Ethical Hacking

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Physical security 2

 

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Assignment help

 

Review the Video below, and discuss what tips, or procedures your organization has planned to use or those from the video that they should incorporate into their plan.

Cybersecurity Protections Following a Disaster (Youtube.com)

Portfolio Project

 You will respond to three separate prompts but prepare your paper as one research paper

1.Start your paper with an introductory paragraph.

2.Prompt 1 “Data Warehouse Architecture” (2-pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

3.Prompt 2 “Big Data” (2- pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

4.Prompt 3 “Green Computing” (2 pages): IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. 

5.Conclude your paper with a detailed conclusion section. 

The paper needs to be 8 pages long and 6 references. Be sure to use proper APA formatting and citations to avoid plagiarism.

Discussion 2.0

 

  • Distinguish among character, block, and stream ciphers.
     
  • Specify when to use each.
  • 5 pages.

Note: Remember to cite any sources you use,  including your textbook, using the Strayer Writing Standards format. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course.

Termpaper on Rockwell Automation – Factory Talk (SCADA)

 

Term Paper Requirements

REQUIREMENTS AND GRADING

Each student will be required to write their own research paper – no teaming, partnering, or study group papers are permitted. This is an individual assignment and copying or plagiarizing will not be tolerated and will be subject to University disciplinary action up to and including a failing grade for this course. 

The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. 

The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

A template has been provided meeting these requirements.

A list of 11 different vendors and systems have been offered. Selection begins on October 6, 2020 (Week 7) and is expected to be completed by November 17, 2020 (Week 13). You are free to change your selection until the cut-off date. No more than three (3) students can choose the same vendor and system topic, so all selections may not be available at any given time. Failure to complete the selection process early could reduce the number of choices available and not provide sufficient time to complete the term paper and associated presentation.

You will also be required to prepare a short PowerPoint presentation summarizing your paper suitable for presentation. This presentation is expected to have no more than one (1) slide summarizing each of the subject areas aligning with the paper and should be limited to 15 minutes. A PowerPoint template has been prepared and is available for download.

Your paper must be submitted by 7:00pm (end of class) on Tuesday, November 24, 2020 (Week 14), and your presentation must be submitted by 8:00am on Tuesday, December 1, 2020 (Week 15). Eight (8) students will be randomly selected to present their presentation via Zoom Meeting during class time on Tuesday, December 1, 2020. Drawing will occur on December 1, and students will be notified by 10:00am.

The term research paper and associated presentation comprise 20% of your overall course grade and will be assigned a numerical percentage grade based on the following scale:

     A = 90% – 100%
     B = 80% – 89%
     C = 70% – 79%
     D = 60% – 69%
     F = 59% or less

Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis
     20% = Organization
     20% = Development and Support
     10% = Style
     20% = Mechanics
     10% = Presentation

Spelling and grammatical correctness will be used as marking against Mechanics. Use of current review editors such as those included with Microsoft Word are strongly encouraged.

 

CONTENTS AND STRUCTURE

The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the following areas. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure. The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Discussion

Incident Response Team (IRT) Policies

  • Describe the different ISS policies associated with incident response teams (IRTs).

Keywords

Use the following keywords to search for additional materials to support your work:

  • Business Continuity Plan (BCP)
  • Business Impact Analysis (BIA)
  • Containment and Minimizing Damage
  • Disaster Recovery Plan (DRP)
  • Incident Classification
  • Incident Response
  • Incident Response Support
  • Incident Response Team (IRT)
  • Incident Response Team (IRT) Charter
  • Incident Response Team (IRT) Members
  • Media Handling