Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes). You will write three separate procedures for this lab:
(a)
Creating, Using, Removing System Restore Points for Windows 8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for creating System Restore Points using the “System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool, open the
System
tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system r.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxDIPESH30
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose: Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1. Develop a Windows system restore point systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2. Develop a Windows system administration procedure to manage programs and features.
3. Develop a systems administration procedure to implement configuration rules from systems security technicalguidance issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes).
Your deliverables for this lab will become part of the final project for this course (System Administration Manual).
Deliverables
(a) Step-by-Step System Administration Procedure for Creating, Using, Removing System Restore Points for Windows 8.1
(b) Step-by-Step System Administration Procedure for Managing Windows 8.1 Programs and Features
(c) Step-by-Step System Administration Procedure for Implementing Security Configuration Rules for Windows 8.1
Submit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types) using the corresponding assignment folder entry (in LEO). (Use the Deliverable Template file from Course Resources > Sample Files > CSIA 310 Lab Deliverable Template.docx.) Every deliverable must use the format shown below. (Replace [Section Name] with the heading for the section, e.g. Creating a System Restore Point).
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
InstructionsPart (a): Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system restore points). To access the tool, open the System tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2. Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a. Create a system restore point for a Windows 8.1 system
b. Use a system restore point to roll-back changes made to a Windows 8.1 system
c. Remove system restore points from a Windows 8.1 system (some and all)
3. Develop a systems administration procedure which can be used to perfo ...
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYViscolKanady
This document provides instructions for a lab assignment to develop system administration procedures for implementing host-based security on Windows 8.1 systems. The procedures will cover: (1) configuring and managing Windows Defender antivirus software, (2) configuring Windows Firewall settings to allow and block applications, and (3) using the Microsoft Baseline Security Analyzer (MBSA) tool to scan for and remediate vulnerabilities. Students are instructed to research, write, and test step-by-step procedures for each security tool and submit them along with screenshots in a single Word document.
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxDIPESH30
Lab Deliverable for Lab nYour NameDate
Title: Creating, Using, Removing System Restore Points for Windows 8.1Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware
3. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
1
2
· Week 4 Discussion
· Discussion response - your response to the discussion question should be between 150 - 300 words.
· Must provide a minimum of at least one (1) reference in your discussion.
Discussion Topic
Updated
Discuss ONE of the following: (Try not replicate other’s answers)
e) What is an installment loan?
Make sure you are properly citing your source(s) and providing your reference(s) for information you obtain from another source.
· Week 4 Lecture (embedded below)
· Code of Federal Regulations (eCFR). TITLE 42 Chapter IV Centers for Medicare & Medicaid Services, U.S. Department of Health & Human Services Subchapter G. Standards and Certification.
http://www.ecfr.gov/cgi-bin/text-idx?c=ecfr&tpl=/ecfrbrowse/Title42/42cfr483_main_02.tpl
· NCSL. (2009). Certificate of Need Programs by State and Service. The National Conference of State Legislatures, Denver CO.
· http://www.ncsl.org/issues-research/health/con-certificate-of-need-state-laws.aspx#Regulated
· Healthcare accreditation systems: further perspectives on performance measures http://intqhc.oxfordjournals.org/content/23/6/645.full
· Week 4 Discussion
Discussion Topic
Updated
Please address all three questions:
Article 1.....Regulations for Long Term Care Facilities.
A. Identify by name and location and research a Long Term Care Facility that had a regulatory deficiency.
-What was the deficiency?
-How was the deficiency addressed by the facility?
-Were there any penalties involved?
Article 2, CON
A. From the map choose a state that has CON regulations.
B. From that state, identify a hospital/ health system that had project review by CON.
C. Describe the project and the outcome of the CON process.
Article 3, Accreditation,
A. Joint Commission on the Accreditation of Healthcare Organizations (JCAHO)....define their m ...
The document describes the six phases of the systems development life cycle: 1) preliminary investigation, 2) systems analysis, 3) systems design, 4) systems development, 5) systems implementation, and 6) systems maintenance. Each phase involves specific activities like gathering requirements, designing system components, developing and acquiring software/hardware, testing, training users, and ongoing maintenance. Traceability matrices are used to map requirements to designs and validate that the life cycle process is followed.
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docxwhittemorelucilla
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to translate requirements into an executable systems design
· effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC
· perform modeling to assist with analysis and decision making
Assignment
The results of your systems analysis and design work in this class will be documented in a Final System Report. The purpose of the Report is to inform management of your system proposal and gain approval to proceed with the project. The Report will be developed and submitted in stages, which will be compiled at the end of class into the Final System Report. Review the outline of the Final System Report in the Stage 4 Assignment description. Note that it contains the analysis of the problem(s) and requirements, and proposes what kind of a system solution is neede.
The document discusses the process of system analysis and design. It describes the main steps as system study, feasibility study, system analysis, system design, coding, testing, implementation, and maintenance. System analysis involves studying the current system and user requirements to specify a new system. System design develops the new system structure based on analysis. The system is then coded, tested, and implemented before ongoing maintenance. The goal is to solve problems through an organized approach to system development.
Configuration management is concerned with managing changing software systems. It involves tracking changes, versions, system builds, and releases. Effective configuration management uses tools and processes to ensure the right versions are modified and delivered and software components are properly stored and tracked. It is important for quality and involves activities like change management, version management, system building, and release management.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxDIPESH30
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose: Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1. Develop a Windows system restore point systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2. Develop a Windows system administration procedure to manage programs and features.
3. Develop a systems administration procedure to implement configuration rules from systems security technicalguidance issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes).
Your deliverables for this lab will become part of the final project for this course (System Administration Manual).
Deliverables
(a) Step-by-Step System Administration Procedure for Creating, Using, Removing System Restore Points for Windows 8.1
(b) Step-by-Step System Administration Procedure for Managing Windows 8.1 Programs and Features
(c) Step-by-Step System Administration Procedure for Implementing Security Configuration Rules for Windows 8.1
Submit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types) using the corresponding assignment folder entry (in LEO). (Use the Deliverable Template file from Course Resources > Sample Files > CSIA 310 Lab Deliverable Template.docx.) Every deliverable must use the format shown below. (Replace [Section Name] with the heading for the section, e.g. Creating a System Restore Point).
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
InstructionsPart (a): Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system restore points). To access the tool, open the System tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2. Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a. Create a system restore point for a Windows 8.1 system
b. Use a system restore point to roll-back changes made to a Windows 8.1 system
c. Remove system restore points from a Windows 8.1 system (some and all)
3. Develop a systems administration procedure which can be used to perfo ...
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYViscolKanady
This document provides instructions for a lab assignment to develop system administration procedures for implementing host-based security on Windows 8.1 systems. The procedures will cover: (1) configuring and managing Windows Defender antivirus software, (2) configuring Windows Firewall settings to allow and block applications, and (3) using the Microsoft Baseline Security Analyzer (MBSA) tool to scan for and remediate vulnerabilities. Students are instructed to research, write, and test step-by-step procedures for each security tool and submit them along with screenshots in a single Word document.
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxDIPESH30
Lab Deliverable for Lab nYour NameDate
Title: Creating, Using, Removing System Restore Points for Windows 8.1Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware
3. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
1
2
· Week 4 Discussion
· Discussion response - your response to the discussion question should be between 150 - 300 words.
· Must provide a minimum of at least one (1) reference in your discussion.
Discussion Topic
Updated
Discuss ONE of the following: (Try not replicate other’s answers)
e) What is an installment loan?
Make sure you are properly citing your source(s) and providing your reference(s) for information you obtain from another source.
· Week 4 Lecture (embedded below)
· Code of Federal Regulations (eCFR). TITLE 42 Chapter IV Centers for Medicare & Medicaid Services, U.S. Department of Health & Human Services Subchapter G. Standards and Certification.
http://www.ecfr.gov/cgi-bin/text-idx?c=ecfr&tpl=/ecfrbrowse/Title42/42cfr483_main_02.tpl
· NCSL. (2009). Certificate of Need Programs by State and Service. The National Conference of State Legislatures, Denver CO.
· http://www.ncsl.org/issues-research/health/con-certificate-of-need-state-laws.aspx#Regulated
· Healthcare accreditation systems: further perspectives on performance measures http://intqhc.oxfordjournals.org/content/23/6/645.full
· Week 4 Discussion
Discussion Topic
Updated
Please address all three questions:
Article 1.....Regulations for Long Term Care Facilities.
A. Identify by name and location and research a Long Term Care Facility that had a regulatory deficiency.
-What was the deficiency?
-How was the deficiency addressed by the facility?
-Were there any penalties involved?
Article 2, CON
A. From the map choose a state that has CON regulations.
B. From that state, identify a hospital/ health system that had project review by CON.
C. Describe the project and the outcome of the CON process.
Article 3, Accreditation,
A. Joint Commission on the Accreditation of Healthcare Organizations (JCAHO)....define their m ...
The document describes the six phases of the systems development life cycle: 1) preliminary investigation, 2) systems analysis, 3) systems design, 4) systems development, 5) systems implementation, and 6) systems maintenance. Each phase involves specific activities like gathering requirements, designing system components, developing and acquiring software/hardware, testing, training users, and ongoing maintenance. Traceability matrices are used to map requirements to designs and validate that the life cycle process is followed.
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docxwhittemorelucilla
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to translate requirements into an executable systems design
· effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC
· perform modeling to assist with analysis and decision making
Assignment
The results of your systems analysis and design work in this class will be documented in a Final System Report. The purpose of the Report is to inform management of your system proposal and gain approval to proceed with the project. The Report will be developed and submitted in stages, which will be compiled at the end of class into the Final System Report. Review the outline of the Final System Report in the Stage 4 Assignment description. Note that it contains the analysis of the problem(s) and requirements, and proposes what kind of a system solution is neede.
The document discusses the process of system analysis and design. It describes the main steps as system study, feasibility study, system analysis, system design, coding, testing, implementation, and maintenance. System analysis involves studying the current system and user requirements to specify a new system. System design develops the new system structure based on analysis. The system is then coded, tested, and implemented before ongoing maintenance. The goal is to solve problems through an organized approach to system development.
Configuration management is concerned with managing changing software systems. It involves tracking changes, versions, system builds, and releases. Effective configuration management uses tools and processes to ensure the right versions are modified and delivered and software components are properly stored and tracked. It is important for quality and involves activities like change management, version management, system building, and release management.
Introduction to system analysis and designTwene Peter
This document provides an introduction to system analysis and design. It discusses that systems are created to solve problems in an organized way. It outlines the objectives of understanding systems, system development life cycles, and the components of system analysis and design. It then describes the key phases of the system development life cycle as system study, feasibility study, system analysis, system design, coding, testing, implementation, and maintenance.
The document describes the system development life cycle (SDLC), which is a process used to develop, implement, and retire information systems through several steps: initiation, analysis, design, implementation, and maintenance. It involves analyzing user needs, designing the system, coding, testing, implementation, and maintenance. The waterfall model is presented as a common SDLC approach, consisting of sequential phases from requirements analysis through maintenance. Other SDLC models mentioned include iterative, spiral, object-oriented, rapid application development, and joint application development.
SPECIFIC LEARNING OBJECTIVES:
At the end of this module you MUST be able to:
1. Identify the tools that a systems analyst could use.
2. Describe and differentiate each tool.
3. Use the appropriate tool for a certain and different situation.
TOPIC:
1. Systems development life cycle (SDLC)
2. Planning phase
3. Analysis phase
4. Design phase
5. Development phase
6. Implementation phase
7. Structured systems analysis
8. System model
9. Tools of structured analysis
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to .
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxketurahhazelhurst
CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the United States, Canada, and Germany. Go to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a different MNC.) Set the date range so that you can obtain quarterly values of the U.S. stock index for the last 20 quarters. Insert the quarterly data on a spreadsheet. Compute the percentage change in IBM’s stock price for each quarter. Next go to finance.yahoo.com/stock-center/ and click (under U.S.) on S&P Composite 1500 Index, which represents the U.S. stock market index, so that you can derive the quarterly percentage change in the U.S. stock index over the last 20 quarters. Then run a regression analysis with IBM’s quarterly return (percentage change in stock price) as the dependent variable and the quarterly percentage change in the U.S. stock market’s value as the independent variable. (Appendix C explains how Excel can be used to run regression analysis.) The slope coefficient serves as an estimate of the sensitivity of IBM’s value to the U.S. market returns. Also, check the fit of the relationship based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under “Europe”) on DAX, which represents the German stock market index. Repeat the process described in exercise 1 so that you can assess IBM’s sensitivity to the German stock market. Compare the slope coefficient between the two analyses. Is IBM’s value more sensitive to the U.S. market or the German market? Does the U.S. market or the German market explain a higher proportion of the variation in IBM’s returns (check the R-squared statistic)? Offer an explanation of your results.
Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset passwords
d. The fourth user grant column rights to the Course_Activity table allow access to the Course Code and Grade column. Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have given them
a. User 1 login and create a VIEW for user 2 that just displays the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do not have MySQL Enterprise we cannot use the Audit function but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User ...
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxclarebernice
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PROCESS MODELING- Part I
______________________________________________________________________________________________________
Synopsis
The requirements analysis phase answers the question, "What does the user need and want from a new system?" The requirements analysis phase is critical to the success of any new information system! In this milestone we need to identify what information systems requirements need to be defined from the system users’ perspectives.
The Data flow diagram (DFD) has gained popularity as a technique for expressing system requirements for two reasons:
• It facilitates development, which often leads to building systems that better
satisfy user needs
• Data flow diagrams and narratives are easy for users to understand.
In this milestone you will first uncover external agents, processes and data flows that define the requirements for the proposed system and document that information. You will use that to build the Context Data Flow Diagrams.
Objectives
After completing this milestone, you should be able to:
• Understand and perform the techniques for requirements discovery.
• Determine external agents (external entities) and their relationship with the
System, identify data flows.
• Construct the Context DFD using VISIO.
Prerequisites
Before starting this milestone, the following topics should be covered:
• The problem analysis phase — Chapters 3 and 5
• PIECES framework — Chapters 3 and 5
• Problem analysis techniques — Chapter 6
• Process modeling techniques — Chapter 9
Assignment
Now that we have studied the current system and analyzed some of its problems and opportunities, plus gained approval to proceed, we can now start to identify the business requirements for the system and model them. In this assignment we will use our results of the previous Milestone and transcripts of an interview with the Equipment Depot staff. The results of this activity will identify the system requirements for the proposed system.
Exhibit 3.1 is a copy of the transcript of the interview. Refer to the transcript, sample forms, and results from Milestones 1 and 2 for the information necessary to complete the activities.
Activities
1. Identify External entities and relationship with system
2. Identify data flows
3. Prepare Context level Data FlowDiagram
Deliverable format and software to be used are according to your instructor’s specifications. Deliverables should be neatly packaged in a binder, separated with a tab divider labeled “Milestone 3”.
References
• Transcripts of Interview - Exhibit 3.1 (see below)
Deliverables:
Context level DFD:
Due: __/__/__
Time: _______
ADVANCED OPTIONFor the advanced option, compile the process description to note processes’ input and output.
Due: __/__/__
Time: _______
Milestone’s Poin ...
Assignment Grading Rubric Course IT286 Unit 4 Po.docxssuser562afc1
This document provides the grading rubric and instructions for a two-part assignment in an IT security course. The assignment addresses outcomes related to wireless security, authentication, access control, and cloud security. For Part 1, students must complete short essay questions and tables addressing these topics. For Part 2, students must perform labs demonstrating wireless network configuration, packet sniffing tools, and Platform as a Service and provide screen captures. The rubric allocates a total of 50 points across both parts and deducts points for errors.
The document discusses system analysis and design. It defines a system as a collection of components that work together to achieve an objective. The key phases of the system development life cycle are system study, feasibility study, system analysis, system design, coding, testing, and implementation. System analysis involves a detailed study of the current system and user requirements to specify a new system.
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
IT 600 Final Project Guidelines and Rubric Overview.docxAASTHA76
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in -depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a tech nical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real -time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendati ons for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organi zational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the
operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in
the form of a detailed technology review.
SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operati ng system if you have
the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evalua tion incrementally.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality
final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.
Prompt
Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used
to implement processes and threads, the file syst.
The document outlines the 8 phases of the system development life cycle: 1) defining mission and goals, 2) specifying information needs, 3) analyzing the existing system, 4) designing the new system, 5) coding the new system, 6) testing the new system, and 7) implementing the new system. It provides details on the key activities and objectives for each phase, from initially identifying problems and goals through implementing the new system and training users.
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
IT 600 Final Project Milestone Two Template: Analytical Organizational Profile
Directions: Insert your answers directly in the Student Analysis column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI.
Note: Consider the work you did for Milestone One as you populate the table.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
Business Requirement
Multiprocessing
Tech Description
Business Requirement
Multithreading
Tech Description
Business Requirement
Virtual Memory
Tech Description
Business Requirement
System Call Interface
Tech Description
Business Requirement
Security
Tech Description
Business Requirement
Device Drivers
Tech Description
Business Requirement
Fault Tolerance
Tech Description
Business Requirement
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by ...
FOR MORE CLASSES VISIT
www.cst630rank.com
Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You
The document provides an overview of fundamentals of software development including definitions of software, characteristics of software, software engineering, layered approach to software engineering, need for software engineering, and common software development life cycle models. It describes system software and application software. It outlines characteristics like understandability, cost, maintainability, modularity, reliability, portability, documentation, reusability, and interoperability. It also defines software engineering, layered approach, and need for software engineering. Finally, it explains popular life cycle models like waterfall, iterative waterfall, prototyping, spiral, and RAD models.
FOR MORE CLASSES VISIT
www.cst630rank.com
Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report
For more classes visit
www.snaptutorial.com
Project 1
Step 1: Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Neetu Marwah
The document discusses the software development life cycle (SDLC). It describes SDLC as a process used in software engineering to break down development into distinct phases to better plan and manage projects. The phases include requirements study, design, development, testing, and maintenance. The document outlines each phase in detail and notes the key documents produced and activities involved at each stage of the SDLC process.
This document outlines the steps for a security assessment report (SAR) project. It involves conducting a security analysis baseline of an organization's IT systems, determining a network defense strategy, planning a penetration test, conducting the penetration test to find vulnerabilities, and completing a risk management cost-benefit analysis. The SAR and an executive briefing presenting the findings are the final deliverables.
The document provides instructions for a 6-step project on risk, threat, and vulnerability management. It involves conducting a security analysis baseline of an organization's IT systems, determining a network defense strategy using testing procedures, planning a penetration testing engagement with rules of engagement, conducting a network penetration test using tools to find security issues, completing a risk management cost-benefit analysis, and compiling the findings into a security assessment report, executive briefing, and lab report.
Write a 10 page Case study with the below instructions.Body (.docxsleeperfindley
Write a 10 page Case study with the below instructions.
Body: (Label headings according to subject/content)
Identify problems, issues, variables, and relationships related to the case
Discuss problems and List symptoms
Isolate critical issues
Conduct SWOT analysis and discuss the components
Strengths
Weaknesses
Opportunities
Threats
.
write a 1.5 – two-page paper to reflect on that week’s material .docxsleeperfindley
write a 1.5 – two-page paper to reflect on that week’s material to discuss questions that arose, and critique.
week’s material
White supremacy, Racism and Racial Formations
o Harris, C. I. (1993). Whiteness as property. Harvard Law Review, 106(8), 1707-1791.
o Wells, Ida B. (1900). Lynch Law in America. Re-published in Blackpast, Jul. 11, 2010.
o Tuck, E., & Yang, K. W. (2012). Decolonization is not a metaphor. Decolonization: Indigeneity, education & society, 1(1).
.
More Related Content
Similar to Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docx
Introduction to system analysis and designTwene Peter
This document provides an introduction to system analysis and design. It discusses that systems are created to solve problems in an organized way. It outlines the objectives of understanding systems, system development life cycles, and the components of system analysis and design. It then describes the key phases of the system development life cycle as system study, feasibility study, system analysis, system design, coding, testing, implementation, and maintenance.
The document describes the system development life cycle (SDLC), which is a process used to develop, implement, and retire information systems through several steps: initiation, analysis, design, implementation, and maintenance. It involves analyzing user needs, designing the system, coding, testing, implementation, and maintenance. The waterfall model is presented as a common SDLC approach, consisting of sequential phases from requirements analysis through maintenance. Other SDLC models mentioned include iterative, spiral, object-oriented, rapid application development, and joint application development.
SPECIFIC LEARNING OBJECTIVES:
At the end of this module you MUST be able to:
1. Identify the tools that a systems analyst could use.
2. Describe and differentiate each tool.
3. Use the appropriate tool for a certain and different situation.
TOPIC:
1. Systems development life cycle (SDLC)
2. Planning phase
3. Analysis phase
4. Design phase
5. Development phase
6. Implementation phase
7. Structured systems analysis
8. System model
9. Tools of structured analysis
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
75629 Topic: prevention measures for vulneranbilities
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Editing
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: Attached
After identifying your organizations' vulnerabilities through previous weekly assignments, you now need to develop security measures to protect those vulnerabilities.
Create a spreadsheet of vulnerabilities and prevention measures for your organization.
Categorize by people, process, or technology.
Provide 350- to 700-word paper onnext steps for each prevention measure based on the vulnerability, potential incident, environmental and security controls in SDLC.
Submit your spreadsheet and paper using the Assignment Files tab.
Data Flow Diagram (DFD) Tips
Processes: Verbs
Dataflows: Nouns
Data Stores: Nouns
External Entities: Nouns
1) Process’s input & output are different
2) Each data store should have at least
one data flow in and one data flow out
3) Each process should have at least one
data flow in and one data flow out
4) All inputs and outputs should be
labeled
5) Processes should have an identifier
(Ex., 1.0, 2.0, etc.)
Process Process
Process-to-Process
Process Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S toreData S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data StoreExternal Entity-to-Data Store
External
Entity
Data S tore
External
Entity
Data S tore
External
Entity
Data S tore
External Entity-to-Data Store
External
Entity
Data S toreProcess Process
Process-to-Process
Process-to-External Entity
Process
External
Entity
Data S tore
Process-to-Data Store
Process
External Entity-to-External Entity
External
Entity
External
Entity
Data S tore
Data Store-to-Data Store
Data S tore
External Entity-to-Data Store
External
Entity
Data S tore
DFD_Rules.vsdxTop Process
Stage 2: Requirements Specification
Before you begin this assignment, be sure you have read the Case Study and all assignments for this class, especially Stage 4: Final System Report. The feedback you received on your Stage 1 assignment should be reviewed and used as you proceed with Stage 2.
Purpose of this Assignment
This assignment gives you the opportunity to specify clear and concise requirements, including the use of data and process models, for a system that enables a productive change in a way the business is conducted. This assignment specifically addresses the following course outcomes to enable you to:
· apply a systematic approach to .
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docxketurahhazelhurst
CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the United States, Canada, and Germany. Go to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a different MNC.) Set the date range so that you can obtain quarterly values of the U.S. stock index for the last 20 quarters. Insert the quarterly data on a spreadsheet. Compute the percentage change in IBM’s stock price for each quarter. Next go to finance.yahoo.com/stock-center/ and click (under U.S.) on S&P Composite 1500 Index, which represents the U.S. stock market index, so that you can derive the quarterly percentage change in the U.S. stock index over the last 20 quarters. Then run a regression analysis with IBM’s quarterly return (percentage change in stock price) as the dependent variable and the quarterly percentage change in the U.S. stock market’s value as the independent variable. (Appendix C explains how Excel can be used to run regression analysis.) The slope coefficient serves as an estimate of the sensitivity of IBM’s value to the U.S. market returns. Also, check the fit of the relationship based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under “Europe”) on DAX, which represents the German stock market index. Repeat the process described in exercise 1 so that you can assess IBM’s sensitivity to the German stock market. Compare the slope coefficient between the two analyses. Is IBM’s value more sensitive to the U.S. market or the German market? Does the U.S. market or the German market explain a higher proportion of the variation in IBM’s returns (check the R-squared statistic)? Offer an explanation of your results.
Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset passwords
d. The fourth user grant column rights to the Course_Activity table allow access to the Course Code and Grade column. Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have given them
a. User 1 login and create a VIEW for user 2 that just displays the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do not have MySQL Enterprise we cannot use the Audit function but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User ...
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PRO.docxclarebernice
CIS 321 Case Study ‘Equipment Check-Out System’MILESTONE 3 – PROCESS MODELING- Part I
______________________________________________________________________________________________________
Synopsis
The requirements analysis phase answers the question, "What does the user need and want from a new system?" The requirements analysis phase is critical to the success of any new information system! In this milestone we need to identify what information systems requirements need to be defined from the system users’ perspectives.
The Data flow diagram (DFD) has gained popularity as a technique for expressing system requirements for two reasons:
• It facilitates development, which often leads to building systems that better
satisfy user needs
• Data flow diagrams and narratives are easy for users to understand.
In this milestone you will first uncover external agents, processes and data flows that define the requirements for the proposed system and document that information. You will use that to build the Context Data Flow Diagrams.
Objectives
After completing this milestone, you should be able to:
• Understand and perform the techniques for requirements discovery.
• Determine external agents (external entities) and their relationship with the
System, identify data flows.
• Construct the Context DFD using VISIO.
Prerequisites
Before starting this milestone, the following topics should be covered:
• The problem analysis phase — Chapters 3 and 5
• PIECES framework — Chapters 3 and 5
• Problem analysis techniques — Chapter 6
• Process modeling techniques — Chapter 9
Assignment
Now that we have studied the current system and analyzed some of its problems and opportunities, plus gained approval to proceed, we can now start to identify the business requirements for the system and model them. In this assignment we will use our results of the previous Milestone and transcripts of an interview with the Equipment Depot staff. The results of this activity will identify the system requirements for the proposed system.
Exhibit 3.1 is a copy of the transcript of the interview. Refer to the transcript, sample forms, and results from Milestones 1 and 2 for the information necessary to complete the activities.
Activities
1. Identify External entities and relationship with system
2. Identify data flows
3. Prepare Context level Data FlowDiagram
Deliverable format and software to be used are according to your instructor’s specifications. Deliverables should be neatly packaged in a binder, separated with a tab divider labeled “Milestone 3”.
References
• Transcripts of Interview - Exhibit 3.1 (see below)
Deliverables:
Context level DFD:
Due: __/__/__
Time: _______
ADVANCED OPTIONFor the advanced option, compile the process description to note processes’ input and output.
Due: __/__/__
Time: _______
Milestone’s Poin ...
Assignment Grading Rubric Course IT286 Unit 4 Po.docxssuser562afc1
This document provides the grading rubric and instructions for a two-part assignment in an IT security course. The assignment addresses outcomes related to wireless security, authentication, access control, and cloud security. For Part 1, students must complete short essay questions and tables addressing these topics. For Part 2, students must perform labs demonstrating wireless network configuration, packet sniffing tools, and Platform as a Service and provide screen captures. The rubric allocates a total of 50 points across both parts and deducts points for errors.
The document discusses system analysis and design. It defines a system as a collection of components that work together to achieve an objective. The key phases of the system development life cycle are system study, feasibility study, system analysis, system design, coding, testing, and implementation. System analysis involves a detailed study of the current system and user requirements to specify a new system.
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
IT 600 Final Project Guidelines and Rubric Overview.docxAASTHA76
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in -depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a tech nical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real -time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendati ons for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organi zational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the
operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in
the form of a detailed technology review.
SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operati ng system if you have
the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evalua tion incrementally.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality
final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.
Prompt
Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used
to implement processes and threads, the file syst.
The document outlines the 8 phases of the system development life cycle: 1) defining mission and goals, 2) specifying information needs, 3) analyzing the existing system, 4) designing the new system, 5) coding the new system, 6) testing the new system, and 7) implementing the new system. It provides details on the key activities and objectives for each phase, from initially identifying problems and goals through implementing the new system and training users.
IT 600 Final Project Milestone Two Template Analytical Organi.docxpriestmanmable
IT 600 Final Project Milestone Two Template: Analytical Organizational Profile
Directions: Insert your answers directly in the Student Analysis column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI.
Note: Consider the work you did for Milestone One as you populate the table.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
Business Requirement
Multiprocessing
Tech Description
Business Requirement
Multithreading
Tech Description
Business Requirement
Virtual Memory
Tech Description
Business Requirement
System Call Interface
Tech Description
Business Requirement
Security
Tech Description
Business Requirement
Device Drivers
Tech Description
Business Requirement
Fault Tolerance
Tech Description
Business Requirement
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by ...
FOR MORE CLASSES VISIT
www.cst630rank.com
Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You
The document provides an overview of fundamentals of software development including definitions of software, characteristics of software, software engineering, layered approach to software engineering, need for software engineering, and common software development life cycle models. It describes system software and application software. It outlines characteristics like understandability, cost, maintainability, modularity, reliability, portability, documentation, reusability, and interoperability. It also defines software engineering, layered approach, and need for software engineering. Finally, it explains popular life cycle models like waterfall, iterative waterfall, prototyping, spiral, and RAD models.
FOR MORE CLASSES VISIT
www.cst630rank.com
Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report
For more classes visit
www.snaptutorial.com
Project 1
Step 1: Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Neetu Marwah
The document discusses the software development life cycle (SDLC). It describes SDLC as a process used in software engineering to break down development into distinct phases to better plan and manage projects. The phases include requirements study, design, development, testing, and maintenance. The document outlines each phase in detail and notes the key documents produced and activities involved at each stage of the SDLC process.
This document outlines the steps for a security assessment report (SAR) project. It involves conducting a security analysis baseline of an organization's IT systems, determining a network defense strategy, planning a penetration test, conducting the penetration test to find vulnerabilities, and completing a risk management cost-benefit analysis. The SAR and an executive briefing presenting the findings are the final deliverables.
The document provides instructions for a 6-step project on risk, threat, and vulnerability management. It involves conducting a security analysis baseline of an organization's IT systems, determining a network defense strategy using testing procedures, planning a penetration testing engagement with rules of engagement, conducting a network penetration test using tools to find security issues, completing a risk management cost-benefit analysis, and compiling the findings into a security assessment report, executive briefing, and lab report.
Similar to Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docx (20)
Write a 10 page Case study with the below instructions.Body (.docxsleeperfindley
Write a 10 page Case study with the below instructions.
Body: (Label headings according to subject/content)
Identify problems, issues, variables, and relationships related to the case
Discuss problems and List symptoms
Isolate critical issues
Conduct SWOT analysis and discuss the components
Strengths
Weaknesses
Opportunities
Threats
.
write a 1.5 – two-page paper to reflect on that week’s material .docxsleeperfindley
write a 1.5 – two-page paper to reflect on that week’s material to discuss questions that arose, and critique.
week’s material
White supremacy, Racism and Racial Formations
o Harris, C. I. (1993). Whiteness as property. Harvard Law Review, 106(8), 1707-1791.
o Wells, Ida B. (1900). Lynch Law in America. Re-published in Blackpast, Jul. 11, 2010.
o Tuck, E., & Yang, K. W. (2012). Decolonization is not a metaphor. Decolonization: Indigeneity, education & society, 1(1).
.
write a 1-page reflection discussing your ideas about how the new ag.docxsleeperfindley
write a 1-page reflection discussing your ideas about how the new age of technology has impacted the functioning of the mind. Consider the diversity of the mind such as relationships, friendships, employment, decisions, emotions, etc.
Use a minimum one scholarly reference (article, credible site, textbook), APA style writing (cover page, indented paragraphs, references page, in-text citations).
.
Write a 1-2 page paper. Deliverable length does not include the titl.docxsleeperfindley
Write a 1-2 page paper. Deliverable length does not include the title and references.
1.
What are the differences between Social Media, E-mail and Instant Messaging? (35pts.)
2.
List some of the Social Media Risks (35pts.)
3.
Provide three best practices for managing Social Media Records. (35pts.)
4. Use the APA format to include your references (20pts.)
.
Write a 1-2 page comparative evaluation of Hewletts and Lancys a.docxsleeperfindley
Write a 1-2 page
comparative evaluation of Hewlett's and Lancy's arguments about learning and teaching in childhood
. You should introduce the topic, and include
at least
a paragraph summarizing each piece (follow the Comprehend section of your Rapid Critique Checklist) followed by your comparative critical evaluation of the authors' positions (Critique, Connect, and Communicate).
Key questions:
How does each author define "teaching"? Why is it important to understand how children learn from others? What evidence does each author present to support their argument? What are the implications of each argument (i.e. if X is true, what does that tell us about social learning)? What are the strengths and weaknesses of each argument? Take a position; which author do you agree with and why?
Materials:
Readings:
Lancy, David, Chapter 8, Ethnographic Perspectives on Culture Acquisition
Hewlett, B. S., & Roulette, C. J. (2016). Teaching in hunter–gatherer infancy.
Royal Society open science
,
3
(1), 150403.
Videos/Audio Files:
David Lancy, Taming the Autonomous Learner,
https://www.youtube.com/watch?v=g6-gWeO5xa0
.
Write a 1-2-page paper. Deliverable length does not include the .docxsleeperfindley
Write a 1-2-page paper. Deliverable length does not include the title and references.
1. What are the differences between Social Media, E-mail and Instant Messaging?
2. List some of the Social Media Risks
3. Provide three best practices for managing Social Media Records.
Use the APA format to include your references
.
Write a 1-2 page paper. Deliverable length does not include the .docxsleeperfindley
Write a 1-2 page paper. Deliverable length does not include the title and references.
What is IT Governance?
Describe two IT Governance Frameworks?
Out of the ten IT Governance principles, which do you consider the top three in importance and why?
Use the APA format to include your references.
.
Write a 1-2 page paper (typed, double-spaced, Times New Roman font, .docxsleeperfindley
Write a 1-2 page paper (typed, double-spaced, Times New Roman font, basic MLA format) telling me how you became the writer or reader (or lack of) that you are today. (Reminder: All of our essays should be in MLA format.)
*** What experiences did you have as a child or in school with reading or writing that shaped you as a writer?
*** Who are your influences (teachers, parents, famous writers, songwriters) or inspirations for writing?
*** Basically, you are writing a memoir of your writing and reading experiences and describing yourself as a writer.
.
Write a 1-2 page critique of 1 of the readings listed below- Ap.docxsleeperfindley
Write a 1-2 page critique of 1 of the readings listed below:
- Appeal by David Walker
- Narrative In Life of Frederick Douglas
- Incidents in the life of a slave girl
- 12 years a slave (movie)
Guidelines:
1. Who is the author?
2. What were the TWO media pathways the author was using for his message?
3. Did the authors message pave the way for a movement of social justice? What was the movement?
4. What audience does the author seek to reach? Does the author seek to persuade or dissuade?
5. Is the authors argument still being used today to help people organize, analyse and build bridges of change for the future?
.
Write a 1- to 2-page summary and include the followingEar.docxsleeperfindley
Write a 1- to 2-page summary and include the following:
Early in your Assignment, when you relate which dataset you analyzed, please include the mean of the following variables. If you are using the Afrobarometer Dataset, report the mean of Q1 (Age). If you are using the HS Long Survey Dataset, report the mean of X1Par1Edu.
A description of what the each of the variables measure.
A description of the unit of analysis.
A description and explanation of the levels of measurement for each variable (i.e., nominal, ordinal, interval, ratio).
Explain how you might conceive these variables to be used to answer a social change question. What might be the implications for social change?
Support your summary using appropriate scholarly citations and references. Use proper APA format.
.
Write a 1-2 double-spaced short essay about some of the factors we h.docxsleeperfindley
Write a 1-2 double-spaced short essay about some of the factors we have discussed in class which led to the Enlightenment and the challenges it posed to Christianity.
Here are some of the historical factors to consider: Medieval Scholasticism, the Protestant Reformation, religious wars, and the scientific revolution.
Try to show how a couple of these events led to the Enlightenment, and tell briefly about the challenges the Enlightenment brought for Christianity.
Due in 8 hours
.
Write a 1- to 2-page paper or create a 6- to 8-slide presentation wi.docxsleeperfindley
Write a 1- to 2-page paper or create a 6- to 8-slide presentation with visuals and speaker notes about how you are connected to the physical-network layer of the cyber domain. Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices. Explain how those devices are connected to a larger network, such as a cellular provider or ISP. Discuss at least 3 threats to you and your connected networks. Format any references according to APA guidelines.
Typical devices I have connected to my house are as follows:
Modem from ISP (Wave)
Orbi Router - plus 2 satellites
5 laptops
2 smart TV's
14 FEIT Smart dimmable light switches
4 FEIT/Wemo smart plugs
5 Alexa's
Garage Opener unit
1 networked printer
Dual Microwave/Oven smart appliance
2 Roomba Vacuum Cleaners
Honeywell Thermostat
.
Write a 1,750- to 2,100-word paper describing how verbal and nonve.docxsleeperfindley
This document outlines a paper assignment to discuss how verbal and nonverbal communication can impact interactions in police situations, courtrooms, corrections facilities, and juvenile facilities. The paper should identify one communication guideline for each setting and include 1-3 references. It should be 1,750-2,100 words and follow APA style guidelines.
Write a 1- to 2-page paper or create a 6- to 8-slide presentati.docxsleeperfindley
Write a 1- to 2-page paper or create a 6- to 8-slide presentation with visuals and speaker notes about how you are connected to the physical-network layer of the cyber domain. Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices. Explain how those devices are connected to a larger network, such as a cellular provider or ISP. Discuss at least 3 threats to you and your connected networks. Format any references according to APA guidelines.
Typical devices I have connected to my house are as follows:
Modem from ISP (Wave)
Orbi Router - plus 2 satellites
5 laptops
2 smart TV's
14 FEIT Smart dimmable light switches
4 FEIT/Wemo smart plugs
5 Alexa's
Garage Opener unit
1 networked printer
Dual Microwave/Oven smart appliance
2 Roomba Vacuum Cleaners
Honeywell Thermostat
.
Write a 1,800 word coherent essay that examines women’s stru.docxsleeperfindley
Write a 1,800 word coherent essay that examines women’s struggles for workplace equality from the 1940s through the 1970s. What were the various forms of sex-based discrimination that working women encountered during this period? What strategies and tactics did women use in their fight for equal employment opportunity? How successful were they? What obstacles did these women encounter? What were the broader social and political consequences of their efforts?
.
Write a 1,400- to 1,750-word paper that discusses future trends in.docxsleeperfindley
Write
a 1,400- to 1,750-word paper that discusses future trends in health care.
Include
an assessment of how the Internet, or any other form of electronic communication, may be used as an external delivery source in communicating patient-specific information.
Address
the impact of distance delivery on health care.
Consider
the use of e-mail, telemedicine, and the electronic transfer of records.
Share
your assessment of how these issues impact health care today and how they might impact health care 5 years from now.
Use
a minimum of three peer reviewed references, in APA, format, in addition to the textbooks for the course that directly support your analysis.
Format
your paper consistent with APA guidelines.
.
Write a 1,400- to 1,750-word paper that examines the influences of.docxsleeperfindley
Write a 1,400- to 1,750-word paper that examines the influences of traits—such as trait theory—and biology—such as temperament—on personality development.
Answer the following questions in your paper:
•How does the gene-environment interaction influence personality?
•Is culture a factor in personality expression?
•What do twin studies show us about the inheritability of personality?
•What characteristics of temperament are stable over time and contribute to our adult personality?
•Are specific characteristics consistent over situation and over time?
Include an explanation of how the following personality models may be adapted to account for variation in the personal, societal, and cultural factors discussed in your paper:
•Biological model
•Five-factor trait theory
•Temperament model of personality
Use proper in-text citation and APA format.
.
Write a 1,500-1,900-word double-spaced essay on one of the following.docxsleeperfindley
Write a 1,500-1,900-word double-spaced essay on one of the following options and make sure to
answer all parts of the question
:
Beginning with thinkers such as Thomas Hobbes, modern political and social thought has been preoccupied with the problems of material existence, from the struggle for mere survival to the pursuit of earthly comforts. This is perhaps most evident in the primacy accorded to
property
in explaining and justifying political relations.
Compare and contrast the ways that John Locke, Jean-Jacques Rousseau, and Karl Marx understand the role of property in explaining politics. In particular, discuss how each thinker uses the concept of property to explain 1) various forms of inequality, 2) the sources of conflict in society, and 3) the main purposes or aims of government (legitimate or not).
The problem of
violence
is a pervasive theme in modern political thought. Even though most political thinkers seek to minimize if not eliminate violence in politics, some political thinkers do advocate the use of violence under certain conditions. How do John Locke and Karl Marx view the role of violence in politics?
In answering this question, 1) discuss how Locke and Marx describe the various
sources
of violence in politics (whether legitimate or not), 2) explain how they think that violence contributes to
political
change
, and 3) explain under what conditions, if any, they think the use of violence is
justified
.
One of the most vexing issues in political thought concerns the problem of political
obligation
. Specifically, political thinkers have puzzled over how easily the “many” are governed by the “few.” What explanations have modern thinkers given for why it is so easy for the few to rule the many? Answer this question with reference to at least two of the following thinkers: John Locke, Jean-Jacques Rousseau, and Karl Marx.
.
Write a 1,400- to 1,750-word paper in which you describe the key e.docxsleeperfindley
The Fourth, Fifth and Sixth Amendments guarantee important rights that impact criminal procedure conducted by courts and police officers, such as protections against unreasonable searches and seizures, self-incrimination, and the right to a fair trial. These rights in the Bill of Rights are applied to state action through the Due Process Clause of the Fourteenth Amendment. The paper should be 1,400-1,750 words and formatted according to APA style.
Write a 1,250-1,500-word paper analyzing concepts of contemporary .docxsleeperfindley
Write a 1,250-1,500-word paper analyzing concepts of contemporary financial management within the context of today's economic conditions and the increased occurrences of corporate restructuring.
Research financial management and corporate restructuring. Use a minimum of three articles to support your analysis. When researching, focus on articles which discuss real-world cases that exemplify the essence of each required component below and how they can or may have contributed to a corporate restructuring.
Your analysis should include a discussion of the following:
The roles and objectives of financial management.
The significance of evaluating financial performance, financial planning, and forecasting, and examples of how each can be carried out.
Current conditions of fixed income and common stock securities and how these conditions impact financial management.
Risk and return and its role in financial management.
The main objectives of
a firm or and individual should never invest there capital without ensuring that their assets. A company or and individual should invest there capital in a way that their assets will obtain an income of money before the liabilities demand an expense.
Liquidity is important to firms, to ensure they are capable of maintaining an adequate and regular amount of funds.
Capital budgeting is to insure that a firm is utilizing funds properly and to the best judgments while increasing the capacity of an enterprise.
Capital structure management is in place to ensure that proper decision making is being practiced and that funding is allocated properly. Risk management is also important which includes the management of interest rates, financial, market prices, exchange rates, and credit management.
It is important to have financial control of a firm and exercise the control of finances.
The main roles of a firm are important to achieve the main goal of profitability for stakeholders and the firm. The
upper level executives of a firm are given specific roles for different business units in an organization in order to have
involvement of best practice in reporting, financial management and financial governance.
For a company to be successful and legal, executives must perform
adequate planning and budgeting to point out the liquidity slack and liquidity surplus periods.
Its important for a firm to balance priorities within a budget and is responsible for the financial projections of the firm.
An executive must know and understand how much a product is expected to cost and how much revenue it is expected to earn so that the executive can invest the appropriate amount in the product.
While staying legal and ensuring the companies profitability, there are many risks to take in consideration. While playing out the duties as an executive it is important to manage risk throughout the company's balance sheet while providing robust advice on improving the performance of assets.
In conclusion, there is a lot t.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docx
1. Lab #1: Develop System Administration Procedures for
Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement
systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry
recognized best practice for maintaining system integrity and
availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures
which can be incorporated into an organization’s security
implementation guidance and documentation. For each
procedure, you will develop, test, and document the steps
required to implement the selected best practices and security
configuration guidance (as provided in the lab instructions and
notes). You will write three separate procedures for this lab:
2. (a)
Creating, Using, Removing System Restore Points for Windows
8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see
Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make
the procedures easier to read, you should divide your
3. procedures into groups of related steps. Place a group heading
(e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be
followed by a brief paragraph that explains the purpose of the
group (e.g. This group (or “section”) contains step by step
instructions for creating System Restore Points using the
“System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
4. [Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration
Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool,
open the
System
tool from Control Panel (Control Panel > System and Security
5. > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help,
Microsoft Technet, etc.) for instructions for using the Windows
8.1 System Restore Point capability. Using those sources,
research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system restore point to roll-back changes made to a
Windows 8.1 system
c.
Remove system restore points from a Windows 8.1 system
(some and all)
Note:
you will not be able to do the full rollback (item 2(b)) in the
VDA due to security restrictions. Your procedure should
contain these steps, however. Use the Microsoft “System
Restore” documentation to obtain the required information
about what happens after the system restart for the rollback.
You do not need to provide an “after” snapshot for this step.
3.
Paste the procedure outline (Figure 1) into your Lab #1 file.
Make sure that you insert a page break so that the “Title”
heading appears at the top of a new page.
4.
Using the required outline, develop a systems administration
procedure which can be used to perform tasks related to item #1
6. (management and use of system restore points).
5.
Test your draft procedures using the virtual machine provided in
the online lab environment (UMUC’s VDA).
Do NOT use your personal computer or a work computer.
6.
As you run your tests, collect screen snapshots to illustrate key
steps in your procedures. (Use the snipping tool on your local
PC to snapshot portions of the VDA browser or client window.)
Insert these snapshots at the appropriate points in your
procedure. The snapshots must show the procedures as run in
the VDA environment.
Part (b): Managing Programs and Features for Windows 8.1
1.
Investigate the
Programs and Features
tool (used to manage installed programs and optional features /
capabilities). To access the tool, open
Programs and Features
from the Windows Control Panel.
2.
Identify appropriate sources of information (e.g. Windows Help,
Microsoft Technet, etc.) for instructions for using the
Programs and Features
tool. Using those sources, research the procedures required to
perform the following tasks:
a.
Turn Windows Features On or Off
7. b.
Modify, Repair, or Uninstall a program from a Windows 8.1
system
c.
Select and Install Updates for Windows and Windows
Applications, Find an installed Update, Remove an installed
update
3.
Paste a second blank copy of the procedure outline (from Figure
1) at the end of your Lab #1 file. Make sure that you insert a
page break before you paste to ensure the “Title” heading
appears at the top of a new page.
4.
Using the required outline, develop a systems administration
procedure which can be used to perform tasks related to item
#2. Provide examples for each of the required tasks. (Select a
specific feature, program, or update and use that as an example
in your procedure.)
5.
As you run your tests, collect screen snapshots to illustrate key
steps in your procedures. (Use the snipping tool on your local
PC to snapshot portions of the VDA browser or client window.)
Insert these snapshots at the appropriate points in your
procedure. The snapshots must show the procedures as run in
the VDA environment.
Part (c): Implementing Security Configuration Rules Using the
Local Group Policy Editor
Note:
you are NOT implementing the DISA / DoD STIG in this
section. You are implementing a set of security configuration
rules that your “company” has selected from
8. industry accepted sources.
1.
Investigate the
Local Group Policy Editor
tool (Windows Key + R then type gpedit.msc). Pay particular
attention to the menu tree in the left hand pane (expand and
review the categories of settings which can be changed using
this tool).
2.
Research the security configuration rules listed in Table 1.
These rules were developed from the Department of Defense
Security Technical Implementation Guidance for Windows 8.1
.
3.
When you are ready to begin writing your procedure, paste a
blank copy of the procedure outline (from Figure 1) at the end
of your Lab #1 file. Make sure that you insert a page break
before you paste to ensure the “Title” heading appears at the top
of a new page.
4.
Determine how you will group related security configuration
rules. Each group will need a “section heading” (see Figure 1)
and introductory paragraph (2 -3 sentences) which explains the
purpose of the group.
5.
Next, develop a step by step procedure for each group of rules.
See the
“Suggested Procedure Group”
column in Table 1 for suggested categories. Your groupings
should allow for inclusion of additional, related rules at a later
9. date. (For example, there are two “energy saving” rules in the
table; an organization may wish to add additional rules to this
category at some point in the future.)
6.
For each group of rules, develop step-by-step written
procedures for systems administrators. Your written procedures
must implement the “remediation” guidance as listed in Table 1
[i]
.
7.
Test your procedures by running them in the VDA. As you run
your tests, collect screen snapshots to illustrate key steps in
your procedures. (Use the snipping tool on your local PC to
snapshot portions of the VDA browser or client window.) Insert
these snapshots at the appropriate points in your procedure. The
snapshots must show the procedures as run in the VDA
environment.
8.
Incorporate your screen snapshots for key steps into the draft
procedures. Each snapshot should be placed UNDER (after) the
step to which it applies. Captions are not required.
9.
Make any additional changes required to address issues found
during testing of the step-by-step procedures.
Finalize Your Deliverable
1.
Using the grading rubric as a guide, refine your step-by-step
procedures. Your final products should be suitable for inclusion
in an organization’s
Systems Administrator’s Handbook
. Remember that you are preparing multiple system
10. administration procedures which must be presented separately.
2.
As appropriate, cite your sources using footnotes or another
appropriate citation style.
3.
Use the
resources
section to provide information about recommended readings and
any sources that you cite. Use a standard bibliographic format
(you may wish to use APA since this is required in other CSIA
courses). I
nformation about sources and recommended readings, including
in-text citations, should be formatted consistently and
professionally.
4.
Each procedure document should be placed in the listed order in
a SINGLE FILE (see deliverables list above). Each file should
start with a title page which lists the following information:
·
Lab Title and Number
·
Procedure Name
·
Date
·
Your Name
5.
The
11. CSIA 310 Template for Lab Deliverable.docx
file is set up to provide the required title page and three lab
procedure templates.
Additional Requirements for this Lab
1.
Your target audience for these procedures will be Windows
8/8.1 SYSTEM ADMINISTRATORS. Do not write procedures
for home users or individuals using their own computers.
2.
Your step-by-step procedures should tell the System
Administrator where to find and how to launch the systems
administration tools used to change security configuration
settings for the Windows 8.1 operating system.
3.
It is not necessary to specify every step that a system
administrator must take to implement the security rules. But,
you must address each security configuration rule separately
and include enough detail that your reader will understand how
to perform the required steps to implement the security
configuration changes.
4.
Use screen snapshots to cue the reader to important steps or
provide information required to complete check points for
proper completion of a step or set of steps (e.g. including a
snapshot which shows the “after” state for a group of security
settings).
5.
Make sure that your snapshots will enhance the reader’s
understanding of the procedure and required configuration
changes. Too many snapshots or illustrations can make a
12. procedure difficult to use.
6.
All snapshots must be created by you for this lab using screen
captures showing how you personally performed (tested) the
systems administration procedure as written by you. You may
not copy and paste images from help pages, manuals, or the
Internet.
7.
Images (screen snapshots) should be cropped and sized
appropriately.
8.
A screen snapshot belonging to a specific procedure step does
not require a caption.
9.
Make sure that the sources you cite or recommend (
additional reading
) are authoritative and are the best ones available.
10.
Your Operating Environment section should identify the
hardware, operating system, and/or software applications to
which the procedure applies. For this lab, your procedures will
apply to:
a.
Hardware: Laptop or Desktop Computers
b.
Operating System: Windows 8.1 Professional
11.
Your Notes, Warnings & Restrictions section should include
13. important information that is not found elsewhere in the
procedures document. For example, this section could include
information about alternatives to the selected security
configuration settings. Or, this section could include
information about related security procedures or policies. If this
procedure implements controls relevant to an external security
requirement, e.g. the HIPAA Security Rule, then that
information should be included in the notes section. Consult the
Windows 8.1 STIG
to see what types of information you may need to include in
your document. This section should also include important
information about harm or risk that could occur if the procedure
is not correctly followed or implemented.
12.
The procedures that you write for this lab will become part of
the final project for this course (System Administration
Manual).
Table 1 begins on the next page.
Table 1. Required Security Configuration Rules
Rule ID
Rule
Vulnerability Discussion
Remediation
Suggested Procedure Group
SV-48022r1_rule
The required legal notice must be configured to display before
console logon.
Failure to display the logon banner prior to a logon attempt will
negate legal proceedings resulting from unauthorized access to
system resources.
Configure the policy value for Computer Configuration ->
14. Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Message text for users
attempting to log on" to the [banner text]. Note: see STIG for
DoD Warning Notice.
In registry, check make sure that you have configured the
"LegalNoticeText" value for key:
HKLMSOFTWAREMicrosoftWindows
NTCurrentVersionWinlogon
Banner
SV-48049r1_rule
The Ctrl+Alt+Del security attention sequence for logons must
be enabled.
Disabling the Ctrl+Alt+Del security attention sequence can
compromise system security. Because only Windows responds
to the Ctrl+Alt+Del security sequence, you can be assured that
any passwords you enter following that sequence are sent only
to Windows. If you eliminate the sequence requirement,
malicious programs can request and receive your Windows
password. Disabling this sequence also suppresses a custom
logon banner.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Do not require
CTRL+ALT+DEL" to "Disabled".
Banner
SV-48510r1_rule
The Windows dialog box title for the legal banner must be
configured.
Failure to display the logon banner prior to a logon attempt will
negate legal proceedings resulting from unauthorized access to
system resources.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive Logon: Message title for users
15. attempting to log on" to a site-defined warning.
In registry, check make sure that you have configured both the
"LegalNoticeCaption" value for key:
HKLMSOFTWAREMicrosoftWindows
NTCurrentVersionWinlogon
Banner
SV-48313r2_rule
The display must turn off after 20 minutes of inactivity when
the system is running on battery.
Turning off an inactive display supports energy saving
initiatives. It may also extend availability on systems running
on a battery.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Video and Display Settings -> "Turn Off the Display (On
Battery)" to "Enabled" with "1200" seconds or less.
Energy Saving
SV-48314r2_rule
The display must turn off after 20 minutes of inactivity when
the system is plugged in.
Turning off an inactive display supports energy saving
initiatives.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Video and Display Settings -> "Turn Off the Display (Plugged
In)" to "Enabled" with "1200" seconds or less.
Energy Saving
SV-48051r1_rule
The Smart Card removal option must be configured to Force
Logoff or Lock Workstation.
Unattended systems are susceptible to unauthorized use and
must be locked. Configuring a system to lock when a smart card
is removed will ensure the system is inaccessible when
unattended.
16. Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Smart card removal
behavior" to "Lock Workstation" or "Force Logoff".
Lock Screen
SV-48310r2_rule
App notifications on the lock screen must be turned off.
App notifications that are displayed on the lock screen could
display sensitive information to unauthorized personnel.
Turning off this feature will limit access to the information to a
logged on user.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Turn off app
notifications on the lock screen" to "Enabled".
Lock Screen
SV-55990r2_rule
Camera access from the lock screen must be disabled. (Windows
8.1)
Enabling camera access from the lock screen could allow for
unauthorized use. Requiring logon will ensure the device is only
used by authorized personnel.
This requirement is NA for the initial release of Windows 8. It
is applicable to Windows 8.1. If the device does not have a
camera, this is NA.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent enabling lock screen camera" to "Enabled".
Lock Screen
SV-55991r2_rule
The display of slide shows on the lock screen must be disabled.
(Windows 8.1)
Slide shows that are displayed on the lock screen could display
sensitive information to unauthorized personnel. Turning off
this feature will limit access to the information to a logged on
user.
17. Configure the policy value for Computer Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent enabling lock screen slide show" to "Enabled". This
requirement is NA for the initial release of Windows 8. It is
applicable to Windows 8.1.
Lock Screen
SV-48018r1_rule
The shutdown option must be available from the logon dialog
box.
Preventing display of the shutdown button in the logon dialog
box may encourage a hard shut down with the power button.
(However, displaying the shutdown button may allow
individuals to shut down a system anonymously.)
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Shutdown: Allow system to be shutdown
without having to log on" to "Enabled".
Logon Screen
SV-48164r1_rule
The system must be configured to prevent the display of the last
username on the logon screen.
Displaying the username of the last logged on user provides half
of the userid/password equation that an unauthorized person
would need to gain access. The username of the last user to log
onto a system must not be displayed.
Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Do not display last user
name" to "Enabled".
Logon Screen
SV-48228r2_rule
The classic logon screen must be required for user logons.
The classic logon screen requires users to enter a logon name
and password to access a system. The simple logon screen or
Welcome screen displays usernames for selection, providing
part of the necessary logon information.
18. Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Always use
classic logon" to "Enabled".
If the system is a member of a domain, this is NA.
Logon Screen
SV-48244r2_rule
Users must be prompted for a password on resume from sleep
(on battery).
Authentication must always be required when accessing a
system. This setting ensures the user is prompted for a password
on resume from sleep (on battery).
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Sleep Settings -> "Require a password when a computer wakes
(on battery)" to "Enabled".
Logon Screen
SV-48245r2_rule
The user must be prompted for a password on resume from sleep
(plugged in).
Authentication must always be required when accessing a
system. This setting ensures the user is prompted for a password
on resume from sleep (plugged in).
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Power Management ->
Sleep Settings -> "Require a password when a computer wakes
(plugged in)" to "Enabled".
Logon Screen
SV-48460r2_rule
The machine inactivity limit must be set to 15 minutes, locking
the system with the screensaver.
Unattended systems are susceptible to unauthorized use and
should be locked when unattended. The screen saver should be
set at a maximum of 15 minutes and be password protected.
This protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
19. Configure the policy value for Computer Configuration ->
Windows Settings -> Security Settings -> Local Policies ->
Security Options -> "Interactive logon: Machine inactivity
limit" to "900" seconds".
Logon Screen
SV-55993r2_rule
The network selection user interface (UI) must not be displayed
on the logon screen. (Windows 8.1)
Enabling interaction with the network selection UI allows users
to change connections to available networks without signing
into Windows.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Logon -> "Do not
display network selection UI" to "Enabled".
Logon Screen
SV-48464r2_rule
Notifications from Windows Push Network Service must be
turned off.
The Windows Push Notification Service (WNS) allows third-
party vendors to send updates for toasts, tiles, and badges.
Configure the policy value for User Configuration ->
Administrative Templates -> Start Menu and Taskbar ->
Notifications -> "Turn off notifications network usage" to
"Enabled".
Notifications
SV-48465r2_rule
Toast notifications to the lock screen must be turned off.
Toast notifications that are displayed on the lock screen could
display sensitive information to unauthorized personnel.
Turning off this feature will limit access to the information to a
logged on user.
Configure the policy value for User Configuration ->
Administrative Templates -> Start Menu and Taskbar ->
Notifications -> "Turn off toast notifications on the lock screen"
to "Enabled".
Notifications
20. SV-48240r2_rule
A system restore point must be created when a new device
driver is installed.
A system restore point allows a rollback if an issue is
encountered when a new device driver is installed.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Device Installation ->
"Prevent creation of a system restore point during device
activity that would normally prompt creation of a restore point"
to "Disabled".
Restore Point
SV-48273r2_rule
A screen saver must be enabled on the system.
Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Enable Screen Saver"
to "Enabled".
Screen Saver
SV-48274r2_rule
The screen saver must be password protected.
Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Password protect the screen saver" to "Enabled".
Screen Saver
SV-48461r2_rule
A screen saver must be defined.
21. Unattended systems are susceptible to unauthorized use and
must be locked when unattended. Enabling a password-protected
screen saver to engage after a specified period of time helps
protects critical and sensitive data from exposure to
unauthorized personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Force specific screen saver" to "Enabled" with "scrnsave.scr"
specified as the Screen saver executable name.
Screen Saver
SV-48462r2_rule
Changing the screen saver must be prevented.
Unattended systems are susceptible to unauthorized use and
must be locked. Preventing users from changing the screen
saver ensures an approved screen saver is used. This protects
critical and sensitive data from exposure to unauthorized
personnel with physical access to the computer.
Configure the policy value for User Configuration ->
Administrative Templates -> Control Panel -> Personalization -
> "Prevent changing screen saver" to "Enabled".
Screen Saver
SV-48337r2_rule
The Windows SmartScreen must be turned off.
Some features may send system information to the vendor.
Turning off this capability will prevent potentially sensitive
information from being sent outside the enterprise.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> File
Explorer -> "Configure Windows SmartScreen" to "Enabled"
with "Turn off SmartScreen" selected.
Smart Screen
SV-48119r1_rule
Media Player must be configured to prevent automatic Codec
downloads.
The Windows Media Player uses software components, referred
to as Codecs, to play back media files. By default, when an
22. unknown file type is opened with the Media Player, it will
search the Internet for the appropriate Codec and automatically
download it. To ensure platform consistency and to protect
against new vulnerabilities associated with media types, all
Codecs must be installed by the System Administrator.
Configure the policy value for User Configuration ->
Administrative Templates -> Windows Components -> Windows
Media Player -> Playback -> "Prevent Codec Download" to
"Enabled".
System Integrity
SV-48218r1_rule
The system must notify antivirus when file attachments are
opened.
Attaching malicious files is a known avenue of attack. This
setting configures the system to notify antivirus programs when
a user opens a file attachment.
Configure the policy value for User Configuration ->
Administrative Templates -> Windows Components ->
Attachment Manager -> "Notify antivirus programs when
opening attachments" to "Enabled".
System Integrity
SV-48300r2_rule
Access to the Windows Store must be turned off.
Uncontrolled installation of applications can introduce various
issues, including system instability and allow access to
sensitive information. Installation of applications must be
controlled by the enterprise. Turning off access to the Windows
Store will limit access to publicly available applications.
Configure the policy value for Computer Configuration ->
Administrative Templates -> System -> Internet Communication
Management -> Internet Communication settings -> "Turn off
access to the Store" to "Enabled".
System Integrity
SV-48341r3_rule
Automatic download of updates from the Windows Store must
be turned off.
23. Uncontrolled system updates can introduce issues to a system.
Obtaining update components from an outside source may also
potentially allow sensitive information outside of the enterprise.
Application updates must be obtained from an internal source.
Windows 8.1 split the original policy that configures this
setting into two separate ones. Configuring either one to
"Enabled" will update the registry value as identified in the
Check section. Configure the policy value for Computer
Configuration -> Administrative Templates -> Windows
Components -> Store -> "Turn off Automatic
Download of updates on Win8 machines" or "Turn off
Automatic Download and install of updates" to "Enabled".
Windows 8:
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off Automatic Download of updates" to "Enabled".
System Integrity
SV-48344r2_rule
The Windows Store application must be turned off.
Uncontrolled installation of applications can introduce various
issues including system instability, and provide access to
sensitive information. Installation of applications must be
controlled by the enterprise. Turning off access to the Windows
Store will limit access to publicly available applications.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off the Store application" to "Enabled".
System Integrity
SV-55997r2_rule
The option to update to the latest version of Windows from the
Store must be turned off. (Windows 8.1)
Uncontrolled system updates can introduce issues into the
environment. Updates to the latest version of Windows must be
done through proper change management. This setting will
prevent the option to update to the latest version of Windows
24. from being offered through the Store.
Configure the policy value for Computer Configuration ->
Administrative Templates -> Windows Components -> Store ->
"Turn off the offer to update to the latest version of Windows"
to "Enabled".
This requirement is NA for the initial release of Windows 8. It
is applicable to Windows 8.1.
System Integrity
[i]
Table 1 was adapted from the Department of Defense
Security Technical Implementation Guidance (STIG) for
Windows 8/8.1
. Available from:
http://iasecontent.disa.mil/stigs/zip/Apr2015/U_Windows_8_an
d_8-1_V1R9_STIG.zip
Rubric Name: Lab 3: Implementing Access Controls
Part (a): Managing Local Computer Account Policies
Provided an acceptable title and accurate operating
environment. Provided an excellent description of the
procedure. The description concisely and accurately addressed
all of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
25. -- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided an acceptable title and accurate operating
environment. Provided an outstanding description of the
procedure. The description appropriately addressed three or
more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided an acceptable title and accurate operating
environment. Provided a description for the procedure. The
description addressed two or more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided a title, operating environment, and description. The
description did not adequately address the contents or purpose
of the procedure.
Provided a title and brief description. Description did not
address the purpose and contents of the procedure.
Title and/or description were missing.
Provided an excellent "notes, warnings, and restrictions" section
with clear, concise, and accurate information to aid the reader
in understanding what should or should not be done when using
this procedure.
Provided an outstanding "notes, warnings, and restrictions"
section with clear and accurate information to aid the reader in
understanding what should or should not be done when
using this procedure.
Provided an adequate "notes, warnings, and restrictions" section
which included information about what should or should not be
done when
using this procedure.
Provided a "notes, warnings, and restrictions" section which
26. provided some information about the harm that could occur
when
using this procedure.
Section present but content was severely lacking in detail,
inappropriate, or grossly inaccurate.
Section was missing or blank
.
Provided an excellent resources section which described and
listed three or more relevant resource documents; section also
included complete publication information (reference list entry)
for all cited sources.
Provided an outstanding resources section which described and
listed two or more relevant resource documents; section also
included complete publication information (reference list entry)
for all cited sources.
Provided a resources section which listed publication
information (reference list entry) for two or more relevant
resource documents.
Provided a resources section which mentioned two or more
source documents or Internet resources containing relevant
information.
Provided a resources section which mentioned at least one
relevant source document or Internet resource.
Section was missing or blank
.
Divided step-by-step procedures into separate sections using 2
or more logical groupings. Provided an appropriate section
name and an excellent introduction (2-3 sentences) of each
logical group before before the step-by-step procedures for each
group or category.
Divided step-by-step procedures into sections using 2 or more
logical groupings. Provided an appropriate name and an
outstanding introduction (2-3 sentences) of each logical group
before the step-by-step procedures for each group or category.
Divided step-by-step procedures into sections using 2 or more
logical groupings. Provided an appropriate name and a brief
27. introduction (1-2 sentences) of each logical group before the
step-by-step procedures for each group or category.
Step-by-step procedures were arranged in a logical manner but
the organization needs improvement.
Step-by-step procedures were lacking in organization and
unprofessional in appearance.
Step-by-step procedures were missing.
Provided an excellent step-by-step system administration
procedure which clearly, concisely, and accurately explained
the steps required to
use Group Policy Management Console to manage policies for
local user accounts.
Included screen snapshots appropriate to the procedure.
Provided an outstanding step-by-step system administration
procedure which clearly and accurately explained the steps
required to
use Group Policy Management Console to manage policies for
local user accounts
. Included screen snapshots appropriate to the procedure.
Provided an adequate, step-by-step system administration
procedure which explained the steps
required to
use Group Policy Management Console to manage policies for
local user accounts
.
Included screen snapshots appropriate to the procedure.
Provided a procedure which explained most of the steps
required to
use Group Policy Management Console to manage policies for
local user accounts.
Provided a procedure which addressed using
Group Policy Management Console to manage policies for local
user accounts
but the procedure was unclear or lacked required steps. OR,
procedure was lacking in original work.
28. No procedure provided. OR, the procedure provided was copied
from other sources with no paraphrasing and/or no original
content.
Part (b): Managing Local User Accounts and Local Groups
Provided an acceptable title and accurate operating
environment. Provided an excellent description of the
procedure. The description concisely and accurately addressed
all of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided an acceptable title and accurate operating
environment. Provided an outstanding description of the
procedure. The description appropriately addressed three or
more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided an acceptable title and accurate operating
environment. Provided a description for the procedure. The
description addressed two or more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided a title, operating environment, and description. The
description did not adequately address the contents or purpose
of the procedure.
Provided a title and brief description. Description did not
address the purpose and contents of the procedure.
Title and/or description were missing.
Provided an excellent "notes, warnings, and restrictions" section
with clear, concise, and accurate information to aid the reader
in understanding what should or should not be done when
29. using this procedure.
Provided an outstanding "notes, warnings, and restrictions"
section with clear and accurate information to aid the reader in
understanding what should or should not be done when
using this procedure.
Provided an adequate "notes, warnings, and restrictions" section
which included information about what should or should not be
done when
using this procedure.
Provided a "notes, warnings, and restrictions" section which
provided some information about the harm that could occur
when
using this procedure.
Section present but content was severely lacking in detail,
inappropriate, or grossly inaccurate.
Section was missing or blank.
Provided an excellent resources section which described and
listed three or more relevant resource documents; section also
included complete publication information (reference list entry)
for all listed sources.
Provided an outstanding resources section which described and
listed two or more relevant resource documents; section also
included complete publication information (reference list entry)
for all listed sources.
Provided a resources section which listed publication
information (reference list entry) for two or more relevant
resource documents.
Provided a resources section which mentioned two or more
source documents or Internet resources containing relevant
information.
Provided a resources section which mentioned at least one
relevant source document or Internet resource.
Section was missing or blank.
Provided an excellent step-by-step system administration
procedure which clearly, concisely, and accurately explained
the steps required to use the PC Settings tool to create and
30. manage local user accounts. Provided an appropriate section
name and an excellent introduction (2-3 sentences) before the
step-by-step procedures. Included screen snapshots appropriate
to the procedure.
Provided an outstanding step-by-step system administration
procedure which clearly and accurately explained the steps
required to use the PC Settings tool to create and manage local
user accounts. Provided an appropriate section name and an
outstanding introduction (2-3 sentences) before the step-by-step
procedures.
Included screen snapshots appropriate to the procedure.
Provided an adequate, step-by-step system administration
procedure which explained the steps
required to use the PC Settings tool to create and manage local
user accounts. Provided an appropriate section name and
introduction (1-2 sentences) before the step-by-step procedures.
Included screen snapshots appropriate to the procedure.
Provided a procedure which explained the steps
required to use the PC Settings tool to create and manage local
user accounts.
Provided a procedure which addressed managing local user
accounts using PC Settings but the procedure was unclear or
lacked required steps. OR, procedure was lacking in original
work.
No procedure provided. OR, the procedure provided was copied
from other sources with no paraphrasing and/or no original
content.
Provided an excellent step-by-step system administration
procedure which clearly, concisely, and accurately explained
the steps required to use Control Panel > User Accounts to
create and manage user accounts. Provided an appropriate
section name and an excellent introduction (2-3 sentences)
before the step-by-step procedures. Included screen snapshots
appropriate to the procedure.
Provided an outstanding step-by-step system administration
procedure which clearly and accurately
31. explained the steps required to use Control Panel > User
Accounts to create and manage user accounts
. Provided an appropriate section name and an outstanding
introduction (2-3 sentences) before the step-by-step procedures.
Included screen snapshots appropriate to the procedure.
Provided an adequate, step-by-step system administration
procedure which
explained the steps required to use Control Panel > User
Accounts to create and manage user accounts
. Provided an appropriate section name and introduction (1-2
sentences) before the step-by-step procedures.
Included screen snapshots appropriate to the procedure.
Provided a procedure which explained most of the steps
required to
use Control Panel > User Accounts to create and manage user
accounts
Provided a procedure which addressed
using Control Panel > User Accounts to create and manage user
accounts
but the procedure was unclear and/or confusing. OR, procedure
contained some paraphrasing but was substantially lacking in
original work.
No procedure provided. OR, the procedure provided was copied
from other sources with no paraphrasing and/or no original
content.
Provided an excellent step-by-step system administration
procedure which clearly, concisely, and accurately explained
the steps required to create and manage Local Groups (of user
accounts). Provided an appropriate section name and an
excellent introduction (2-3 sentences) before the step-by-step
procedures. Included screen snapshots appropriate to the
procedure.
Provided an outstanding step-by-step system administration
procedure which clearly and accurately explained the steps
required to create and manage Local Groups (of user accounts).
Provided an appropriate section name and an outstanding
32. introduction (2-3 sentences) before the step-by-step procedures.
Included screen snapshots appropriate to the procedure.
Provided an adequate step-by-step system administration
procedure which explained the steps required to create and
manage Local Groups (of user accounts). Provided an
appropriate section name and introduction (1-2 sentences)
before the step-by-step procedures. Included screen snapshots
appropriate to the procedure.
Provided a procedure which explained most of the steps
required to create and manage Local Groups (of user accounts).
Provided a procedure which addressed most of the steps
required to create and manage Local Groups (of user accounts)
but the procedure was unclear and/or confusing. OR, procedure
contained some paraphrasing but was substantially lacking in
original work.
No procedure provided. OR, the procedure provided was copied
from other sources with no paraphrasing and/or no original
content.
Part (c): Managing a "Drop-Box" (Implement Role Based
Access Controls)
Provided an acceptable title and accurate operating
environment. Provided an excellent description of the
procedure. The description concisely and accurately addressed
all of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided an acceptable title and accurate operating
environment. Provided an outstanding description of the
procedure. The description appropriately addressed three or
more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
33. Provided an acceptable title and accurate operating
environment. Provided a description for the procedure. The
description addressed two or more of the following:
-- purpose of the procedure,
-- vulnerabilities or threats to be mitigated,
-- summary of steps used to mitigate risks,
-- tools used in the procedure.
Provided a title, operating environment, and description. The
description did not adequately address the contents or purpose
of the procedure.
Provided a title and brief description. Description did not
address the purpose and contents of the procedure.
Title and/or description were missing.
Provided an excellent "notes, warnings, and restrictions" section
with clear, concise, and accurate information to aid the reader
in understanding what should or should not be done when
using this procedure.
Provided an outstanding "notes, warnings, and restrictions"
section with clear and accurate information to aid the reader in
understanding what should or should not be done when
using this procedure.
Provided an adequate "notes, warnings, and restrictions" section
which included information about what should or should not be
done when
using this procedure.
Provided a "notes, warnings, and restrictions" section which
provided some information about the harm that could occur
when
using this procedure.
Section present but content was severely lacking in detail,
inappropriate, or grossly inaccurate.
Section was missing or blank.
Provided an excellent resources section which described and
listed three or more relevant resource documents; section also
included complete publication information (reference list entry)
for all listed sources.
34. Provided an outstanding resources section which described and
listed two or more relevant resource documents; section also
included complete publication information (reference list entry)
for all listed sources.
Provided a resources section which listed publication
information (reference list entry) for two or more relevant
resource documents.
Provided a resources section which mentioned two or more
source documents or Internet resources containing relevant
information.
Provided a resources section which mentioned at least one
relevant source document or Internet resource.
Section was missing or blank.
Divided step-by-step procedures into separate sections using 4
or more logical groupings. Provided an appropriate name and an
excellent explanation (2-3 sentences) of each logical group at
the beginning of each section.
Divided step-by-step procedures into sections using 3 or more
logical groupings. Provided an appropriate name and an
outstanding explanation (2-3 sentences) of each logical group at
the beginning of each section.
Divided step-by-step procedures into sections using 2 or more
logical groupings. Provided an appropriate name and an
acceptable explanation (1-2 sentences) of each logical group at
the beginning of each section.
Step-by-step procedures were arranged in a logical manner but
the organization needs improvement.
Step-by-step procedures were lacking in organization and
unprofessional in appearance.
Step-by-step procedures were missing.
Provided an excellent step-by-step procedure which clearly,
concisely, and accurately explained the steps required to use
discretionary access controls and group membership
(implementing RBAC) to create and manage a “drop box.”
Included screen snapshots appropriate to the procedure.
Provided an outstanding step-by-step procedure which clearly
35. and accurately explained the steps
required to use discretionary access controls and group
membership (implementing RBAC) to create and manage a
“drop box.”
Included screen snapshots appropriate to the procedure.
Provided an adequate step-by-step procedure which explained
the steps
required to use discretionary access controls and group
membership (implementing RBAC) to create and manage a
“drop box.”
Included screen snapshots appropriate to the procedure.
Provided a procedure which explained most of the steps
required to use
use discretionary access controls and group membership
(implementing RBAC) to create and manage a “drop box.”
Provided a procedure which addressed using
discretionary access controls and group membership
(implementing RBAC) to create and manage a “drop box” but,
the procedure was unclear and/or confusing. OR, procedure
contained some paraphrasing but was substantially lacking in
original work.
N
o procedure provided. OR, the procedure provided was copied
from other sources with no paraphrasing and/or no original
content.
Professionalism (30%)
Submitted work shows excellent organization. The use of color,
fonts, titles, headings and sub-headings, etc. is appropriate to
the assignment type.
Submitted work has minor style or formatting flaws but still
presents a professional appearance. Submitted work is well
organized and appropriately uses color, fonts, and section
36. headings (per the assignment’s directions).
Organization and/or appearance of submitted work could be
improved through better use of fonts, color, titles, headings, etc.
OR Submitted work has multiple style or formatting errors.
Professional appearance could be improved.
Submitted work has multiple style or formatting errors.
Organization and professional appearance need substantial
improvement.
Submitted work meets minimum requirements but has major
style and formatting errors. Work is disorganized and needs to
be rewritten for readability and professional appearance.
No work submitted for this assignment.
No formatting, grammar, spelling, or punctuation errors.
Work contains minor errors in formatting, grammar, spelling or
punctuation which do not significantly impact professional
appearance.
Errors in formatting, spelling, grammar, or punctuation which
detract from professional appearance of the submitted work.
Submitted work has numerous errors in formatting, spelling,
grammar, or punctuation. Work is unprofessional in appearance.
Submitted work is difficult to read / understand and has
significant errors in formatting, spelling, grammar, punctuation,
or word usage.
No work submitted for this assignment.
Overall Score
The Old lab is attached from previous one for reference.