATED EMAIL POLICY
Source - Another student's paper
Auto-generated Email Policy
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 6/8
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
MOBILE DEVICE POLICY
Source - Another student's paper
Mobile Device Policy
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
NETWORK SECURITY POLICY
Source - Another student's paper
11. Network Security Policy
Suspected Entry: 71% match
Uploaded - Week #11 Assignment.docx
THEY INCLUDE ALL THE OUTCOMES OF
PROVIDING THE DATA TO THE DROPOUT
STUDENTS
Source - Another student's paper
Consequences — which includes all the outcomes for
providing the data to the dropout students
Suspected Entry: 90% match
Uploaded - Week #11 Assignment.docx
AUTO-GENERATED EMAIL IS SENT TO
STUDENTS’ EMAIL-ID WHEN THEY LOGIN TO
CHECK ANY STATUS OF THEIR DATABASE BY
THE COMPANY'S EMAIL SYSTEM TO WEB-
BASED EMAIL APPLICATIONS OR SERVER-SIDE
APPLICATIONS
Source - Another student's paper
Auto-generated email is been sent to students email-
id when they log in to check any status of their
database by the company's email system to web-
based email applications or server-side applications,
Suspected Entry: 67% match
Uploaded - Week #11 Assignment.docx
ACCEPTABLE USER POLICY IS
ACKNOWLEDGED BY THE ADMINISTRATORS
THROUGH THE STUDENT’S DATA THAT ARE
UPLOADED AND UPDATED REGULARLY
12. (RAUNIO & WAGNER 2017)
Source - Another student's paper
Acceptable User Policy which is the policy while the
administrator acknowledges through the student’s
data that are uploaded and updated regularly
Suspected Entry: 70% match
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 7/8
Uploaded - Week #11 Assignment.docx
CONFIDENTIAL DATA POLICY THAT FACILITATES
PRIVATE HANDLING OF ALL THE STUDENT’S
DATA BY THE ADMINISTRATION AND INDIVIDUAL
STUDENT
Source - Another student's paper
Confidential data policy is to handle privately all the
student’s data to the administration and individual
student
Suspected Entry: 93% match
Uploaded - Week #11 Assignment.docx
MOBILE DEVICES ARE REQUIRED FOR A
FLEXIBLE AND PORTABLE APPLICATION TO
ACCESS STUDENT INFORMATION BY
GENERATING OTP AT THE LOG
13. Source - Another student's paper
Mobile devices are required for a growing, flexible
and portable application to access student information
by generating OTP at the time of log in
Suspected Entry: 97% match
Uploaded - Week #11 Assignment.docx
A SECURE NETWORK ARCHITECTURE IS
REQUIRED TO PROTECT THE DATA INTEGRITY
HAVING THE RISK OF SECURITY MEASURES
WITH SOME PROCEDURES, AUTO-GENERATED
OTP, LOGS AND FIREWALL AUTHENTICATION,
RSA PASSCODE FOR A SECURE CONNECTION
WHEN THE STUDENTS ACCESS THE DATA
REMOTELY
Source - Another student's paper
A secure network architecture is required to protect
the data integrity having the risk of a security
measures with some procedures, auto-generated
OTP, logs and firewall authentication, RSA passcode
for secure connection when the student access the
data remotely
Suspected Entry: 71% match
Uploaded - Week #11 Assignment.docx
RAUNIO, T., & WAGNER, W
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Wagner WM, Raunio T
14. Suspected Entry: 75% match
Uploaded - Week #11 Assignment.docx
TOWARDS THE PARLIAMENTARISATION OF
FOREIGN AND SECURITY POLICY
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
Towards parliamentarization of foreign and security
policy
4/9/2020 SafeAssign Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReportPrint?course_id=_45800_1
&paperId=2770842379&&attemptId=e04e… 8/8
Suspected Entry: 100% match
Uploaded - Week #11 Assignment.docx
WEST EUROPEAN POLITICS, 40(1), 1-19
Source -
https://research.vu.nl/en/publications/towards-
parliamentarization-of-foreign-and-security-policy
West European Politics, 40(1), 1-19
DemandSimpleMarket Demand
SchedulePriceQuantity1051201548702046202544003041903539
90403810453640503470603160702880802610902360100212011
16. Demand is identical across markets and described by the
schedule
on the right (also provided in more detail in the Excel file
attached). Consumers buy first from the firm with the lowest
price
until its capacity is exhausted, then buy from the firm with the
second-lowest firm, and so on until no additional consumer
wishes
to purchase at the lowest price charged among firms with
remaining free capacity. If two (or more) firms post the same
price, they split the remaining quantity demanded at that price,
after any firm charging a lower price has already sold the total
quantity it can produce.
You observe data on prices and quantities for a five-firm
oligopoly
in these four markets, given below (generated from play in our
in-
class exercise on Monday). In this particular market, it appears
that four of the five firms are competing actively, while one
firm
(Firm 3) is playing passively. Let us say that the passive Firm 3
is a
“Nonprofit,” while the remaining four firms are “For-profit.”
Using
the models of oligopoly behavior we have discussed, your
assignment is to analyze the behavior of the four “For-profit”
firms
in this market, taking the prices of the “Nonprofit” as given.
Assignment: In 1-2 pages, provide written answers to the
following questions.
1. Analyze the Nash equilibrium of the pricing game between
17. the four For-Profit players in
each of the four markets above, taking the price charged by the
Nonprofit (Firm 3) in
each market as given. Based on this analysis, what theoretical
predictions can you make
about the price in each market?
Market Demand
Schedule
Price Quantity
10 5120
20 4620
30 4190
40 3810
50 3470
60 3160
70 2880
80 2610
90 2360
100 2120
110 1890
120 1670
18. 2. How do the observed prices charged by the four “For-profit”
players compare with the
Nash equilibrium predictions in Part 1? Which Nash equilibrium
predictions are borne
out in the data? Which predictions are not?
In your answer to Question 1, it may be helpful to consider the
following:
• Should unavoidable fixed costs matter for Nash equilibrium
prices? Why or why not?
(Note: By “unavoidable”, we mean that firms cannot leave the
market this period.)
• If there were no capacity constraints, and ignoring the fact
that price must be an
integer, what would be the Nash equilibrium price in each
market?
• How do capacity constraints change our predictions about
prices in each market? How
would we expect prices to be ranked with high, medium, and
low capacity constraints?
• Consider any potential price � in the demand schedule below.
Suppose that Firm 1’s
three for-profit rivals each charge this price � (holding the
Nonprofit’s price fixed at its
19. observed value). Consider two strategies for Firm 1: “matching”
the price charged by its
active rivals by setting �. = �, or “undercutting” all three
active rivals by reducing price
by $1 to �. = � − 1. Bearing in mind Firm 1’s capacity
constraints, what is the *highest*
price � on the demand schedule at which Firm 1 prefers to
match than undercut? How
does this price vary with the capacity constraint �? And what
does this tell you about
Nash equilibrium prices in each market?
[Hint: For a price � to be a symmetric Nash equilibrium, it
must be that no for-profit
firm prefers to undercut when all for-profit rivals charge the
given price. In this
particular game there may in general be many Nash equilibria,
but from the firms’
perspective the best equilibrium will be the one with the highest
price.]
Evaluation: This assignment will count for 10 percent of your
final course grade. In your
answers, I will be looking for a clear discussion of both the key
economic and strategic issues
governing competition in this market, and how predictions of
the underlying theory fit (or
don’t!) the actual prices observed. Note that data *will not* line
up with theory on every
dimension, although in some key dimensions it should. Long
answers are not necessarily better;
the key is to identify and analyze the core questions involved.
Submissions are due via Canvas at midnight on Friday, April
10. Late submissions will receive a
20. one letter grade penalty for each day late.
Data on outcomes for each market is provided on the next page.
Market 1: Moderate capacity, no fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 39 1000 1000 39,000 4,000 0 35,000
2 40 889 1000 35,560 3,556 0 32,004
3 62 0 1000 0 0 0 0
4 38 1000 1000 38,000 4,000 0 34,000
5 40 950 1000 38,000 3,800 0 34,200
Market 2: Moderate capacity with fixed costs
Firm Price Sales Capacity Revenues
Variable
Costs
Fixed
Costs Profit
1 42 1000 1000 42000 4000 35000 3000
2 43 887 1000 38141 3548 35000 -407