Blockchain Applications in Finance Discussion

Prepare a one page APA style paper about blockchain applications. In the paper be sure to (1) define the parameters of blockchain applications, (2) address why they are needed, (3) discuss the different types and (4) discuss how the current markets could benefit from the use of such applications. Use at least 2 sources in this paper (and please be sure to cite them in the paper). Follow the writing guidelines for this course.

Gaining Access Plan Running Commands on The Terminal

Turnitin® enabledThis assignment will be submitted to Turnitin®.

After collecting enough information about the target during Deliverable 2 (Reconnaissance and Scanning Plan), you will describe how to use that information to gain access to Haverbrook’s systems. Your one- to two-page plan on gaining access should include:

  • details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.
  • an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.

As you are developing the Gaining Access Plan, keep these questions in mind:

  • How would you escalate your privileges?
  • How would you establish a command and control communication channel?

Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.

Use the Gaining Access Plan template to record your work. Please submit your work to the LEO submission box below

Outsourcing Network Technologies Discussion

The Chief Operating Officer (COO) has tasked you to provide recommendations on the technologies within your environment that should be outsourced. You recommended the two technologies below:

  • Full support of all network devices including switches, firewalls, and routers
  • An accounting application with several third-party plugins

The COO gave you the green light to continue your research and has asked for additional information to support a final decision. As you formulate your response to the COO, think beyond just networking and consider how your specialization interacts with other functions and the overall business purpose:

  • What role should virtualization, software-defined networking (SDN), and automation play in your recommendation?
  • What is the relationship between core and edge systems?
  • What other factors would influence your recommendation?
  • How would your decision be different if you are overseeing a team of four technicians versus a larger team of fourteen?

Your response should be no more than two well-written paragraphs. Ensure you provide citations in either IEEE or APA 7th Edition style for any external sources.

System Requirements Server Virtualization Discussion

This discussion focuses on implementing security controls to secure an enterprise virtualization platform.

In this scenario, you are a security engineer for a company where 50% of the servers are virtualized, 25% are physical servers acting as hypervisors, and 25% of the servers are stand-alone physical machines. Write one paragraph showing in-depth technical detail for each of the following:

  1. Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% of physical stand-alone servers.
  2. Describe how you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.
  3. Choose a project management methodology you would use to manage the analysis, planning, and implementation of the virtualization project.

After your initial post, review the posts of several students and respond constructively to the posts of two of your peers who took different approaches than you did.

In your response post, respectfully identify which portion of the response you have a different opinion on and explain why you took a different approach. Ask any clarifying questions about anything you did not understand in their post.

To complete this assignment, review the Discussion Rubric document.

Attacking Network Security Monitoring Discussion

In a minimum of 300 words, differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.

Blockchain Applications in Finance Discussion

Prepare a one page APA style paper about blockchain applications. In the paper be sure to (1) define the parameters of blockchain applications, (2) address why they are needed, (3) discuss the different types and (4) discuss how the current markets could benefit from the use of such applications. Use at least 2 sources in this paper (and please be sure to cite them in the paper). Follow the writing guidelines for this course.

Gaining Access Plan Running Commands on The Terminal

This assignment will be submitted to Turnitin®.

After collecting enough information about the target during Deliverable 2 (Reconnaissance and Scanning Plan), you will describe how to use that information to gain access to Haverbrook’s systems. Your one- to two-page plan on gaining access should include:

  • details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.
  • an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.

As you are developing the Gaining Access Plan, keep these questions in mind:

  • How would you escalate your privileges?
  • How would you establish a command and control communication channel?

Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.

Use the Gaining Access Plan template to record your work. Please submit your work to the LEO submission box below.

Outsourcing Network Technologies Discussion

The Chief Operating Officer (COO) has tasked you to provide recommendations on the technologies within your environment that should be outsourced. You recommended the two technologies below:

  • Full support of all network devices including switches, firewalls, and routers
  • An accounting application with several third-party plugins

The COO gave you the green light to continue your research and has asked for additional information to support a final decision. As you formulate your response to the COO, think beyond just networking and consider how your specialization interacts with other functions and the overall business purpose:

  • What role should virtualization, software-defined networking (SDN), and automation play in your recommendation?
  • What is the relationship between core and edge systems?
  • What other factors would influence your recommendation?
  • How would your decision be different if you are overseeing a team of four technicians versus a larger team of fourteen?

Your response should be no more than two well-written paragraphs. Ensure you provide citations in either IEEE or APA 7th Edition style for any external sources.

System Requirements Server Virtualization Discussion

This discussion focuses on implementing security controls to secure an enterprise virtualization platform.

In this scenario, you are a security engineer for a company where 50% of the servers are virtualized, 25% are physical servers acting as hypervisors, and 25% of the servers are stand-alone physical machines. Write one paragraph showing in-depth technical detail for each of the following:

  1. Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% of physical stand-alone servers.
  2. Describe how you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.
  3. Choose a project management methodology you would use to manage the analysis, planning, and implementation of the virtualization project.

After your initial post, review the posts of several students and respond constructively to the posts of two of your peers who took different approaches than you did.

In your response post, respectfully identify which portion of the response you have a different opinion on and explain why you took a different approach. Ask any clarifying questions about anything you did not understand in their post.

To complete this assignment, review the Discussion Rubric document.

Application of Information Governance

Provide a reflection of latest 500 words (or 2 pages double spaced) of the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

– Use of proper APA formatting and citations. if supporting evidence from outside resources is used those must be properly cited.

– Demonstrate a connection to your work environment.

-The assignment asks that reflect how the knowledge and skills obtained through meeting course objectives were applied.