Unit 7, Select Appropriate Encryption Algorithms
1. Digital signature
It lets the recipient know that a known sender created the message, and that it
was not altered in transmission (Kim, 2012, pp. 309-312).
Unit 5, Auditing System Policies
1. Establish audit benchmarks and baselines.
2. Verify accuracy of controls and compliant operation.
3. Define the audit plan.
4. Collect audit data and conduct interviews.
Final Exam Review
Health Insurance Portability and Accountability Act
Protected health information
Department of Health and Human Services
Protects security and privacy of personally identifiable health informat
Unit 7, Assignment 2
Design an Encryption Strategy
I have chosen an encryption strategy based on the AES encryption standard to protect
Richman Investments. This strategy is to protect the investors data as well as the
Qualitative Risk Assessment
Single loss expectancy (SLE): Total loss expected from a single incident Annual rate of
occurrence (ARO): Number of times an incident is expected to o
Match each description to its plan by writing the description's number in the appropriate blank.
Some descriptions may apply to two or more plans.
Unit 5, Testing and Monitoring Security Controls
What do log files help you learn that filtering systems overlook?
Log Files contain complete records of all security events (logon events, resource access,
Unit 4, Assignment 2
Acceptable Use Policy
Richman Investments employees using company computers and notebooks to access the Internet
and company email is authorized for conducting Company business only
Unit 4, Assignment 1
Enhance an Existing IT Security Policy Framework
Remote Access refers to the ability to access Richman Investments network resources. Security
measures for remote access should be implement
Unit 3, Assignment 1
Remote Access Control Policy
The purpose of this policy is to define standards for connecting to Richman Investments
network from any host. These standards are designed to minimize the pote
Unit 2, Assignment 2
Microsoft Environment Analysis
1. A. Microsoft Security Advisory (MSVR11-003) Vulnerability in RealNetworks
RealPlayer Could Allow Remote Code Execution
Tuesday, May 17, 2011
B. Microsoft Security A
Unit 2, Assignment 1
Calculate the Window of Vulnerability
The Window of Vulnerability is actually difficult to calculate because it is dependent on
multiple factors. It starts with the initial recognition of the vulner