INTRODUCTION TO CYBERSECURTY

Assuming you are planning to work in the Northern Virginia area after graduation.  There are some resources to prepare you for this.  This week’s discussion is about planning for your future.   1. 1.  Review the 2022 Labor Market: https://www.nvcc.edu/osi/labor-market/_docs/23-001-IndexSurveyReport22-final-web.pdfLinks to an external site. 2.  2. Download and read/review the Greater Washington Technology Workforce Needs Assessment report.  … Read more

DATABASE SYSTEM DESIGN AND MANAGEMENT

Assignment 4: ERD Use the following business rules to create a Crow’s Foot ERD. Write all appropriate connectivity and cardinalities in the ERD.  A department employs many employees, but each employee is employed by only one department.  Some employees, known as “rovers,” are not assigned to any department.  A division operates many … Read more

INTRODUCTION TO CYBERSECURTY

Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx. Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.  Chapters 3.6 (Gupta and Goyal) Chapter 4 (Fennelly) Minimum Requirements: Inside the Techworx building: 1st-floor reception and access to stairs, elevators, loading dock, and restrooms 2d floor offices and conference rooms … Read more

Introducing to Cybersecurty

During this quarter we will use a fictitious company called TechWorx.   Your boss is the CEO, Mr. Mike Scott.  He does not know a lot about IT or Cybersecurity so he will rely on your recommendations and expertise.   He recently was at a meeting where the McCumber Cube came up.  He is interested in your … Read more

Access Controls

Physical security, biometric technology, and societal acceptance   Discuss the strengths/weaknesses of the topic and possible improvements. Use at least one NIST resource as a reference. Use a minimum of 10 peer-reviewed resources.

Discussion board

 Read the article titled “Quantum Cryptography Explained: Applications, Disadvantages, & How It WorksLinks to an external site.“. Discuss what is Quantum Cryptography? Why can it be trusted when it comes to exchanging the Secret keys? What are its implication on security and authenticity for an organization that may want to use it?  

SECURITY POLICY & STANDARTS

NIST Cyber Security Frameworks When a company is looking for potential vendors/suppliers for a project, what would be the impact if the company asked vendors submitting proposals to provide information about their cybersecurity framework profile? How would that affect the supplier-customer relationship?

Discussion board

  What are the implications of vehicle hacking for autonomous vehicles? Today’s vehicles have complex computer code and autonomous vehicles will have even more complex code. Do you think we will ever have widespread use of safe autonomous vehicles? Why or why not? One of the suggestions to improve vehicle security is for car manufacturers … Read more

discussion board

 What is an advantage of using IP spoofing along with the TCP SYN flood attack?  What are some ways in which this type of attack could be detected?  What are some other ways in which TCP is vulnerable? 

Discussion board

 Do you think that it’s important for digital crimes units to be careful when taking down DNS domains that are supporting cybercrime groups in order to minimize collateral damage? Do you think the extra cost to use passive DNS is worth it?