Information Systems homework help.

Assignment 1

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
 
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
 
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
 
Consider the following questions:

  1. What does “malware free” mean?
  2. How can a user demonstrate that their computer or device is malware free?
  3. What are the steps necessary to establish a malware-free computer or device?
  4. How should Always Fresh verify that a client computer or device is compliant?

 

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

  1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their
  2. Describe the process of:
    1. Ensuring anti-malware software and data is up to date. Mandate daily
    2. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete
  3. Provide steps to follow any time malware is
    1. Immediate reaction—what to do with current work, leave the computer on or turn it off
    2. Who to contact
    3. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Assignment 1 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: 4 pages
References: At least 4 credible scholarly references
No plagiarism
 
 
Assignment 2

Scenario

Always Fresh is expanding. The company is adding another application server and several workstations. As the IT infrastructure grows, it becomes more difficult to manage the added computers and devices.
 
Consider the Windows servers and workstations in each of the domains of a typical IT infrastructure. Based on your understanding of Group Policy, determine possible Group Policy Objects that will make it easier to manage groups of computers. Focus on common aspects of groups of computers, such as permissions for workstations or printers defined for use by groups of users.
 

Tasks

Recommend Group Policy Objects for the Always Fresh environment in a summary report to management. You must defend your choices with valid rationale.
Assignment 2 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: 4 pages
References: At least 4 credible scholarly references
No plagiarism
 
 
 
Assignment 3
Scenario 1
Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Fileless malware exists only in memory, not in files, which makes it challenging for traditional antivirus products to detect. As a result, fileless attacks are much more likely to succeed than file-based attacks.
 
Answer the following question(s):
 

  1. What do you suggest as a countermeasure to prevent fileless malware infections? Your solution can be technical or non-technical.

Scenario 2
An organization’s security policy can be interpreted in a few ways. A strict security policy interpretation means that no security controls exist unless they are directed by the policy. A less strict interpretation allows IT security to exercise some discretion to implement best practices that may not be explicitly defined in the security policy.
 
Answer the following question(s):
 

  1. In your opinion, does strict security policy interpretation provide better security than a less strict interpretation? Why or why not?

Assignment 3 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: At least 350 words for each question
References: At least 2 credible scholarly references for each question
No plagiarism
 
 
 
Assignment 4

  1. Discuss the difference between a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). You might want to start with the definitions from the NIST SP 800-34, located at http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf. Section 3.5 discusses the different types of Plan Testing, Training, and Exercises.

Assignment 3 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: At least 500
References: At least 2 credible scholarly references
No plagiarism
 
I need two copies of assignment 4
 
 

Information Systems homework help