Develop an “intake” briefing for a group of software engineers who have been tasked with developing a standard set of security review processes for virtual teams.
Question 1.
Your Task: Develop an “intake” briefing for a group of software engineers who have been tasked with developing a standard set of security review processes for virtual teams. The purpose of these processes is to ensure that compliance for software security requirements is verified resulting in software applications and software-based products where security is “built in.” The company also intends that these processes be used towards the organization’s achievement of Capability Maturity Model Integration (CMMI) Level 3 — Defined.
Background: Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. Many software development organizations also depend upon virtual teams whose members are geographically dispersed. This complexity also makes implementing and testing security features (for software applications) much more challenging.
Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing.
2.Your task: You have been asked to give a presentation at Business Round Table Event. Attendees are owners of small businesses and corporate managers whose employees are now working from home due to the global pandemic. The need for physical security to protect equipment and other assets has risen in priority for these business owners and managers as they realize that they have a gap in their business continuity planning and response which needs to be addressed.
Background: During the global pandemic, many companies throughout the region, both small businesses and larger corporate entities, successfully transitioned to “work from home” allowing them to continue operating despite the issuance of “work from home” and “stay at home” orders from governmental entities. Storefronts and offices for non-essential businesses and services were shuttered or reduced to minimal staffing. Concerns about the potential for thefts, break-ins, and other forms of unauthorized entry have been raised in many organizations who were not prepared for extended periods in which their facilities would be unoccupied / unattended.
For this presentation, identify and discuss five or more technologies and countermeasures which can be implemented to address the problem of providing physical security in an unoccupied/unattended facility (you should not propose any measures that rely upon guards or other personnel who would need to be physically present). Your presentation should address both preventive and detective controls for physical security, e.g. perimeter fencing, gates, bollards, lighting, CCTV, audio scanning, alarm systems, key-card controlled entry, etc.
Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work.
In your critiques for your peers (2 different students), focus on providing suggestions for strengthening the talking points (added content, refocused content, etc.) Grammar, punctuation, and other writing mechanics will be addressed by your instructor and should not be part of your critique.
You must start a thread before you can read and reply to other threads
Your task: Develop an “intake” briefing for middle managers who will be assisting in the planning and execution of an internal audit of employee use of company owned laptops as part of the company’s “Work From Home” arrangements. The purpose of an “intake” briefing is to get everyone “on the same page” with respect to what will be done, who will do it, and what the roles & responsibilities of the managers will be during the audit (e.g. assist with employee contacts and “smooth ruffled feathers” amongst their workers).
Background: The purpose of the audit is to determine how the laptops are being used by the employees working from home (what corporate and non-corporate systems, services, networks, and websites are being accessed) and to uncover, if possible, any misuse (e.g. usage that is outside of the company’s acceptable use policy). The audit should also look for evidence of laptops that are improperly configured or have vulnerable software installed.
Background: The company will follow the Information System Security Audit Process as defined by Harris &Maymi in the CISSP All-in-One Exam Guide, 8th edition. The steps are:
1. Determine Goals
2. Involve the right business unit leaders
3. Determine the scope
4. Choose the audit team
5. Plan the audit
6. Conduct the audit
7. Document the results
8. Communicate the results
4. Before you begin, read: https://us.norton.com/internetsecurity-privacy-what-is-a-vpn-tunnel.html OR search for “tunneling protocols used in vpn” and choose an appropriate resource from the Internet.
Background: The COVID-19 pandemic forced many organizations to rapidly transition existing employees to a “work from home” situation. The overall success of such arrangements has encouraged many companies to adopt Work From Home (previously known as “telework” or “telecommuniting”) for all or part of the work week as a permanent strategy. In these situations, a secure means of accessing the organization’s internal networks and resources must be provided to the dispersed workforce. Virtual Private Networks are a frequently deployed technology solution capable of addressing and compensating for the myriad privacy and security concerns that arise in “Work from Home” or telecommuting situations.
VPN’s depend upon tunneling protocols as foundation technologies. For this briefing paper, identify and discuss the four main tunneling protocols that can be used to provide virtual private network access between remote users and a company’s internal (corporate) networks and resources. Provide examples of how each protocol can be used within a VPN solution.
Format: this week, your deliverable should be formatted as a 5 to 7 paragraph briefing paper. You should have an introduction, analysis sections, and an appropriate summary section. Include citations (in the text) and references (at the end) to support your work and allow your readers to fact check your analysis and conclusions.
5. Your task: You have been asked to give a presentation at an online training session for employees who are now working from home. The subject of this training session is: Access Controls and Why They Matter.
Background: Access controls are security features that are usually considered the first line of defense in asset protection. They are used to dictate how subjects access objects, and their main goal is to protect the objects from unauthorized access. Access control models are frameworks that use access controls to enforce the rules and objectives of the model (e.g. MAC, DAC, RBAC).
For this training, you should focus on the need to use Access Controls to protect corporate assets and data which are accessible via equipment and networks within the Work From Home setting. In your talking points you should also consider and address the frustrations that employees may feel when they encounter access controls that are not set up to allow the same type of “inside” access as employees had when working on company equipment inside company networks. (Explain why “turning off” access controls is not an acceptable solution to remote access to internal networks and resources.) Finally, address some potential “insider threats” which may exist in the Work From Home environment that need the countermeasures provided by access controls. Such threats could include the actions of others residing in the home who have access to the employee’s laptops or who use the same networks and network connections.
Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
