P-2

Deliverable: Working/Annotated Bibliography As you begin researching you will conduct a preliminary source review which should include a variety of articles related to the research topic. Your focus should be on the more formal sources (i.e. peer reviewed articles).  Websites, internet articles, newspapers, interviews, etc. are useful in identifying sources. They can also help support your points. … Read more

Week 1 assignment cyber

nstructions When answering the below questions, it is important to think about technologies that exist today that did not exist 20 years ago. 1) Research a historical cyber attack, from within the past 10 years. Put together a case document/report covering the key aspects of the attack. Use the attached sample report (you may not … Read more

cyber security

250+ words 1) Online services are making the ability to commit cybercrimes easy. Research an online service and case. Please explain the details of the service/case in the discussion board. When using online services, what can be done to stay secure? 2) Is software piracy really a big problem? Research cases on software piracy. a) … Read more

plan for project

 I have many ideas about my project , I will be glad if you can help me to choice a unique one.  First of all , my project is all about the ways of internal hacking , there is an ideal idea about exploit called “ ETERNALBLU” , this exploit was leaked by hackers in … Read more

4/4 Assignment

Paper on Mitigation Strategy Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4. As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name). Conduct Internet … Read more

4/3 Discussion

Read Chapters 14–17 in your textbook. Using the discussion link below, respond to the following prompts and questions: What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)? How can threats from Internet-based activities, such as the use … Read more

4/2 Reading

Read Chapters 14–17 in your textbook. Using the discussion link below, respond to the following questions: What was the most useful takeaway for you from this workshop’s reading? What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

4/1 Devotional

The scriptures suggest that you “train up a child in the way they should go, and even when he is old he will not depart from it” (Proverbs 22:6, ESV). Training is considered important in maintaining a healthy perspective in life. So too can training of employees provide many benefits. A security awareness program provided … Read more

Keyterms : Definitions

*Agile model •Black-box testing •Buffer overflow •Canonicalization error •Code injection •Common Vulnerabilities and Exposures (CVE) •Common Weakness Enumeration (CWE) •Cryptographically random •CWE/SANS Top 25 Most Dangerous Software Errors •Deprecated function Backout planning •Business continuity plan (BCP) •Business impact analysis (BIA) •Cold site •Delta backup •Differential backup •Disaster recovery plan (DRP) •Fault tolerance •Full backup