Posts

Showing posts from October, 2017

IT Security Measures Based on: Defense-in-Depth, Protections and Secured Channels: From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Oct. 22, 2017

10-22-2017 Defense-in-Depth US Government Mandated Security Measures: Methods of IT Security and How They Relate To: Channels of Communication Miss. Bayo Elizabeth Cary, AA, BA, MLIS Capella University, MS Program, IAS5002 Instructor: Dr. Susan Ferebee Miss. Bayo Elizabeth Cary, AA, BA, MLIS 1215 NW 4th Street, Gainesville, FL 32601 Email: bai_o@yahoo.com bayo_caryg1@yahoo.com 10-22-2017 From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Unit 2 Final Assignment Page 1 "Defense in Depth" and Communication Channels Security Controls Assignment: Scenario: The overarching goal of the Information Assurance and Security organization is to protect the company's electronic, physical, intangible, and people assets. You are the IAS analyst for XYZ company and have been tasked to develop and communicate a "defense-in-depth" strategy using various channels. Assignment: Part I: Define Defense-in-Depth: A "defense-in-depth...

There Are Genetic Limitations-Which Are Real-To What Can Be Learned-By Some: From: Miss. Bayo E. Cary, AA, BA, MLIS Discussion Group

10-20-2017 Unit 2 Discussion 2 Evelyn Davis Response Required Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS “In the past every employee has had the right to send a personal e-mail occasionally, but he must use that right carefully.” “In the Past,” The second part of the sentence is not gender neutral. “We don’t want to prohibit the personal use of e-mail entirely.” ”do not” “We have now found it necessary to amplify and extrapolate that policy to include use of the Internet.” “the use” “You must return this form by March 1.”  “March 1st “  The word "please" should be used instead of "You must" “Effective immediately a new policy must be implemented.” “will be” or “shall be” This email could have been gender neutral throughout. This email was also condescending.  "You boys and girls" could have been left out because the comment is insulting. Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS              I...

How To Write and Format A Basic Formal Research Paper-High School, Starting 9th Grade, In US: Miss. Bayo E. Cary, AA, BA, MLIS Discussion Group

10-20-2017 Unit 2 Discussion 2 Brandon Zwick Response Required Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Based on my readings of this unit, the reading scenario was overall very unprofessional.  Some parts were demeaning and other parts were unprofessional.  The required text for this class mentions that in business communications, “you want to sound educated and mature” (Guffey & Loewy, p. 46).  When the author of the email used phrases like “boys and girls”, his terminology was inappropriate in conveying a mature message.  Additionally, the book states you should adapt to the other person’s needs and viewpoints (Guffey & Loewy, p. 45).  Arguably, the tone of the presented email emphasized the viewpoint that the employees were behaving much like children and addressing them as people who needed disciplinary guidelines.  The textbook also mentions the need to determine the “richness of a channel” and discussed the effectiveness of vario...

Focused on Application of Critical Thinking Skills To IT Environment: From Miss. Bayo E. Cary, AA, BA, MLIS Discussion Post

10-20-2017 Unit 2 Discussion 1 Madana Butler Requires Response Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Unit 2 Discussion 1 Critical thinking is very important in the Information Security field.  When addressing a breach or a threat and protecting an organization’s data, the security professional must not only think like the hackers but must also be one step ahead.  For example, when a breach occurs the security professional will need to use critical thinking skills to assess the threat, identify solutions, and apply algorithmic skills. In the case of the incident with the Big Retail Data Warehouse, a security professional could apply critical thinking by determining the source, confining the breach, and recommending remedial measures.  Due to the outside experts that are there to assist, the security professional would also need to assign roles and establish a communication plan.  In addition a statement will need to be prepared to explain the scope ...

Critical Thinking and Security Breaches-Discussion Post Response: From: Miss. Bayo E. Cary, AA, BA, MLIS

10-20-2017 Unit 2 Discussion 1 David Keller Requires A Response Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS This is a difficult question to answer since there isn’t much information to go on. For starters, critical thinking will be easier for them since they don’t work for the company full time. This helps remove biased opinions, stress and other factors that may influence the decisions made. Based on the type of breach and information found so far, critical thinking may help piece together a theory on how the attack was conducted, where to look for more evidence, and different security controls measures to put into place as a few examples. If done properly it should help create a thorough analysis and evaluation of the issue and reduce the chance of looking over or missing something. Response From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS         There is a crisis in US high schools now, whereby, students are not being effectively trained-in...

Unit 2 Discussion 2

10-18-2017 From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Unit 2 Discussion 2: Assignment: Based on the Radical Rewrite: Watch Your Tone! (Guffey & Loewy, 2016, p. 58), review the scenario and provide at least five specific writing errors. Include examples: Radical Re-writes: Basic Guidelines: "How can you make this message more courteous, positive, and precise? In addition, think about using familiar words and developing the 'you' view" (Guffey& Loewy, 2016, p. 58). Your tone of voice-either: positively or negatively, effects-how your messages are received. When communications, are: abrupt, truncated, emphatic, understated, etc.-and that is not the clear intention, of the writing-then, the intended reader, will not get your message. Tone of voice, encompasses, more-than just, a consideration, as to: how you are communicating, and who your intended audience is. The tone of voice chosen, communicates the formal professional nature, of your information, as well...

Capella University: Unit 1 Technology Innovations and Security Breaches 2010-2017: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

10-15-2017 Unit 1 Capella University Final From: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Technology and Security Breaches: 2010 1) Communication Technology: Square (Collect Banking Credit Card For Payment): There might not be a piece of tech more due for an update than the cash register. Enter Square, a payment platform created by Twitter co-founder Jack Dorsey. With the aid of a tiny magnetic card reader that attaches to a smart phone, Square lets anyone process credit cards. It might not do away with paper entirely — plenty of people still prefer cash — but you certainly don't need to wait for a receipt: sign on the screen, and Square sends a copy straight to e-mail. (Fletcher, 2010) 2) Related: Security Breach: Citigroup Bank (Banking Information Breach)             A) Lincoln National Financial Securities: Password management of  accounts              breach: Not o...

Stuxnet-Cyber Warfare-To End All Wars: Peace.

 10-11-2017 By: Miss. Bayo Elizabeth Cary, AA, BA, MLIS             There never will be an exact day and date, to identify and track, the first glimmering of cyber-warfare-now frequently referred to as: Stuxnet. The Stuxnet worm, was not discovered, until: 2010-at that time, various computing systems, that were conveying a malware message-were shut down-it was already too late (Demchak , 2012, p. 125). The Stuxnet worm, was engineered-to have a half-life, of its own. The malicious worm spread, false coding communicators, for years-before it was discovered-only to wait dormant and hidden, in the very furthest recesses, of a hard drive-and then, to jump into action.      Cyber-terrorism is often thought of, as a minor non-player role, in an overall world conflict. The most, cyber-warfare typically causes-is an interrupted service message: DDOS (Andres, 2012, p. 99). Interrupted website services, ca...

Data Breaches: US Federal Employees-Posted To Twitter. Twitter Supports Intl Terror-Shut Them Down!

10-11-2017 By: Miss. Bayo Elizabeth Cary        Data breaches are dangerous. Personal demographic information, needs to be protected-for a number of reasons-fraud, being primary. A significant portion, of cyber -security, has to be focused on deterance . Twitter, is an unfriendly online social networking website. Twitter kicks me out, every 2 seconds, for non-offensive political statements. In my sincerest opinion, Twitter supports Intl terrorism.        When an individual, posts information online through Twitter-Twitter kicks you out-seconds after the post, if the information is deemed as inappropriate, because it fails to meet, the Twitter community guidelines. Twitter has choice, in regards to what information, is posted, and then allowed to remain on the screen, to be re-shared. Online social networking websites-like Twitter, that support Intl terror-should be shut down! The names, numbers, and other contact i...

MS Capella University Oct. 9, 2017 Start-First Assignment: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

10-4-2017 Miss. Bayo Elizabeth Cary, AA, BA, MLIS Email: bai_o@yahoo.com Capella MS Program Master Computer Science: Specialization: Forensics and Security MS Degree Required For My Recent Applications-To: US FBI Field Offices Began: October 10, 2017      Getting started early, has always been the best time management strategy for me. Situations arise, books can be late-financial aid can be delayed-the electric, can even be disconnected. There is no telling, how many things, could possibly go wrong. To reduce stress, and to succeed academically, I try to manage my time, as closely-as I manage my money. I never waste my money-and therefore, I never waste my time. I order text books early. I read ahead. I read the questions first-then, I make notes-as to write as much information as required to complete an assignment in full-as quickly, and succinctly, as possible.       I never cut corners, or leave anything requi...