Chat with us, powered by LiveChat ISSC661 Full Course Latest 2017 January | acewriters
+1(978)310-4246 credencewriters@gmail.com
  

ISSC661 Week 1 Forum Latest 2017 January
Define the purpose of a Risk Analysis, discuss the role of an asset
inventory, the creation of an asset baseline, and describe how you, as an
information security professional, would determine the type(s) of Security Risk
Assessment(s) an organization would require, how those assessments might be
structured, and why the selected assessments are useful to achieving
organizational information security objectives (e.g. gap assessment, compliance
audit, security audit, vulnerability scanning, penetration testing, process
assessment). Provide at least two peer reviewed sources to substantiate your
posting; formatted in APA 6th edition style.
ISSC661 Week
2 Forum Latest 2017 January
Identify
and define the considerations required to fully describe a security risk
assessment project, identify the preparation steps required for a security risk
assessment, lay present five key security metrics that are important to
effective security risk assessment activities, and address why each of these
components are important to the success of a security risk assessment — why is
definition and planning so important to an effective assessment?

ISSC661 Week 3 Forum Latest 2017 January
Explain
the role of Project Management as it relates to managing Security Assessments;
what are the key phases for managing a security assessment, describe each
phase, explain how project management supports each phase, identify key
information sources that are needed to conduct each phase of the assessment,
and identify Project Management tools or documents / plans that are needed to
effectively execute a security assessment project.

ISSC661 Week 4 Forum Latest 2017 January
Identify,
define and differentiate between administrative, technical and physical
security controls (safeguards), give an example of each, explain how to gather
data on each control, and discuss the importance of these controls to a
security risk assessment — why are they important?

ISSC661 Week 5 Forum Latest 2017 January
Imagine
you are tasked with evaluating the Administrative Processes involved in hiring
new employees within your organization. During a Security Risk Assessment, you
identify that your organization does not have a policy which requires
conducting background checks on applicants for hire. Define a background
check’s key components, identify how background checks can address key ‘loss
events’, and determine whether or not this is a risk to the overall security of
the organization — why or why not is the lack of background checks a liability
for the organization, what regulatory issues might surface?

ISSC661 Week 6 Forum Latest 2017 January
Assume
that your class is the management team of a medium-size business that sells
goods to consumers online. You conduct a security assessment, and identify that
the information systems are vulnerable to information leakage, and that account
and customer information can be stolen; in essence a breach of PII. What
controls or safeguards would you recommend implementing to address this
situation, how would you select a control based on effectiveness and cost, and,
based on your selected control(s), what specific considerations would need to
be factored into a high level implementation mitigation plan and why?

ISSC661 Week 7 Forum Latest 2017 January
Define,
explain, and provide examples of the difference between a Quantitative and
Qualitative Analysis, identify two security metrics for each analytic approach,
and select one of the risk assessment methods (e.g., FAA Security Risk
Management Process, OCTAVE, FRAP, CRAMM, and NSA IAM) that would effectively
employ an approach useful in your current work setting — why would your
selected approach be more effective?

ISSC661 Week 8 Forum Latest 2017 January
If you
could, which security reporting methodology would you recommend to promote an
organizational “security culture” within your present organization to achieve
an objective wherein employees and stakeholders are more knowledgeable and
proactive about threats to information security?

ISSC661 Week 1 Assignment Latest 2017 January
Assignment Instructions
Instructions:Select an organization of
your choosing to perform an abbreviated assessment on and then write a 3-4 page
information assurance security plan outline that lays out key considerations
for decreasing risk and mitigating assessed vulnerabilities. The outline should
contain a brief summary of the assessed challenges, a discussion of key IA
considerations, options for addressing assessed risk items, and a recommended
mitigation approach for each assessed risk. This assignment is intended to gain
an initial application of your IA knowledge and to help you focus on the
considerations you might address in your research paper. Further, the selection
of a particular organizational network, system or information storage solution
will set the stage for the Week 8 risk assessment case study. See the Writing
Expectations contained in the Policies section of the Syllabus for specific
focus areas / guidance.

Submission Instructions:See the Writing Instructions in your Syllabus as
well as inserted below. Please submit a Word document in the defined format to
your Assignment folder by 11:55PM, Sunday, EST. Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with
proper citation of research source material and appropriate attribution of that
material.The level of expectation is; All submission need to be under 15%total originality score, witheach individual references no higher than 2%
originality score.

ISSC661 Week 2 Assignment Latest 2017 January

Assignment Instructions
Instructions:You must submit a Research Paper Topic in Week 2 of the course.
Your topic must be related to IA Assessments and Evaluations and course
objectives as outlined. That topic must be reviewed and approved by the course
Professor prior to pursuing the next steps in the Research Paper process. See
the Writing Expectations contained in the Policies section of the Syllabus for
specific focus areas / guidance. Please be aware that this is a progressive
research development process that will carry the same approved topic throughout
the research paper development process and related assignments.

Submission Instructions:See the Writing Instructions in your Syllabus as
well as inserted below. Please submit a Word document in the defined format to
your Assignment folder by 11:55PM, Sunday, EST. Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with
proper citation of research source material and appropriate attribution of that
material.The level of expectation is; All submission need to be under 15%total originality score, witheach individual references no higher than 2%
originality score.

ISSC661 Week 3 Assignment Latest 2017 January
Assignment Instructions
Instructions:You
must submit a Research Paper Outline by the end of Week 3 of the course. Your
topic must be related to IA Assessments and Evaluations and course objectives
as outlined, using the approved topic submitted during Week 2. Your initial
Research Paper References should be included and references must be formatted
according to APA 6thEdition
style guidelines. See the Writing Expectations contained in the Policies
section of the Syllabus for specific focus areas / guidance. The objective of
this assignment is to synthesize the various information security governance
and risk management objectives to help develop the security strategy aspect of
your research paper, applying the readings and discussions from the course.
Development of 2-3 key information security metrics that would underpin your
research is also required, with a brief description of what the metric is, how
it will be measured, and why it is important or related to your security
strategy.
Submission
Instructions:See the Writing
Instructions in your Syllabus as well as inserted below. Please submit a Word
document in the defined format to your Assignment folder by 11:55PM, Sunday,
EST. Your writing assignment will automatically be run through TurnItIn (just
submit, you do nothing else) to aid in preparing for your Final Research Paper,
and also as a tool to help with proper citation of research source material and
appropriate attribution of that material.The level of expectation is; All
submission need to be under 15%totaloriginality score, witheachindividual references no higher than
2% originality score.

ISSC661 Week 4 Assignment Latest 2017 January
Assignment Instructions
Instructions:You must use a minimum of five (5) sourcesbeyondthe course textbooks in Week 4. These
sources should be from industry articles, journals, academic and professional
books, and case studies. You may not use Wikipedia or Webopedia or any of the
‘pedias’ as a reference. Your references must be formatted according to APA 6thEdition style guidelines. See the
Writing Expectations contained in the Policies section of the Syllabus for
specific focus areas / guidance. The objective of this assignment is to provide
the research basis for your research paper effort, expose you to the APUS
on-line library to explore peer reviewed materials acceptable for scholarly
research, and offer a means to advance your overall knowledge of the
information security literature holdings.You must use a minimum of five (5)
reputable sourcesbeyondthe course textbooks for your research
by the end of Week 4. These sources should be from industry articles, journals,
academic and professional textbooks, and case studies.

I have also included an exemplar for your review. This exemplar presents what
is expected from this assignment.

The key point of this exercise is to identity relevant, peer reviewed sources;
cite them accurately; summarize the key points relevant to your paper; and
identify how this source will contribute to your paper.

Submission Instructions:See the Writing Instructions in your Syllabus as
well as inserted below. Please submit a Word document in the defined format to
your Assignment folder by 11:55PM, Sunday, EST. Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with proper
citation of research source material and appropriate attribution of that
material.The level of expectation is; All submission need to be under 15%total originality score, witheach individual references no higher than 2%
originality score.

ISSC661 Week 5 Assignment Latest 2017 January
Assignment
Instructions
Instructions:The
Draft Research Paper is due at the end of Week 5 of the course (6 – 8 pages not
including the Cover Page or the References listing – APA 6thEdition formatting). The draft will
count as 15% of the final grade and the final will count as 25% of the final
grade. The paper will follow a conventional paper format (Cover page, Body of
Paper with introduction, discussion / analysis / argument / body, conclusion,
and references pages). See the Writing Expectations contained in the Policies
section of the Syllabus for specific focus areas / guidance as well as
conforming with APA 6thedition
style guidelines. The objective of creating a draft research paper includes the
desire to review your progress and to provide feedback on key aspects that may
require additional research and / or development. As this is a progressive
research paper activity, within this draft paper your cost-effective security
strategy, underpinned by security metrics, should be assessing and identifying
issues associated with your selected research topic discussion. Further,
initial insights should be emerging at this point that will turn into
recommended mitigation actions in your final research paper.

Submission Instructions:
See the Writing Instructions in your Syllabus as well as
inserted below. Please submit a Word document in the defined format to your
Assignment folder by 11:55PM, Sunday, EST. Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with
proper citation of research source material and appropriate attribution of that
material.The level of expectation is; All submission need to be under 15%total originality score, witheach individual references no higher than 2%
originality score.

ISSC661 Week 6 Assignment Risk Assessment Tables Latest 2017
January
Assignment Instructions
Instructions: This assignment will use NIST Special Publication
800-30 (available at
http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf
or in the Course Resources area) as its basis. The selected
computing system can be your personal home network (e.g., from ISP appliance to
connections within your home location), a work oriented network, or a public
network (e.g., public library, commercial venue, free Wifi hotspot). In this
assignment, initial creation and population of adversarial and a
non-adversarial risk assessment tables patterned after Table I-5 and Table I-7
in NIST SP 800-30 will be performed. This assignment is intended to prepare for
the Week 8 applied risk assessment assignment, wherein you will use these
populated tables to gain insight in the selected system’s risks, apply
knowledge from this course, apply relevant information security metrics, and
discuss the considerations that should go into an actual information security
risk assessment discussion — limited to adversarial and non-adversarial
threats. This means that you should fill out those two templates as a minimum
as part of your The deliverable for this assignment should be a brief
description of your selected information system and Tables I-5 and I-7 created and
populated.
Submission Instructions: See the Writing Instructions in your
Syllabus as well as inserted below. Please submit a Word document in the
defined format to your Assignment folder by 11:55PM, Sunday, EST. Your writing
assignment will automatically be run through TurnItIn (just submit, you do
nothing else) to aid in preparing for your Final Research Paper, and also as a
tool to help with proper citation of research source material and appropriate
attribution of that material. The level of expectation is; All submission need
to be under 15% total originality score, with each individual references no
higher than 2% originality score.

ISSC661 Week 7 Assignment Final Research Paper Latest 2017
January
Assignment Instructions
Instructions:The Final Research Paper is due at the
end of Week 7 of the course (10 – 12 pages not including the Cover Page or the
References listing – APA 6thEdition
formatting). The final will count as 20% of the final grade. The paper will
follow a conventional paper format (Cover page, Body of Paper with
introduction, discussion / analysis / argument / body, conclusion, and
references pages). See the Writing Expectations contained in the Policies
section of the Syllabus for specific focus areas / guidance as well as
conforming with APA 6thedition
style guidelines. The objective of creating the final research paper includes
the finalization of your research paper development process, describing and
defending a cost-effective security strategy, and basing those upon meaningful
security program metrics in order to identify information security responses
and outcomes that are effective. As this is the culmination of the progressive
research paper activity, you should provide your cost-effective security
strategy, underpinned by security metrics, assessing and identifying issues
associated with your selected research topic discussion. Further, gained
insights from your research and reflection should result in recommended
mitigation actions for your selected information security system.

Submission
Instructions:

See the Writing Instructions in your Syllabus as well as
inserted below. Please submit a Word document in the defined format to your
Assignment folder by 11:55PM, Sunday, EST.Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with
proper citation of research source material and appropriate attribution of that
material.The level of expectation is; All submission need to be under 15%totaloriginality score, witheachindividual references no higher than
2% originality score.

ISSC661 Week 8 Assignment Risk Assessment Case Study Latest 2017
January
Assignment Instructions
Instructions: The Risk Assessment case study will use NIST
Special Publication 800-30 (available at
http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf
or in the Course Resources area) as the basis for performing a
risk assessment of a selected computing system. Using the Week 6 information
wherein you selected your information system for assessment a initially
populated Tables I-5 and I-7 from the NIST SP800-30, you will now finalize the
creation and population of your adversarial and a non-adversarial risk
assessment patterned after Table I-5 and Table I-7 in NIST SP 800-30 – this
means that you should fill out those two templates as a minimum as part of your
assessment – and provide discussion and analysis from that assessment. This
case study will count for 10% of the final grade. This case study will be due
at the end of Week 8. The case study should be between 7-8 pages long (not
counting the Cover and Reference pages), the Tables can either be embedded in
the text of your discussion or included as attachments to your paper, and will
follow a conventional paper format (Cover page, Body of Paper with
introduction, risk assessment / discussion / analysis / argument / body,
conclusion, and references pages). See the Writing Expectations contained in the
Policies section of the Syllabus for specific focus areas / guidance as well as
conforming with APA 6th edition style guidelines.

Submission Instructions:
See the Writing Instructions in your Syllabus as well as
inserted below. Please submit a Word document in the defined format to your
Assignment folder by 11:55PM, Sunday, EST. Your writing assignment will
automatically be run through TurnItIn (just submit, you do nothing else) to aid
in preparing for your Final Research Paper, and also as a tool to help with
proper citation of research source material and appropriate attribution of that
material. The level of expectation is; All submission need to be under 15%
total originality score, with each individual references no higher than 2%
originality score.

error: Content is protected !!