SECURE CLOUD ARCHITECTURE

Business case:  Bule Sky Airport (second improvement of the project )  Migrating to the Cloud: You were tasked to improve the performance of the Bule Sky Airport IT system.   There are three databases: The passenger database will record and authenticate each passenger in the airport The employee database will record and authenticate each employee in … Read more

SECURE CLOUD ARCHITECTURE

Business case:  White & Bule Sky Airport Miami FL. As an IT Manager, you were tasked to improve the performance of the local White & Bule Sky Airport Passenger Processing system.  This is to make the airport more efficient and more secure.  There are three databases in the Airport Passenger Processing IT system: 1-Passenger database will record … Read more

SECURE CLOUD ARCHITECTURE

As the  IT Manager, you were tasked to improve the performance of the local airport passenger processing system.  The new airport will have fewer employees and a faster passenger processing system. This is to make the Airport more efficient and more secure. The new system will replace the boarding pass and ID Control personnel with … Read more

CST 610 Proj 2

   Project 2 Scenario Assessing Information System Vulnerabilities and Risk You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When … Read more

SECURE CLOUD ARCHITECTURE

Title: Cloud-Based Web application  You are part of a startup company. A startup company is a newly formed business with particular momentum behind it based on perceived demand for Web Based Software applications in one of the given fields below. The intention of your startup is to grow rapidly as a result of offering something … Read more

Discussion Seven – Social Networking

  Discussion Seven – Social Networking Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact with friends, family members, and … Read more

Week 4 Discussion Short Paper

  our internship assignment for this week is with the Office of the Corporate Counsel & Chief Privacy Officer. Padgett-Beale’s Chief Privacy Officer has invited you to “shadow” the company’s internal investigators as they look into a privacy problem that was uncovered in the Resort Operations organization (see “Background Information” at the end of this … Read more

research paper

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following: What is penetration testing Testing Stages Testing Methods Testing, web applications … Read more

Week 3 Discussion: Cybersecurity Issues for Business Travelers

Week 3 Discussion: Cybersecurity Issues for Business Travelers This week, you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing … Read more