Week 2 – Cyber

Week 2 Discussion – Question #2  As the demand for systems and applications continue to grow, organizations are striving to get things correct the first time as barriers are high and alternatives are plentiful.  Review the elements systems engineering discussed in Chapter 2 and select the most critical element and one you see commonly overlooked. … Read more

Network Security Monitoring Processes

Network Security Monitoring Processes Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures … Read more

31/p3

What are vulnerabilities associated with implementing virtualization? What is the likelihood for each vulnerability that it could be exploited? What strategies/methods can be used to mitigate the risks for virtualization?

Malicious Code

 Using the Internet and other print material, gather data about intrusion-detection systems (IDSs). Research 3-5 different vendor systems. Compare their list of features (active IDS, passive IDS, network-based, host-based, anomaly systems, etc.). Create a table that compares the features. Based on your research, which system would you recommend and why?  

Idea Paper

Instructions Concept/idea Paper. Submit an 3 page concept/idea paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings): Introduction. Problem Statement. Relevance and Significance. References (at least five). 2. Pre-approved research topics: � Authentication/Digital signatures � Data collections tools (hardware & software) � E-business/e-commerce … Read more

Week 4 – ALERT DATA TOOLS

Distinguish between alert data (including generation tools) and previously covered NSM monitoring (including collection tools).  Example of post:  ONLY AN EXAMPLE The difference between alert data and the data collected by NSM is that alert data is slightly more processed by the alert infrastructure and appends alert information. The input data is largely the same … Read more

s3/31

Many people say that threat modeling is exponentially expensive: Can the entire system be threat modeled? If not, how would you objectively decide which parts of the system to model?

Question 3

please answer below questions(Plagiarism applies)  What is a data model? What is a high-level conceptual data model? What is an entity? An attribute? A relationship? List and briefly describe the common record-based logical data models.