ITS-834: Emerging Threats & Countermeasures. Discussion, reflection: practical connection and Research Paper

 Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

 Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness.  International Journal of Information Security17(6), 681–699.  https://doi.org/10.1007/s10207-017-0382-0

Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.  https://ieeexplore.ieee.org/document/9036175

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.  https://ieeexplore.ieee.org/document/8992645

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Pen Attack and Cyber Terrorism

 Word count: 300+ words

Chapters 15, and 16 in the course textbook 

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reflection: Practical Connection Assignment

Number of pages: 2+ pages

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: 
Provide a reflection of at least 2 pages of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide 2+ pages minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 3 individual assignments (discussion, research paper and reflection).

Please provide answers in separate documents. 

no title required.

You will be writing about cyber crime. 

Criteria for this assessment includes:

Breadth and Depth of Information:

Sources and evidence skillfully demonstrates use of a variety of high-quality, credible, relevant sources to develop ideas that are appropriate for the discipline

Access of Information:

Accesses information using effective, well-designed search strategies and most appropriate information sources

Evaluation of Information and its Sources:           

Thoroughly systematically and methodically analyzes own and others’ assumptions and carefully evaluates the relevance of contexts when presenting a position

Use of Information:

Communicates, organizes and synthesizes information from sources to fully achieve a specific purpose, with clarity and depth

Ethical and Legal Use of Information:

Students use correctly all of the following information use strategies (use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution) and demonstrate a full understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Discussion and Assignment

 

ESSAY TYPE QUESTION (NOT AN ESSAY) (3 QUESTIONS GIVEN (1 DISCUSSION AND 2 EXERCISE  ) 

–  PROVIDE  APPROPRIATE  ARGUMENT  FOR  THE RESPONSE. 

 – INSTRUCTION ARE ATTACHED. PLEASE FOLLOW DISCUSSION GUIDELINES FOR DISCUSSION AND ASSIGNMENT GUIDELINE FOR ASSIGNMENT.

– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS. 

– LIMIT TO ONE PAGE FOR QUESTION (DOUBLE-SPACED)

– NEED PLAGIARISM REPORT ALONG WITH WORK. *****

– APA FORMAT, IN TEXT CITATION 

Analysis of the Breach Notification Law Letter

  

Describe the purpose of a breach notification letter and appropriate content.

  

Search online for an example of an official breach notification letter. Analyze the notification letter. Write a summary of your findings. The summary must include:

  • The specific laws      alleged to have been violated in the breach notification letter
  • The      roles/responsibilities each department possesses in relation to the breach      based on your state-specific data breach policy

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial 10-point size,      Double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: Minimum 500 words

Evaluation Criteria and Rubric

  1. Prepare a list      enumerating which department should perform what function in the given      scenario

c program, encrypts a binary file and then save it.

 

Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,

% myfilehide2
a.out 7

myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).

use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.

Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to

void inputcheck(void);

which stores a valid filename input a global 1-D char array. Make the variable numpos also global. 

After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly.