Project 1 Software Design Documents S/W Project 1: The team is working on another security product. This product is aimed at both consumer level and business level customers. The product tentatively named “
DataNanny” is a data tracker isolation product. DataNanny will work to isolate you and your personal/corporate data from being collected and sold online. Unlike other products that work in isolation or on an app-by-app basis, DataNanny will be app-independent and multi-device aware. It will achieve a totally isolated “environment” for its users ensuring them of completely untracked usage of all of their personal computing devices (phones, tablets, and laptops/desktops). DataNanny, however, requires total buy-in. Users, both individual and corporate, must install and run DataNanny on all of their devices for the product to be functional. If any single device is omitted, the blocking of data will not be functional. You can not dam a river if the dam has holes in it. DataNanny will function using a central server facility that will coordinate all tracking blockers installed on your devices. All data requests will be routed through DataNanny, which will be constructed to function as a proxy server for your devices. This will allow DataNanny to filter all network requests for data and allow only those requests that have been deemed “safe.” The technical challenge for DataNanny’s proxy server is speed. Users will only tolerate a moderate amount of delay in page loading and data transfer rates before they begin to lose faith in the value of anonymity. DataNanny will provide a logging and notification system, where users can see what requests have been made and which of those have been blocked or allowed. Users will be able to challenge a blocked or allowed request. Challenged requests will initially be reviewed by an AI, and all requests with a certainty level below 85% will be directed to an evaluation team to determine why the user needs the request to be allowed. A user’s request will take no more than 24 hours to resolve. Further research will be needed to determine the AI inputs appropriate to satisfy a minimum 95% success rate with challenged requests. All software will be written in Swift due to speed constraints. If management determines that this makes recruitment difficult, the language can be changed to C++.
Imagine you are the manager of a software development team working on new applications for your company, Optimum Way Development, Inc. Your director has called for all development teams to submit product briefs detailing their current projects. The director plans to share the most promising product briefs with clients at an upcoming meeting. You have software design documents PDF for two projects your team is currently working on.
Since communications must be targeted to a specific audience, before you can create a product brief for a client, you must know more about the client. Your knowledge of the client will inform the decisions you make in the client brief—from the type of language you use to how you present data and graphics. To begin this milestone activity:
Choose one of the software design documents to focus on for both 2-1 Milestone Activity: Audience Persona and Project One: Non-technical Audiences.
Consider all of the different groups of people (audiences) who are likely to use that application.
Choose one audience to focus on for your persona.
Choose a stock picture and name for the persona that will serve as the representation of your chosen audience.
Identify demographics and psychographics associated with this audience.
Resources are not required, but any resources used must be appropriately cited using APA style. The following resources may help support your work on the project:
Resource: Defining Audiences and Creating Personas PDF
Shapiro Library Resource: APA Style: Basics
Guidelines for Submission
To complete this activity, you must submit an audience persona.
Your audience persona must:
Be at least 500 words
Be single spaced
Be submitted as either a Word document or PDF
Completely address all of the requirements in the Prompt section
The audience persona can otherwise be formatted/organized in any manner.
Prompt #1: The Microsoft Office Ribbon
A ribbon is a command bar that arranges a program’s features into a string of tabs at the top of the document window; view an image of the Microsoft Word ribbon Links to an external site. In this discussion, search the web to find descriptions on three different features in the ribbon. Make sure to provide an APA citation for the source you used to find the information in your post.
Please respond to the initial discussion questions
below and provide different responses for the two students (Komo and Terry) posts
below. The format should look like the request below. Again, please provide
three different responses. PLEASE MAKE SURE THERE ARE 3 DIFFERENT RESPONSES. The
INITIAL and the 2 STUDENTS. PLEASE DO NOT JUST RESPOND TO THE 2 STUDENT
Week 5 Discussion
Please research the process of setting up a Security Program within a medium sized organization. Provide a list with short description of the most important 20 things to accomplish during this process.
The following link (not referenced here) details InfoSec considerations specifically for a healthcare organization as an example (but could be applied to most mid-sized orgs):
https://www.phe.gov/Preparedness/planning/405d/Documents/tech-vol2-508.pdf (Links to an external site.)
Depending on the overall number of employees of the medium-sized organization, the Security Program can still be set up much along the same lines as a larger counterpart but with a few adjustments for staffing and departmental responsibilities. The first thing would be to ensure an adequately staffed team is in place to implement and advise on the remaining aspects. Many organizations may still approach this from a standpoint of Organization, Documentation, and Controls (Snodgrass, 2019). Provided below is a list of the most important 20 things to accomplish in establishing a medium-sized org Information Security Program:
“1. Start with security in mind
Form/hire a dedicated InfoSec team
Allocate necessary resources (budget) to the program
Organizational chart with roles & responsibilities identified (including InfoSec)
Control access to data sensibly; maintain accurate account and access lists
Require secure passwords and authentication, including 2FA or MFA
Store sensitive personal information securely and protect it during transmission (i.e. data encryption.) Don’t collect or use personal info you don’t need. Only retain information so long as there is a legitimate business need to do so.
Segment your network and carefully monitor who’s trying to get in and out.
Secure remote access to your network (VPN, 2FA or MFA, etc.)
Apply sound security practices when developing and/or deploying new products/services.
Make sure your service providers implement reasonable security measures.
Put procedures in place to keep your security current and address vulnerabilities that may arise
Secure paper, physical media, and devices
Workforce training and education
Document and train network security & acceptable use policies
Maintain asset lists, device configurations lists and network diagrams
Institute maintenance/support agreements
Implement and document an incident response plan
Implement and document a disaster recovery plan
Institute a business continuity plan” (Snodgrass, 2019) (Start, 2015).
Snodgrass, G. (2019). Back to Basics: Infosec for Small and Medium-Sized Businesses. The State of Security. TripWire.Com Retrieved from https://www.tripwire.com/state-of-security/security-data-protection/basics-infosec-small-medium-businesses/ (Links to an external site.).
Start with Security: A Guide for Business. Federal Trade Commission. (2015). Retrieved from https://www.ftc.gov/business-guidance/resources/start-security-guide-business (Links to an external site.).
Firewall : Used to block unwanted traffic
Training employees : Provide workforce with the tools to prevent breaches and eliminate potential security threats
Learn from the past: Document and investigate areas of opportunities to protect your data
Restrict Access: Limit access to the network to only authorized users and accounts.
MFA: Use Multi Factor Authentication as a form of verifying authorized access
Monitor Systems: User IDS and IPS to monitor traffic for suspected activity
Encrypt Data: Store all data should be encrypted to add an extra layer of protection in case data is compromised.
Backup Data: Offsite/Cloud base store
Implement Cybersecurity Policies: Have in place clearly defined practices for employees to follow to ensure the protection of important data
Document Inventory of data: Know what and how much data is being stored and protected at all time
Test for vulnerabilities in network: Hire outside contractors to check your network for weakness.
Keep everything updated: Hardware and the Software that accompany it always need to be checked for and updated as soon as possible
Create a mobile device action plan: Require users to password-protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for lost or stolen equipment.
Secure Wi-Fi networks: If employees are working wireless, ensure the network is encrypted secured and hidden
Use static IPs: Assign static IP’s to only authorized devices to allow access to the network preventing any unauthorized device from connecting to the network.
VPNs for remote access: Only allow remote access to network via VPN
Update best practices and policies: Always continue to expand and evolve your cybersecurity program and training.
Inhouse IT Security: Have a team on hand to oversee the protection of your network.
Automatic lockout: Set devices to automatically disable if not used in 20 days or more.
Password requirements:Place a set of password complexity requirements and changes to help protect the network from password hacks
Write an introduction and outline for your signature assignment paper
The Equifax Data Breach
Purpose of Assignment
Analyze issues occurring within the field of information
security, both organizational and personnel security, in the context of
business communications, operations, management, and compliance.
Describe threats to information
Identify methods, tools and techniques
for combating information threats
Identify types of attacks and problems
that occur when systems are not properly protected
Explain integral parts of overall good
information security practices
Identify and discuss issues related to
Develop Information Security policies
based on industry guidelines and best practice models.
Define risk management and explain why
it is an important component of an information security strategy and practice
Develop prototype contingency plans and
discuss the development steps involved
Identify and evaluate security issues
related to personnel decisions, and the qualifications of security personnel
The signature assignment paper will examine
information security management issues related to The Equifax Data Breach
report of the U.S House of Representatives Committee on Oversight and
INSTRUCTORS: The Equifax Report from the U.S. House
of Representatives Committee on Oversight and Government Reform from December
2018 provides a case that substantially covers all the material and outcomes
taught in this course. There are several other cases involving information
security that could be substituted at your discretion.
The current CAE ethics Knowledge Unit covers multiple legal requirements but does not address objective (i.e., Christian) ethics. Assume that you have become a Federal IT manager; how would you address the need for truly ethical behavior with your workforce? (275)
Outline and Annotated Bibliography
The planning of technical and scientific documents is essential for clear and concise communication. Keeping audience and purpose in mind, the writer must generate ideas about a chosen topic, and then organize those ideas in the form of a working outline, while also researching additional information and understanding its place in the overall project at hand.
For this assignment, using the topic you chose in Week One, create (1) an outline and (2) an annotated bibliography that will form the structural and research foundation for the Final Project that is due in Week Five.
Page 47 and 48 of Technical Communication offers clustering and branch-diagram techniques for developing supporting ideas around a main topic. You are encouraged to explore these techniques. You will then organize those ideas in the form of a working outline.
Review the sample outline in this week’s required resource:
Writing Center. (n.d.). Outline form. Canvas@UAGC. https://login.uagc.edu
Develop a one- to two-page outline of your chosen topic and associated ideas or sub-topics. Your outline should be formatted as either alphanumeric, full-sentence, or decimal.
Be sure to include all of the information illustrated on the sample Outline. This includes a well-written thesis statement, related topic sentences, and significant supporting information for each topic.
Regarding research and the development of an annotated bibliography, the author of Technical Communication states on page 48: “Once you have a good idea of what you already know about your topic, you need to obtain the rest of the information you will need. You can find and evaluate what other people have already written by reading reference books, scholarly books, articles, [and] Web sites.”
Immediately following the outline, and in the same document, include an annotated bibliography of no less than 10 entries, 7 of which must come from the University of Arizona Global Campus Library.
Annotated bibliography steps:
Review this resource from Cornell University:
Cornell University Library. (2014, May 1). How to prepare an annotated bibliography. Retrieved from http://guides.library.cornell.edu/annotatedbibliography
Writing Center. (n.d.). Annotated bibliography. Retrieved from https://writingcenter.uagc.edu/annotated-bibliography
Develop your Annotated Bibliography of sources that you believe will support the purpose of your Final Project. At least seven of these sources should originate from the University of Arizona Global Campus Library databases.
Each source entry should contain two thoroughly-written paragraphs. One paragraph should effectively summarize the source’s major claims. The other paragraph should thoroughly describe how the information will be utilized in the Final Project.
Your Annotated Bibliography must contain full citations in APA format.
Following each full citation and employing full sentences, include a descriptive and critical assessment of each entry.
Avoid using first- and second-person pronouns. Rather, refer to the author in your descriptive and critical assessment of the author’s ideas. You should maintain a formal tone throughout each entry.
Carefully review the Grading Rubric for the criteria that will be used to evaluate your assignment.
This assignment is a short paper regarding historical technologies that were invented. You are to choose one of the technologies below:
You will write a short paper (300 – 400 words) answering the following questions:
Describe the technology selected
Who invented the technology?
When was the technology invented?
Give a brief discussion on how the technology has been improved since its invention (i.e. refrigerators are now smart capable).
Discuss any future plans for improvements of the technology.
For this assignment, you must write a technical paper that provides an overview of security considerations. Select an organization where you currently work, where you might want to work, or at an organization that interests you.
Your paper should provide the managers and leaders within the technical arena of your selected organization with the following:
A short paragraph that identifies the organization, its industry, size, locations, and any significant changes underway.
Key parts of a security system.
A description of risks that may apply to the organization, including specifics on information assets, threats, and vulnerabilities.
An explanation of roles, policies, frameworks, standards, and controls.
Length: 5 to 7-page technical paper
References: Include sources within the course plus a minimum of 2 additional scholarly resources.
The completed assignment should address all the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to Northcentral University’s Academic Integrity Policy.
Continuing with the use of biometrics in the airline industry: reseach public opinon on the technology, (media, consumers, community).
Also, perform an assesment of how effective the initial planning and risk management was to the implementation and usage of the technology.
For assignment 2, I want you to provide a visual of the system breakdown and the value chain you’ve been developing in class. Just a screenshot of them is fine. In addition, I want you to describe why you’ve structured the system breakdown the way you have and how it’s changed over time as you’ve become more familiar with the end goal and the challenges/opportunities associated with bringing the idea to fruition. For the value chain, identify the sections that your project is meant to consolidate/improve and why you chose those specific steps. I’m looking for your thought processes here. I am not looking for a description of your project. I’m looking for how your thought processes have changed and grown and what you’ve learned about the PROCESS, not the PROJECT. Pay close attention to this as you’re doing this assignment.