Assignment 2: Implementing Network And Personnel Security Measures
Assignment 2: Implementing Network and Personnel Security Measures
Due Week 8 and worth 100 points
The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.
Write a four to five (4-5) page paper in which you:
1. Create an information flow diagram, using Visio or Dia, which:
a. Illustrates how remote users will securely connect to the government agency’s network.
b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to
server.
Note: The graphically depicted solution is not included in the required page length.
2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:
a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.
3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:
a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
b. Indicate specific activities, personnel / resources required, and frequency of execution.
4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic assets.
5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
recommendations with your response.
6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
Describe best practices in cybersecurity.
Describe system, application, network, and telecommunications security policies and response.
Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
Use technology and information resources to research issues in cybersecurity.
Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.
By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 1/13
CIS499001VA016-1188-001 - INFORMATION SYSTEMS CAPSTONE
Week 8 Assignment 5 Submission Angel Menendez on Sun, Nov 25 2018, 8:12 PM
65% highest match Submission ID: a79539a0-2d20-479c-9aee-13764c1cfd79
Attachments (1)
CIS 499 Week 8 2 assigment.docx
Running Head: 1 INFRASTRUCTURE AND SECURITY 1
2 INFRASTRUCTURE AND SECURITY 7
INFRASTRUCTURE AND SECURITY ANGEL E. Menendez Professor Dr. Darcel Ford CIS
499 11/25/18
3 THE RELATIONSHIP BETWEEN INFRASTRUCTURE AND SECURITY DATA IS A
VITAL COMMODITY FOR A DATA COLLECTION AND ANALYSIS COMPANY, WHICH
MAKES IT BE SECURED WITH UTMOST IMPORTANCE. According to Murray (2013), the
value of data to a company depends on its usage, and therefore any compromise would mean the
data is valueless to any company. The company should thus be able to store, present, manage,
analyze and protect the data efficiently. When more people access data and derive valuable
information from it, this makes the data more invaluable. 4 THIS ARTICLE FOCUSES ON
THE RELATIONSHIP BETWEEN INFRASTRUCTURE AND SECURITY, A LOGICAL
AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE PLANNED NETWORK,
(http://safeassign.blackboard.com/)
CIS 499 Week 8 2 assigment.docx Word Count: 1,201 Attachment ID: 243066244
65%
http://safeassign.blackboard.com/
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 2/13
SECURITY POLICIES TO PROTECT THE COMPANY INFRASTRUCTURE AND
ASSETS AND SUMS UP WITH SECURITY POLICIES TO ADDRESS ETHICAL
ASPECTS RELATED TO EMPLOYEE BEHAVIOR, CONTRACTORS, PASSWORD
USAGE, AND ACCESS TO NETWORKED RESOURCES AND INFORMATION.
There exists a relationship between the infrastructure and security of data. Security of data depends
on the infrastructure of the company. Von Solms and Van Niekerk (2013) assert that the
infrastructure will determine loss of data confidentiality, loss of data integrity and may result in the
unavailability of data. This is because data in transit can easily be intercepted by unauthorized
parties which make a company’s infrastructure (workstations and servers) subject to unauthorized
access — a network that is stable, redundant, and scalable. Also, speed and reliability as downtime
can have dire consequences.
3 A LOGICAL AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE PLANNED
NETWORK A LOGICAL LAYOUT REFERS TO ALL THE COHERENT ASPECTS OF
THE NETWORK. 4 FOR EXAMPLE, IN A LOGICAL NETWORK, THERE IS VERY
LIMITED INTEREST IN THE ACTUAL INTERFACES AND PHYSICAL CABLES, SO
THESE DETAILS ARE NORMALLY IGNORED. LOGICAL LAYOUT ONLY SHOWS
THE ASSIGNED INTERNET PROTOCOL (IP) ADDRESSES TO VARIOUS HOSTS AND
DEVICES AND ROUTING TABLES. ON THE OTHER HAND, THE PHYSICAL DESIGN
OF THE NETWORK REFERS TO THE PHYSICAL LOCATION OF AND THE
CONNECTIONS BETWEEN DEVICES INCLUDED ON THE NETWORK. MURRAY
(2013), ASSERTS THAT WORKSTATIONS MAY BE DESCRIBED WITH A COMPUTER
ICON, SERVERS WITH FULL TOWER CASES, AND SWITCHES AND OTHER
SIMILAR DEVICES CAN BE PRESENTED AS SMALL RECTANGULAR BOXES WITH
THEIR PORTS. This is shown in Figure 2.
4 SECURITY POLICY TO PROTECT THE COMPANY INFRASTRUCTURE AND
ASSETS BY APPLYING THE PRINCIPALS OF CONFIDENTIALITY, INTEGRITY AND
AVAILABILITY THE CIA (CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF
DATA) IS A WIDELY USED STANDARD FOR THE EVALUATION OF INFORMATION
SYSTEMS SECURITY. Kim and Solomon (2016), affirms that confidentiality tackles the
measures undertaken to ensure secrecy is designed to prevent any sensitive information from
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 3/13
reaching the wrong people by making sure that the right people can get it. Thus the aspect of
privacy ensures that company infrastructure and assets are secured. Data encryption, user IDs and
passwords, two-factor authentication, biometric verification, and security tokens are some of the
ways to ensure confidentiality of company data and information.
Integrity is another key aspect that should be considered when protecting a company’s
infrastructure and assets. Knapp and Langill (2014) assert that integrity involves maintaining the
consistency, accuracy, and trustworthiness of data in transit. The data should not be modified,
corrupted or intercepted while in transit by unauthorized people. Security policies should be put in
place to ensure the data is continuously checked for changes, for example, by use of checksums to
verify the integrity of the data. The policies should ensure that backups and redundancies are
available to restore the affected data to its correct state in case of data corruption.
Lastly, the security policy should be enacted to ensure the availability of data. According to Kim and
Feamster (2013), availability is best guaranteed by rigorously maintaining all hardware, performing
hardware repairs immediately when needed, maintaining a correctly functioning operating system
environment that is free of software conflicts and to keep current with all necessary system
upgrades. Such policies can help reduce chances of system failure and makes sure the systems are
up to date with the most current security updates. This significantly assures the availability of data.
2 SECURITY POLICY TO ADDRESS ETHICAL ASPECTS RELATED TO EMPLOYEE
BEHAVIOR, CONTRACTORS, PASSWORD USAGE AND ACCESS TO NETWORKED
RESOURCES AND INFORMATION SECURITY POLICY REGARDING THE ETHICAL
ASPECTS RELATED TO PASSWORD USAGE SHOULD BE ENACTED. 4 HAN ET, AL.
(2015) asserts that the most prevalent issue affecting password usage is password sharing and use
of the default passwords. This is because hackers and even co-workers can easily decipher default
passwords and use employee accounts for malicious purposes which is ethically wrong. For this
reason, disabling any anonymous access to information and demanding the change of the default
usernames and passwords by the employees can enable.
Legal matters and ethical matters are two different aspects. Ethically, despite one having the
authority to access an employee’s privacy but choosing what is morally and ethically right is what
differentiates an ethical matter from a legal issue. According to Turnquist and Vugrin (2013), every
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 4/13
employee has a moral mandate to safeguard the company and other employees. 4 FOR
EXAMPLE, THE INFORMATION AN EMPLOYEE HAS ACCESS TO SHOULD NOT BE
USED TO HUMILIATE THAT PERSON, TO GAIN A POLITICAL INFLUENCE WITHIN
THE COMPANY, TO GET HIM/HER DISCIPLINED OR FIRED, OR EVEN FOR
BLACKMAIL. All these are ethical issues that arise and affect employee behavior; 4 THE
COMPANY/ORGANIZATION SHOULD SEE INTO IT THAT SUCH A MISUSE OF
COMPANY INFORMATION AND POWER ARE NOT MISUSED TO THE ADVANTAGE
OF A STRONGER EMPLOYEE AGAINST HI/HER WEAKER CO-WORKER.
SECURITY POLICY SHOULD ALSO BE DRAFTED ABOUT THE ACCESS TO
NETWORKED RESOURCES AND INFORMATION. This can be accomplished by ensuring
that networked resources and information can only be accessed by enforcing the use of secure
protocols only. According to Kizza (2013), network devices such as routers, switches, and printers
are growing ever more complex, with ever-increasing remote management features and
configuration option. For this reason, it is important to disable any anonymous access to
information and to disable any unused or unnecessary services or features running on the
networked can be among the many means used to secure networked and resources and
information.
Figure I: Physical and Virtual Components
Figure 2: 5 THE LOGICAL AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE
CURRENT
6 ( PHYSICAL LAYOUT ) ( LOGICAL LAYOUT )
4 REFERENCES HAN, B., GOPALAKRISHNAN, V., JI, L., & LEE, S. (2015). 4
NETWORK FUNCTION VIRTUALIZATION: CHALLENGES AND OPPORTUNITIES
FOR INNOVATIONS. IEEE COMMUNICATIONS MAGAZINE, 53(2), 90-97.
KIM, D., & SOLOMON, M. G. (2016). 4 FUNDAMENTALS OF INFORMATION
SYSTEMS SECURITY. JONES & BARTLETT PUBLISHERS.
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 5/13
KIM, H., & FEAMSTER, N. (2013). 4 IMPROVING NETWORK MANAGEMENT WITH
SOFTWARE DEFINED NETWORKING. IEEE COMMUNICATIONS MAGAZINE, 51(2),
114-119.
Kizza, J. M. (2013). 4 GUIDE TO COMPUTER NETWORK SECURITY. London: Springer
(pp. 387-411).
Knapp, E. 4 D., & LANGILL, J. T. (2014). 4 INDUSTRIAL NETWORK SECURITY:
SECURING CRITICAL INFRASTRUCTURE NETWORKS FOR SMART GRID, SCADA,
AND OTHER INDUSTRIAL CONTROL SYSTEMS. Syngress.
Murray, A. T. (2013). 4 AN OVERVIEW OF NETWORK VULNERABILITY MODELING
APPROACHES. GEOJOURNAL, 78(2), 209-221.
TURNQUIST, M., & VUGRIN, E. (2013). 4 DESIGN FOR RESILIENCE IN
INFRASTRUCTURE DISTRIBUTION NETWORKS. ENVIRONMENT SYSTEMS &
DECISIONS, 33(1), 104-120.
VON SOLMS, R., & VAN NIEKERK, J. (2013). 4 FROM INFORMATION SECURITY TO
CYBER SECURITY. COMPUTERS & SECURITY, 38, 97-102.
Citations (6/6)
Matched Text
1 Another student's paper
2 https://www.studynerds.com/downloads/cis-499-project-deliverable-5-infrastructure-security/
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 6/13
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx INFRASTRUCTURE AND SECURITY 1
Source - Another student's paper INFRASTRUCTURE AND SECURITY 1
Suspected Entry: 76% match
Uploaded - CIS 499 Week 8 2 assigment.docx INFRASTRUCTURE AND SECURITY 7
Source - https://www.studynerds.com/downloads/cis- 499-project-deliverable-5-infrastructure-security/
Infrastructure and Security
Suspected Entry: 65% match
Uploaded - CIS 499 Week 8 2 assigment.docx INFRASTRUCTURE AND SECURITY ANGEL E
Source - https://www.studynerds.com/downloads/cis- 499-project-deliverable-5-infrastructure-security/
Infrastructure and Security
Suspected Entry: 71% match
Uploaded - CIS 499 Week 8 2 assigment.docx SECURITY POLICY TO ADDRESS ETHICAL ASPECTS RELATED TO EMPLOYEE BEHAVIOR, CONTRACTORS, PASSWORD USAGE AND ACCESS TO NETWORKED RESOURCES AND INFORMATION SECURITY POLICY REGARDING THE ETHICAL ASPECTS RELATED TO PASSWORD USAGE SHOULD BE ENACTED
Source - https://www.studynerds.com/downloads/cis- 499-project-deliverable-5-infrastructure-security/
Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information
Suspected Entry: 62% match
Uploaded - CIS 499 Week 8 2 assigment.docx THE RELATIONSHIP BETWEEN INFRASTRUCTURE AND SECURITY DATA IS A VITAL COMMODITY FOR A DATA COLLECTION AND ANALYSIS COMPANY, WHICH MAKES IT BE SECURED WITH UTMOST IMPORTANCE
Source - Another student's paper Infrastructure and Security Relationship Between Infrastructure and Security Data is the most valuable asset for a data collection and analysis company
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 7/13
Suspected Entry: 76% match
Uploaded - CIS 499 Week 8 2 assigment.docx A LOGICAL AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE PLANNED NETWORK A LOGICAL LAYOUT REFERS TO ALL THE COHERENT ASPECTS OF THE NETWORK
Source - Another student's paper Rationale for The Logical and Physical Topographical Layout of The Planned Network A logical layout shows the logical aspects of the network
Suspected Entry: 63% match
Uploaded - CIS 499 Week 8 2 assigment.docx THIS ARTICLE FOCUSES ON THE RELATIONSHIP BETWEEN INFRASTRUCTURE AND SECURITY, A LOGICAL AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE PLANNED NETWORK, SECURITY POLICIES TO PROTECT THE COMPANY INFRASTRUCTURE AND ASSETS AND SUMS UP WITH SECURITY POLICIES TO ADDRESS ETHICAL ASPECTS RELATED TO EMPLOYEE BEHAVIOR, CONTRACTORS, PASSWORD USAGE, AND ACCESS TO NETWORKED RESOURCES AND INFORMATION
Source - Another student's paper Finally, the articles tackles a comprehensive security policy for the company that can protect the company infrastructure and assets by applying the principals of CIA, and address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information
Suspected Entry: 72% match
Uploaded - CIS 499 Week 8 2 assigment.docx FOR EXAMPLE, IN A LOGICAL NETWORK, THERE IS VERY LIMITED INTEREST IN THE ACTUAL INTERFACES AND PHYSICAL CABLES, SO THESE DETAILS ARE NORMALLY IGNORED
Source - Another student's paper In logical diagrams, there is very little interest in the actual interfaces and physical cables, so these details are usually omitted
Suspected Entry: 79% match
Uploaded - CIS 499 Week 8 2 assigment.docx LOGICAL LAYOUT ONLY SHOWS THE ASSIGNED INTERNET PROTOCOL (IP) ADDRESSES TO VARIOUS HOSTS AND DEVICES AND ROUTING TABLES
Source - Another student's paper For example, logical networks, assigned internet protocol (IP) addresses to various hosts and devices, routing tables and a lot more
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 8/13
Suspected Entry: 67% match
Uploaded - CIS 499 Week 8 2 assigment.docx ON THE OTHER HAND, THE PHYSICAL DESIGN OF THE NETWORK REFERS TO THE PHYSICAL LOCATION OF AND THE CONNECTIONS BETWEEN DEVICES INCLUDED ON THE NETWORK
Source - Another student's paper A Logical and Physical Topographical Layout of the Planned Network A physical layout of the network refers to the physical location of and the connections between devices included on the network
Suspected Entry: 75% match
Uploaded - CIS 499 Week 8 2 assigment.docx MURRAY (2013), ASSERTS THAT WORKSTATIONS MAY BE DESCRIBED WITH A COMPUTER ICON, SERVERS WITH FULL TOWER CASES, AND SWITCHES AND OTHER SIMILAR DEVICES CAN BE PRESENTED AS SMALL RECTANGULAR BOXES WITH THEIR PORTS
Source - Another student's paper According to Murray (2013), workstations are usually represented with small computer icons, servers with full tower cases, and switches and other similar devices are displayed as small rectangular boxes with their ports
Suspected Entry: 82% match
Uploaded - CIS 499 Week 8 2 assigment.docx SECURITY POLICY TO PROTECT THE COMPANY INFRASTRUCTURE AND ASSETS BY APPLYING THE PRINCIPALS OF CONFIDENTIALITY, INTEGRITY AND AVAILABILITY THE CIA (CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF DATA) IS A WIDELY USED STANDARD FOR THE EVALUATION OF INFORMATION SYSTEMS SECURITY
Source - Another student's paper Security Policy for the Company that will Protect the Company Infrastructure and Assets by Applying the Principals of CIA CIA (Confidentiality, Integrity and Availability of data) triad is a widely used benchmark for evaluation of information systems security
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx HAN ET, AL
Source - Another student's paper Han et, al
Suspected Entry: 69% match
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a0-… 9/13
Uploaded - CIS 499 Week 8 2 assigment.docx FOR EXAMPLE, THE INFORMATION AN EMPLOYEE HAS ACCESS TO SHOULD NOT BE USED TO HUMILIATE THAT PERSON, TO GAIN A POLITICAL INFLUENCE WITHIN THE COMPANY, TO GET HIM/HER DISCIPLINED OR FIRED, OR EVEN FOR BLACKMAIL
Source - Another student's paper For example, the information you can access gain from reading someone's e-mail since you are the administrator could be used to embarrass that person, to gain a political advantage within the company, to get him/her disciplined or fired, or even for blackmail
Suspected Entry: 84% match
Uploaded - CIS 499 Week 8 2 assigment.docx THE COMPANY/ORGANIZATION SHOULD SEE INTO IT THAT SUCH A MISUSE OF COMPANY INFORMATION AND POWER ARE NOT MISUSED TO THE ADVANTAGE OF A STRONGER EMPLOYEE AGAINST HI/HER WEAKER CO-WORKER
Source - Another student's paper All these are ethical issues that arise and affect employee behavior, the company/organization should see into it that such a misuse of company information and power are not misused to the advantage of a stronger employee against hi/her weaker co-worker
Suspected Entry: 65% match
Uploaded - CIS 499 Week 8 2 assigment.docx SECURITY POLICY SHOULD ALSO BE DRAFTED ABOUT THE ACCESS TO NETWORKED RESOURCES AND INFORMATION
Source - Another student's paper Security policy for the company that will address ethical aspects related to access to networked resources and information should also be established
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx REFERENCES HAN, B., GOPALAKRISHNAN, V., JI, L., & LEE, S
Source - Another student's paper References Han, B., Gopalakrishnan, V., Ji, L., & Lee, S
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx NETWORK FUNCTION VIRTUALIZATION
Source - Another student's paper Network function virtualization
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a… 10/13
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx CHALLENGES AND OPPORTUNITIES FOR INNOVATIONS
Source - Another student's paper Challenges and opportunities for innovations
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx IEEE COMMUNICATIONS MAGAZINE, 53(2), 90-97
Source - Another student's paper IEEE Communications Magazine, 53(2), 90-97
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx KIM, D., & SOLOMON, M
Source - Another student's paper Kim, D., & Solomon, M
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx FUNDAMENTALS OF INFORMATION SYSTEMS SECURITY
Source - Another student's paper Fundamentals of information systems security
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx JONES & BARTLETT PUBLISHERS
Source - Another student's paper Jones & Bartlett Publishers
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx KIM, H., & FEAMSTER, N
Source - Another student's paper Kim, H., & Feamster, N
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a… 11/13
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx IMPROVING NETWORK MANAGEMENT WITH SOFTWARE DEFINED NETWORKING
Source - Another student's paper Improving network management with software defined networking
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx IEEE COMMUNICATIONS MAGAZINE, 51(2), 114-119
Source - Another student's paper IEEE Communications Magazine, 51(2), 114-119
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx GUIDE TO COMPUTER NETWORK SECURITY
Source - Another student's paper Guide to computer network security
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx D., & LANGILL, J
Source - Another student's paper D., & Langill, J
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx INDUSTRIAL NETWORK SECURITY
Source - Another student's paper Industrial Network Security
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx SECURING CRITICAL INFRASTRUCTURE NETWORKS FOR SMART GRID, SCADA, AND OTHER INDUSTRIAL CONTROL SYSTEMS
Source - Another student's paper Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a… 12/13
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx AN OVERVIEW OF NETWORK VULNERABILITY MODELING APPROACHES
Source - Another student's paper An overview of network vulnerability modeling approaches
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx GEOJOURNAL, 78(2), 209-221
Source - Another student's paper GeoJournal, 78(2), 209-221
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx TURNQUIST, M., & VUGRIN, E
Source - Another student's paper Turnquist, M., & Vugrin, E
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx DESIGN FOR RESILIENCE IN INFRASTRUCTURE DISTRIBUTION NETWORKS
Source - Another student's paper Design for resilience in infrastructure distribution networks
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx ENVIRONMENT SYSTEMS & DECISIONS, 33(1), 104- 120
Source - Another student's paper Environment Systems & Decisions, 33(1), 104-120
Suspected Entry: 99% match
Uploaded - CIS 499 Week 8 2 assigment.docx VON SOLMS, R., & VAN NIEKERK, J
Source - Another student's paper Von Solms, R., & Van Niekerk, J
11/25/2018 SafeAssign Originality Report
https://blackboard.strayer.edu/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_233614_1&paperId=243066244&&attemptId=a79539a… 13/13
Suspected Entry: 100% match
Uploaded - CIS 499 Week 8 2 assigment.docx FROM INFORMATION SECURITY TO CYBER SECURITY
Source - Another student's paper From information security to cyber security
Suspected Entry: 99% match
Uploaded - CIS 499 Week 8 2 assigment.docx COMPUTERS & SECURITY, 38, 97-102
Source - Another student's paper computers & security, 38, 97-102
Suspected Entry: 88% match
Uploaded - CIS 499 Week 8 2 assigment.docx THE LOGICAL AND PHYSICAL TOPOGRAPHICAL LAYOUT OF THE CURRENT
Source - Another student's paper Logical and Physical Topographical Layout
Suspected Entry: 79% match
Uploaded - CIS 499 Week 8 2 assigment.docx ( PHYSICAL LAYOUT ) ( LOGICAL LAYOUT )
Source - Another student's paper Logical and Physical Layout