Cybersecurity Research | Edit and Improve

 I want to enhance and refine my research, elevating its engagement, informativeness, and persuasiveness. This will involve incorporating additional citations and references to strengthen the argument. Furthermore, I plan to integrate visual elements such as charts and graphs to provide a more comprehensive and visually appealing context for conveying the research findings. 

Answer the question

The AICPA’s Common Criteria list 9 categories to evaluate the Security Trust Service Criteria.  Briefly review the attached material on the Common Criteria and use it to perform a quick evaluation of your security breach that you have chosen for your research. Reacher case “MGM resorts security breach 2023″https://techcrunch.com/2023/10/06/mgm-resorts-admits-hackers-stole-customers-personal-data-cyberattack/

INTRODUCTION TO CYBERSECURTY

Part I:  Course Feedback.  Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course?  Part II:  Mr Scott is considering partnering with a company.  The transaction is not public yet and Mr. Scott has asked what we … Read more

INTRODUCTION TO CYBERSECURTY

Assuming you are planning to work in the Northern Virginia area after graduation.  There are some resources to prepare you for this.  This week’s discussion is about planning for your future.   1. 1.  Review the 2022 Labor Market: https://www.nvcc.edu/osi/labor-market/_docs/23-001-IndexSurveyReport22-final-web.pdfLinks to an external site. 2.  2. Download and read/review the Greater Washington Technology Workforce Needs Assessment report.  … Read more

DATABASE SYSTEM DESIGN AND MANAGEMENT

Assignment 4: ERD Use the following business rules to create a Crow’s Foot ERD. Write all appropriate connectivity and cardinalities in the ERD.  A department employs many employees, but each employee is employed by only one department.  Some employees, known as “rovers,” are not assigned to any department.  A division operates many … Read more

INTRODUCTION TO CYBERSECURTY

Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx. Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.  Chapters 3.6 (Gupta and Goyal) Chapter 4 (Fennelly) Minimum Requirements: Inside the Techworx building: 1st-floor reception and access to stairs, elevators, loading dock, and restrooms 2d floor offices and conference rooms … Read more

Introducing to Cybersecurty

During this quarter we will use a fictitious company called TechWorx.   Your boss is the CEO, Mr. Mike Scott.  He does not know a lot about IT or Cybersecurity so he will rely on your recommendations and expertise.   He recently was at a meeting where the McCumber Cube came up.  He is interested in your … Read more

Access Controls

Physical security, biometric technology, and societal acceptance   Discuss the strengths/weaknesses of the topic and possible improvements. Use at least one NIST resource as a reference. Use a minimum of 10 peer-reviewed resources.

Discussion board

 Read the article titled “Quantum Cryptography Explained: Applications, Disadvantages, & How It WorksLinks to an external site.“. Discuss what is Quantum Cryptography? Why can it be trusted when it comes to exchanging the Secret keys? What are its implication on security and authenticity for an organization that may want to use it?