Techfite Case Study 2

  Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt). A.  Address ethical issues for cybersecurity by doing the following: 1.  Discuss … Read more

Identifying Data Roles

  Discuss different types of data roles and why each of them is important for the successful completion of the data life cycle. Respond to two peers by commenting on their posts and briefly summarizing the change in security and privacy protection by countries and organizations. Focus on the why, what, or how of privacy protecting. 

PC 102 discussion

 Explain the TCP/IP protocols and standards windows uses for networking for both a wireless and wired network. Make sure to research at which layer of the OSI Model they are located. In your opinion please describe the layer you believe to be the most important.

HW Lesson 3

   1.  What is an audit universe and what does it include? List and describe each component you would include in an audit universe. 2.  What is Control Objectives for Information and Related Technology (COBIT) and why is it valuable to management and IT auditors? 3. Why are risk assessments significant to the audit function? … Read more

OSINT 5-1

  Review your collection plan submitted in Week 1. You will develop a short 1300 word paper. Task: Write a review of your collection plan and techniques, answering the following. Identify if your collection plan and techniques have changed since your initial collection plan was created. Identify why the techniques used initially may vary from … Read more

HW 1

Why IT auditing evolved from traditional auditing? Why is IT auditing considered an integral part of the audit function? Which U.S. federal law was developed/passed in reaction to major financial frauds, such as, Enron? Explain the details of the law and cite at least 3 relevant sections of the law related to the Enron case. … Read more

Research report

   Need to present a research reports on  1. Machine learning method 2. User Behavior Analytics (UBA)  Both reports should be written with a word count of 70-105 words(not more than the count provided) and should provide a URL reference link too .  Note : NO PLAGIARISM  Should have minimum of 3 statements which describes … Read more

osint 5

  Visit the website Google Hacking Database (https://www.exploit-db.com/google-hacking-database). You will develop a short 1300 word document. Task: Identify 15 dork strings:         1. What syntax will be necessary to gain the information?         2. What information do you expect to gain from the dorks?         3. … Read more

osint

  You will develop a short 1300 word document. Task: Describe how OSINT can be used to supplement your organizational collection plan, identify 10 sites that can be used to research sites/domains for: legitimacy sender verification list of domains (country codes/domains/extensions, organization domains, other IOC (indicators of compromise) that might need to be researched)  https://github.com/dthroner/Hacking/blob/master/Google%20Hacking%20For%20Penetration%20Testers-Syngress%20(2015).pdf 

Research report

Need to present a research report on Finger Vein scan/vascular technology with a word count of 70-110 words(not more than the count provided) and should provide a URL reference link too . Note : NO PLAGIARISM Tips: It is regarding the security measures we take in order to secure our data. This question is from … Read more