Malicious software

Malicious software attacks are a common concern for IT security professionals. Even with the growth in the use of IT security and antivirus software, these attacks continue. Why do you feel that this is a constant threat? Are there actions that IT security professionals can undertake to reduce or eliminate this threat? 

Security Work

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Dissertation seminar) have been applied or could be applied, in a practical manner to your current work environment(IT field). APA format with references needed.

Week 1 assignment cyber

Instructions  Assignment #1: In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail.  … Read more

Security – Technology

 Submit your final draft of Chapter Two. Before submitting, you should carefully review Chapter 2 and check the following: Topic :  The Smart Phone as a Dangerous Technology   Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references … Read more

Branches of Security

   Discuss the importance of understanding the branches of security noted below. Physical Security Personnel Security Network Security Computer Security Device Security Data Security Application Security Operations Security Database Security Limit explanation to 2 pages APA format. Provided references must not be more than 5 years old and no more than one entity source and … Read more

Blockcchain and security

Research an example of how blockchain technology can be used to provide better security for any type of organizational activity.  Provide a brief  overview of the implementation of blockchain technology that is being used, and how this implementation provides a better (from a convenience, cost or security standpoint) alternative to what is currently being used. … Read more

Physical security

Based on your reading this week, you can see that many who attempt to  breach information systems rely on social engineering in order to gain  access. Why do you think this is? Can you suggest a policy or set of  policies that could reduce the frequency of social engineering attacks? 

Discussion -Obstacles

In this discussion, give a description of your progress, what obstacles have you encountered, and what ways have you overcome these obstacles.  Topic :  The Smart Phone as a Dangerous Technology  Continue to develop your Chapter 2 literature review around the theory for your dissertation topic.  APA format with references needed 500words