- Please follow the Research report guide to finish the paper without those guidelines it will be useless
- Research Paper Topics
1) How phishing is evolving and getting more sophisticated
2) Evolution of Ransomware
3) The effects of the Cryptocurrency movement affect cybersecurity
4) How effective is the two-factor authentication?
5) How can companies respond to hacking in their system?
6) Cyber-physical attacks: how do they work?
7) How can public Wi-Fi or the internet be used to steal personal data?
8) What are the differences if a “white hat hacker vs. a “black hat” hacker?
9) What forensic tools work the best to detect cyber-attacks?
10) When a password is changed regularly, can it help predict the detection of cyber-attacks?
11) What are some proven strategies that are effective in preventing cyber-attacks?
12) Is computer forensics important in the current digital age of our society?
13) How efficient are RFID security systems?
14) What are the pros and cons of using blue tooth while traveling?
Reference: Thesis Rush (2021). 50 Best Cybersecurity Topics For All Levels. Retrieved July 24, 2021, from https://thesisrush.com/blog/cyber-security
business enterprise
Your consulting company has been hired to design and implement a network for a small to mid-sized vertically integrated sales and manufacturing company with about 75 employees and 40 PC’s. They have provided you with the following requirements:
• Central Domain Structure including the design of the OUs for management of workstations and users should be developed based on the Company organizational chart provided.
• Group Policies configured to support the following
• Encrypted files on clients with appropriate recovery setup
• Setup File Shares with appropriate permissions based on the AD structure you configured.
o Departments should each have a shared location accessible only to that department’s users to store files.
• Configure a central update server with appropriate groups and enableconfigure client side targeting
• Configure Roaming Profiles for the users along with folder redirection for key folders to help with login times, ensure the security settings are correct on these folders so as to prevent other users from being able to access a profile that is not theirs.
o Redirected folders should include Documents, Desktop, and Favorites
• Setup DNS in your environment as needed.
• Develop a plan for future DHCP Configuration, it is not necessary to implement this.
• Setup and configure a print server to share printers with appropriate permissions
o The CEO doesn’t like to wait behind others when he prints and expects you to provide a solution
o There needs to be a way to control who can print to the color printer.
• You should also include a recommended backup and recovery plan but you do not have to implement this.
• They would like a secure solution for Remote Access to allow employees to access applications from either a personal device or when traveling with a work device.
For your final deliverables of this project you will submit complete documentation of your proof of concept environment and the plans detailed in the requirements document. This documentation should be complete technical documentation with enough detail to allow the reader to reproduce your solution and understand why you made the configuration selections you did. There are some articles and tips linked in the Course Resources section on how to write successful documentation.
For your presentation you will provide a business targeted video presentation of how you addressed their requirements. This presentation should include some sort of visual aidshandouts and should not be overly technical in nature. Your presentation should be between 5 to 10 minutes long and you need to make sure to include any background information or assumptions that you needed even if the items do not directly correlate to a requirement.
Prompt analysis research paper
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.
Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.
Prompt 3 “Government and Policies” (1-2 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place..
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet these requirements:
- Be approximately six to eight pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Research paper
- Section 1: Statement of the Problem and it’s Setting (Citations are required)
- Section 2: Hypotheses and/or Guiding Questions
- Section 3: Assumptions
- Section 4: Delimitations and Limitations
- Section 5: Importance of the Study
- Section 6: Review of the Literature
- Section 7: Outline of the Proposed Study (Steps to be taken, timeline, etc.)
- Section 7: References
Risk Management Framework
Unit 3 DB: Risk Management Framework
Unit 3 DB: Risk Management FrameworkAs the CISO, you are heading a newly assembled project team to focus on securing the PCS Corporate network. You have selected the NIST Risk Management Framework (RMF) as the basis of your program due to the large number of government contracts you support. Your first tasking is to analyze the system and determine what security requirements are appropriate.Consider the six phases of the Risk Management Framework and how each phase adds value to securing the corporate network. Make a case for the phase that PCS should spend the most time and resources in accomplishing. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other ideas presented by the RMF team.
Discussion with 500 words
Explain in 500 words or more what NIST Is and how it should be used by a dba.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Write in essay format not in bulleted, numbered or other list format.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Data and System Security & Computer and Information Networking
NoSQL database system simulation or different systems comparison report( need it in 2 pages)
Ref websites:
https://www.mongodb.com/nosql-explained
https://bigdata-madesimple.com/18-free-and-widely-used-open-source-nosql-databases/
Cover page with Short introduction of what kind of tools used and the possible simulation process (with screen shot), and short comparison/discussion, final concluding
- MongoDB. This highly scalable and agile NoSQL database is an amazing performing system. …
- Redis. This is an open source, key-value store of an advanced level. …
- Couch DB
- RavenDB. …
- MemcacheDB
- Riak
- Neo4j
- HBASE
Just choose one, have a simulation and write the simulated report, must including lab screen in your report
Note: If you cannot do it, please do some articles reviewing for NoSQL, such as Comparison between different NoSQLs
Research Paper: Develop a Computer/Internet Security Policy
Research Paper: Develop a Computer/Internet Security Policy
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:
- Computer and email acceptable use policy
- Internet acceptable use policy
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook. The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:
- Be approximately 2 pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
CIS415 Unit 7 Assignment: Sony's Response Case Study
1 page
Please read the case study at the end of chapter six and answer all three questions. Articulate sufficiently. Each question should be at least three paragraphs and have minimum one reference from a reliable peer-reviewed source.
css assignment 6
look at the attachment below-
