Running head: UNIT 9-2 ASSIGNMENT 1
UNIT 9-2 ASSIGNMENT 2
Unit 9-2 Assignment
Your Name
Purdue University Global
IT484 Cybersecurity Policies
Associate Professor David Lecomte
May 21, 2020
Part 1 Instructions: Create a 10 slide PowerPoint slide show that describes policies … example … acceptable use policy … Internet use policy … data retention policy … data storage policy … physical security … access control policy … data disposal policy … BYOD policy … remote work policy. Then recommend one of these policies and support your recommendation. . Your presentation will be to upper management in an enterprise firm with over 2000 employees and 6 locations throughout the world. Possible outline: Slide 1 = Title slide, Slides 2-4 are common cyber security policies, Slides 5-9 are details of you recommended policy. Be sure to include:
1. Includes a highly developed viewpoint, purpose and exceptional content.
2. Paper and slides demonstrate superior organization, are well ordered, logical, and unified.
3. Free of grammar and spelling errors.
4. No evidence of plagiarism.
5. At least 3 outside references on the topic of cybersecurity policies.
6. Note: Be sure to use the notes portion within the slides to include additional content
Your slide show must include notes in the slides.
Part 2: Compose a 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation.
Replace these words with 300 or more words explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation. Then change the color of the text back to black and remove the italics.
Define communications skills … define problem solving skills … define decision making skills … define listening skills … define negotiation skills … define assertiveness skills
References
Here are some possible resources:
https://www.indeed.com/career-advice/resumes-cover-letters/communication-skills
https://hubworks.com/blog/ten-communication-skills-every-young-professional-needs-to-know.html
https://www.merriam-webster.com/dictionary/communication
https://www.thebalancecareers.com/communication-skills-list-2063779
https://blog.smarp.com/top-5-communication-skills-and-how-to-improve-them
https://www.thebalancecareers.com/communication-skills-list-2063779
https://www.indeed.com/career-advice/resumes-cover-letters/problem-solving-skills
https://www.skillsyouneed.com/ips/active-listening.html
https://zety.com/blog/decision-making-skills-resume
NOTE: DELETE this line and ALL underlined text before submitting your Assignment.
Assignment 9-2 Grading Rubric = 20 points
Assignment Requirements |
Points Possible |
Points Earned |
Part 1: Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies and that contains a policy recommendation of some type. Your presentation will be to upper management in an enterprise firm with over 2000 employees and six locations throughout the world. Your presentation needs to include a title page and follow APA formatting guidelines. Note: Be sure to use the notes portion within the slides to include additional content. |
0–10 |
|
Part 2: Compose a 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy in for your policy recommendation. |
||
Column Total |
0–20 |
|
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable. |
||
New total after deductions |
Running head: UNIT 9-1 ASSIGNMENT 1
UNIT 9-1 ASSIGNMENT 2
Unit 9-1 Assignment
Your Name
Purdue University Global
IT484 Cybersecurity Policies
Associate Professor David Lecomte
May 21, 2020
Part 1: Using the Internet and/or the Library
Research and explain your answer to the following: Explain the Stuxnet virus. Be sure to cover what is thought to be its goals, how successful it was in accomplishing those goals, the possible methods of initial system infections, how it was discovered, and the long-term implications of Stuxnet relative to cyber-warfare.
SOME THOUGHTS: What were the goals of Stuxnet? Designed to attack industrial control systems the operated the Iran nuclear program. . Replace these words with a 1-200 of your own words that in total … explains the Stuxnet virus.
How successful was it at accomplishing its goals? Discovered in 2010 … based on log file. One goal was to infect four companies that had contracts to do work at the Natanz nuclear facility … spread over 14 companies Replace these words with a 1-300 of your own words that in total
What were the possible methods of initial system infections? Replace these words with a 1-300 of your own words that in total
How it was discovered? Replace these words with a 1-300 of your own words that in total
What are the long-term implications of Stuxnet relative to cyber-warfare? Replace these words with a 1-300 of your own words that in total
References
POSSIBLE RESOURCES
Anderson, N. (2012, June 1). Confirmed: US and Israel created Stuxnet, lost control of it. Ars Technica. Retrieved March 7, 2020, from https://arstechnica.com/tech-policy/2012/06/confirmed-us-israel-created-stuxnet-lost-control-of-it/
Kushner, D. (2013, February 26). The Real Story of Stuxnet. IEEE Spectrum: Technology, Engineering, and Science News. Retrieved March 7, 2020, from https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
Sample Data Security Policies. (n.d.). Sophos.com. Retrieved March 7, 2020, from https://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-example-data-security-policies-na
Segura, J. (2016, March 30). Stuxnet: New light through old windows. Malwarebytes Labs. Retrieved March 7, 2020, from
https://blog.malwarebytes.com/threat-analysis/2013/11/stuxnet-new-light-through-old-windows/
Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired, Conde Nast, 3 June 2017, www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.
Sohail. “Host Based IDS vs Network Based IDS.” Securitywing, securitywing.com/host-based-ids-vs-network-based-ids/.
Bernstein, J. (2014). Nuclear Iran. Harvard University Press.
Lindsay, J. (2013). Stuxnet and the Limits of Cyber Warfare. Security Studies, 22(3), 365–404. https://doi-org.libauth.purdueglobal.edu/10.1080/09636412.2013.816122
Murphy, B. (2015). SSCP (ISC)2 Systems security certified practitioner official study guide, (1st, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://purdueuniversityglobal. vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00
Plumpton, D. (2019). Cyber-Physical Systems, Internet of Things, and Big Data in Industry 4.0: Digital Manufacturing Technologies, Business Process Optimization, and Sustainable Organizational Performance. Economics, Management & Financial Markets, 14(3), 23–29. https://doi-org.libauth.purdueglobal.edu/10.22381/EMFM14320193
TRAUTMAN, L. J., & ORMEROD, P. C. (2018). Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. University of Miami Law Review, 72(3), 761.
Wu, X. (2016). Stuxnet detected, Pc breaks down. Science China. Life Sciences, 59(11), 1202–1203.
Fruhlinger, J. (2017, 08 22). What is Stuxnet, who created it and how does it work? Retrieved from CSO Online: https://www.csoonline.com/article/3218104/what-is-stuxnet-who-created-it-and-how-does-it-work.html
Kaspersky. (N.D.). What is Zero Day Exploit. Retrieved from Kaspersky:
https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit
Imperva. (n.d.). Zero-day (0day) exploit. Retrieved from
https://www.imperva.com/learn/application-security/zero-day-exploit/
McAfee. (n.d.). What is Stuxnet? Retrieved from
https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-stuxnet.html
KVLTVR. (2019). Zero Days (2016) Documentary. Youutbe.com . Retrieved from
https://www.youtube.com/watch?v=PJBBRUraKgo
Obama Whitehouse. (2015). Remarks by the President on the Iran Nuclear Deal. [transcript]. Retrieved from
https://obamawhitehouse.archives.gov/the-press-office/2015/08/05/remarks-president-iran-nuclear-deal
Gonzalez, C. (2015, June 1). Engineering Essentials: What Is a Programmable Logic Controller? Retrieved from Machine Design: https://www.machinedesign.com/learning-resources/engineering-essentials/article/21834250/engineering-essentials-what-is-a-programmable-logic-controller
Stuxnet. (2017, August 10). Retrieved from NJCCIC: https://www.cyber.nj.gov/threat-profiles/ics-malware-variants/stuxnet
What Is Stuxnet? (N.D.). Retrieved from McAfee: https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-stuxnet.html
What is Zero Day Exploit? (2020). Retrieved from kapersky: https://usa.kaspersky.com/resource-center/definitions/zero-day-exploit
Zetter, K. (2014, November 03). An Unprecedented Look at Stuxnet, the World’s First Digital Weapon. Retrieved from Wired: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
NOTE: DELETE this line and ALL underlined text before submitting your Assignment.
Assignment 9-1 Grading Rubric = 45 points
Assignment Requirements |
Points Possible |
Points Earned |
Part 1 |
||
Explain the Stuxnet virus. Be sure to cover what is thought to be its goals, how successful it was in accomplishing those goals, the possible methods of initial system infections, how it was discovered, and the long-term implications of Stuxnet relative to cyber-warfare. (1000 or more words) |
0–45 |
|
Part 2 |
||
Construct a security policy for the physical domain. (200 or more words) |
0–15 |
|
Column Total |
||
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable. |
||
New total after deductions |