network security layers

The purpose of a vulnerability scanner is to scan systems within your environment to make sure there are no missing patches or known threats. Depending on the size of the environment this can be a daunting task. Is this discussion you are to research a vulnerability scanner (try not to duplicate your classmates if possible). … Read more

network security

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability. Answer the following question(s): In your opinion, which domain is the most difficult to monitor for … Read more

Drones and Mobile Computers

Week 12 Discussion – Drones and Mobile Computers For your initial post, select and discuss two topics below. Respond to posts from other students who have chosen different topics. Drones and Computers that are Mobile Describe possible legal legal and liability challenges related to Civilian Drones, Driverless Cars, and Autonomous Robots.  Is it right to hold software designers … Read more

network administration

There are several different firewall architectures available: Main Border Firewall Screened Firewall Internal Firewall Host Firewall DMZ Firewall In this discussion, you are to describe each of these and describe when they could/would be used. Additionally, how can these be layered and used together to provide better security? What could be a disadvantage to using … Read more

Protection of Intellectual Property

Week 11 Discussion – Protection of Intellectual Property For your initial post, discuss the two topics below. Respond to posts from other students. Protection of Intellectual Property: Describe the possible effects 3-D printing may have on Copyright and Patent.   How might pirated 3-D digital designs affect future innovation? Explain how 3-D printing of biological DNA and replacement organs in … Read more

Develop the Intelligence Debriefing

  Your nation’s technical staff expects you to report on all summit events once you return to your nation’s capital. The CISO has requested that each analyst work independently to create an Intelligence Debriefing for technical staff. This debriefing is a comprehensive report and is comprised of your BCP, SITREP 1, SITREP 2, and SITREP 3. Each team … Read more

Supply Chain Security

Week 7 Discussion – Supply Chain Security For your initial post,  discuss topics below. Respond to posts for other students topics. Supply Chain Security: Describe roles and responsibilities within an organization that help assure proper security when purchasing hardware, software, and network equipment from external suppliers.  What types of cybersecurity vulnerabilities can a supplier of computer services introduce into a … Read more

back-door encryption.

Over the last several years there has been a push to insert back doors into encryption software so government and police can access encrypted data,   research an article either for or against backdoors in encryption software and summarize the article. Discuss if you agree or disagree with the author and why. 

Creating an Effective Disaster Recovery Plan

  Discuss how a proper disaster recovery plan should be created. For this discussion, point out all the key elements of a disaster recovery plan and how these elements should be implemented. Respond to two peers.   Compare and contrast their disaster recovery plans with yours.  Expound on key differences and similiarities. 

Motivations of Threat Actors

For your initial post, discuss all points in the two topics below. Respond to posts from other students. Motivations of Threat Actors – Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and (3) world view as a political or social activist.  What kinds of targets do each … Read more