The Stages of Cyber Operations

 

The Stages of Cyber Operations

Introduction

Cyber operations have a long and storied history that has evolved tremendously over the last few decades. Cyber operations, and in particular its subset of cyber warfare, came into realization during the 1980s, took-off as an information-gathering mechanism during the late 1990s and early 2000s, then became militarized and still is to this day. Two major incidents that characterize the late 1990s and early 2000s are the Moonlight Maze and the Stuxnet incidents, respectively. Cyber operations were performed throughout each of these incidents.In this assignment, you will describe the goals and objectives of cyber operations, examine the Moonlight Maze and Stuxnet incidents, and identify the regulations or laws that were instituted in the U.S. because of these incidents.The specific course learning outcome associated with this assignment is:

  • Evaluate the stages and motivating factors of a cyber operation in network traffic.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you:

  • Describe the goals and objectives of each of the seven stages of cyber operations, defined for this assignment as:
    • Target recognition.
    • Reconnaissance.
    • Gaining access.
    • Hiding presence.
    • Establishing persistence.
    • Execution.
    • Assessment.
Moonlight Maze Incident
  • Explain how each cyber operations stage of the Moonlight Maze incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Moonlight Maze incident, citing specific, credible sources.
Stuxnet Incident
  • Explain how each cyber operations stage of the Stuxnet incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Stuxnet incident, citing specific, credible sources.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
    • Use section headers in your paper to clearly delineate your main topics.

Design project

5 pages 

Imagine you are managing a design project that will create an interface for automobile mechanics. The interface would be used by the mechanics to look up various fixes and parts for any number of makes or models of automobiles that may come through their garage. Decide what usability measures would be most motivating when designing this interface and describe the unique challenges you would have to plan for when designing an interface for an automotive repair shop. Use supporting evidence to support your response.

Parenting Week 4

 

Week 4

You are a preschool director, social worker, or friend. A parent tells you that their child loves using a smartphone, iPad, or computer games. The parent is not sure if it is appropriate. How would you respond if the child is a toddler or a preschooler? Using this scenario provide an informed response for each age group that is based on the role you selected (identify which one) and include reasoning for your response including why or why not this is recommended or developmentally appropriate for each age citing your resources.

NOTE- You need to address BOTH age groups in this assignment to demonstrate understanding the developmental differences. You may use the same advising “role” for both.

Paper length 500 words minimum, 2 academic references must be used, MS word or RTF attachment only.

Week 8 Submission

Create a set of UML and Data Flow diagrams. 

This is a required assignment, worth 45 points, and must be submitted by the due date.  Late assignments will not be accepted.

Details on the Project: 

  

Systems Diagrams and Visualization Project Create the following UML diagrams to visualize the process of completing the IT project from the previous exercise (providing IT services for a new building):

• Use Case diagram 

• Activity diagram 

• Communications diagram 

• Data Flow diagram 

Assume the following basic processes: 

1. Procurement of all resources. 

2. Setup of PCs and network servers. 

3. Deployment and Testing of resources to the IT Area/Office.

4. Deployment and Testing of resources to the Administrative Area.

5. Deployment and Testing of resources to the Conference Room. 

6. Deployment and Testing of resources to the Meeting Room. 

7. Deployment and Testing of resources to the Individual Offices. 

8. Deployment and Testing of resources to the Computer Labs. 

9. Testing of all Other Locations.

• Create a Use Case diagram to show all actors and the basic processes above 

o Procurement, Setup, Deployment & testing of each major location. 

• Create an Activity diagram to show the deployment and testing of resources into the Computer Labs o Network connectivity testing requires interaction between the PC and Network Specialist o Projector connectivity testing requires interaction between the PC and AV Specialist. 

• Create a Communications diagram to show collaboration between the PC Specialist, the Network Specialist, and the AV Specialist during deployment and testing of resources into the Computer Labs. 

o If network connectivity issues arise, the PC Specialist will communicate with the Network Specialist. 

o If projector connectivity issues arise, the PC Specialist will communicate with the AV Specialist. 

• Create a Data Flow diagram to show the Procurement of all resources, based on this additional information:

o The PC Specialist enters all purchases into the Purchase Application system once the resources are purchased. 

o The PC Specialists closes all purchases in the Purchase Application system once the resources are received.

When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 

Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and paste information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.

Submit your solution here.

The following is an example of UML and Data Flow diagrams:  Systems Diagrams & Visualization Example.pdf Systems Diagrams & Visualization Example.pdf – Alternative Formats

ITCO425U2DB

 Assignment Details

In Unit 2, as we enter the phase of our enterprise architecture implementation we must consider the various approaches required to implement enterprise software and system integration. Regardless of what plan is followed, Quality Assurance (QA) is an important consideration in enterprise system integration.

Choose one QA responsibility typical to an integration project execution. Discuss the specific quality metrics usually implemented during the integration phase of a project.

400 WORDS

Responses to Peers:

Share with your peers how their choices for QA strategies could be used to supplement your own.

Write the head of

  

Write the head of a “while” loop that checks against the conditions that the user enters (declared as a variable userInput before the while loop head) The loop stops if the userInput is “exit” or the user does not enter anything.