The instructions are attached, please read them carefully. I also attached two b
The instructions are attached, please read them carefully. I also attached two books that can be used as a part of the references with other sources (online sources).
The instructions are attached, please read them carefully. I also attached two b
The instructions are attached, please read them carefully. I also attached two books that can be used as a part of the references with other sources (online sources).
Essentially the
formatting and the flow of the paper should go like:
Abstract
Ke
Essentially the
formatting and the flow of the paper should go like:
Abstract
Key words
Introduction
Conclusion
References (IEEE
Format)
-Add as many sources as you can accordingly.
-Example of the paper: https://ijcttjournal.org/2023/Volume-71%20Issue-4/IJCTT-V71I4P101.pdf
-make sure you
include graphs, flowcharts, pseudocode, diagrams, visuals etc – basically
anything that will add more geeky context and depth to what you are talking
about.
I might need to review and edit accordingly.
A. Create a proposal (suggested length of 2–4 pages) by doing the following:
1.
A. Create a proposal (suggested length of 2–4 pages) by doing the following:
1. Identify a problem that is relevant to a professional setting.
2. Describe the significance of the problem.
3. Provide a statement of purpose at the beginning of the proposal that recommends a solution(s) to the problem.
4. Explain the proposed course of action with 2–4 logical steps or justifications (suggested length of 1–2 paragraphs per step or justification).
5. Justify how your proposed course of action supports the solutions(s) listed in part A3 and is a suitable choice, using three credible sources to support your response.
6. Identify the challenge(s) that might be encountered while implementing the solution(s) and explain how the challenge(s) could be overcome.
7. Provide a conclusion for the proposal.
B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
C. Demonstrate professional communication in the content and presentation of your submission.
I will upload the instructions to the paper. It’s a short essay explaining how y
I will upload the instructions to the paper. It’s a short essay explaining how you might design technology and cybersecurity into your own career strategy. Please provide evidence and support for your strategies using information from the assigned reading and web pages.
This is due tonight by 6 pm
You are tasked as the Cyber Security Analyst at your new organization to assist
You are tasked as the Cyber Security Analyst at your new organization to assist Law Enforcement with investigating a digital crime.
For the purpose of this assignment, you are to search the Internet for a recent Digital Crime or Cyber attack on an actual organization (and that will be your new organization). Use the Tasks outlined below (and feel free to add your own steps) and create an in-depth plan that that provides a well thought out approach (what you propose to do to carry out each task) to investigate the crime.
Cybersecurity Investigation & Forensic Methodology (Tasks):
Investigate the crime or the scene of the incident
Reconstruct the scene or incident
Collect the digital evidence, and make a copy of the original data
Analyze the evidence using inductive and deductive forensic tools
Establish linkages, associations and reconstructions
Use the evidence for the prosecution of the perpetrators
REQUIREMENTS:
4 – 6 Pages in length in APA format (not including a cover page and reference section)
Cover Page
Cybersecurity Investigation & Forensic Methodology (Plan) – that lists and explanation of how you will complete each of the 6 tasks listed above.
Reference Section
MISCELLANEOUS:
Use current and real world data to make your points, not just the textbook
Your references should not be more than 5 years old
Paper B
Assignment: a matrix mapping of a key IT-related organizational (or
per
Paper B
Assignment: a matrix mapping of a key IT-related organizational (or
personal) ethical issue concerning privacy and organizational policy
designed to correct the ethical issue.
The first step of this assignment is an opportunity to analyze a key IT-related organizational (or personal, if you are not in the job force) ethical issue, related to privacy, subject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law.
See EPIC Privacy Issues at: Privacy Issues See List on left and/or: EFF Privacy at Privacy [see list below in center on this page].
This
includes sub-topics discussing information privacy, privacy laws,
applications and court rulings (case law is usually an extension of the
basic law based on the facts from specific cases and real-world court
decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.
Use
the template below and the list of suggested workforce privacy topics
from one of the sites above to produce a matrix to map a key
organizational ethical (or personal, if not in the job force) issue and
how this issue is affected by laws, regulations, and policies. Use the
list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.
Prepare
the Ethical Issue matrix (single-space in the cells) and include the
following explanation (200 words) —double-space your narrative—below the
matrix:
Why I chose the dilemma;
Why I chose the three principles; and
An analysis of the research used to identify the actions in the matrix.
The
completed matrix allows you to weigh the different issues involved and
assign a rank as to the importance of the actions based on the effect on
the stakeholders.
Indicate
appropriate APA in-text and source citations for all sources. In
addition to critical thinking and analysis skills, your assignment
should reflect appropriate grammar and spelling, good organization, and
proper business-writing style.
Normative Ethics List
Autonomy: is the duty to maximize the individual’s right to make his or her own decisions.
Beneficence: is the duty to do good both individually and for all.
Confidentiality: is the duty to respect privacy of information and action.
Equality: is the duty to view all people as moral equals.
Finality: is the duty to take action that may override the demands of law, religion, and social customs.
Justice: is the duty to treat all fairly, distributing the risks and benefits equally.
Non-maleficence: is the duty to cause no harm, both individually and for all.
Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted.
Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved.
Respect for persons: is
the duty to honor others, their rights, and their responsibilities.
Showing respect others implies that we do not treat them as a mere means
to our end.
Universality:
is the duty to take actions that hold for everyone, regardless of time,
place, or people involved. This concept is similar to the Categorical
Imperative.
Veracity: is the duty to tell the truth.
A
sample template for the matrix is shown below. To reconstruct the
sample template, you may use the Table Tool in MS Word or copy and paste
this template.
Matrix Instructions – (Visual Provided in attachments)
Step 1:
Identify the ethical issue that you want to analyze, as described
above. An example might be the falsification of your personal profile in
a social networking site.
Step 2:
Identify the stakeholders involved. You, someone who reads your
personal profile in a social network site, potential employers, etc. Be
sure that each stakeholder category is unique and not similar to
another category you use.
Step 3:
Choose any three (only three) of the Normative Ethics principles that
might apply to your issue such as autonomy, publicity, and veracity.
Step 4:
Identify how the ethical issue affects each stakeholder based on the
principles you identified. Put this statement in the matrix next to the
stakeholder.
PART TWO OF ASSIGNMENT
The second step of this assignment requires that you write an organizational policy (or personal policy, if you are not in the job force) to correct the IT-related ethical issue that you had previously described,
where you mapped a key organizational or personal issue and identified
how the digital ethical issue was affected by relevant laws,
regulations, and policies.
The following elements must be addressed:
You may take a look at other policies to see how they are written. While the following site: Information Security Policy – For other possible SANS resources, go to the home page and
click on the free resource link which provides credible examples of
templates for policies, an Internet search may provide other templates, however
there is no need to copy a template for this assignment, as the
template should only be utilized to provide guidance regarding the
following headings.
Your policy should include appropriate information for the following major headings:
Overview of the policy – an Introduction
Purpose of the policy – the aim of the policy
Scope (roles and responsibilities of stakeholders) – who is involved in policy execution.
Policy Points to follow – (Note: you should be aware that a policy only describes “what,” the staff of an organization will do, while a procedure describes “how,” the
staff of an organization will accomplish a required action. As a
result, this section should only discuss the specific measures, needs,
or changes to behavior within the organization in terms of policy points, i.e., what they must do to conform to the policy. Any procedures that are needed to assist in doing the “what,” are usually included by reference later in the policy – procedures should not be included in the policy points).
Sanctions/enforcement of policy – what happens in case of non-compliance
This assignment requires a minimum of three external references. Indicate appropriate APA source citations for all sources you use.
In
addition to critical thinking and analysis skills, your paper should
reflect appropriate grammar and spelling, good organization, and proper
business-writing style.
Prepare
a 4-6 page, double-spaced paper with your Ethical Matrix and your
Organizational or Personal Policy (if not in the job force).
Please submit your Paper B to the LEO Assignments Module as an attached Microsoft Word file. Paper B is due at the end of the fourth week of this course. Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.
Select the button below to access detailed instructions for the assignment and submit your work.
North Ridge Security provides security consulting and assurance services. You ha
North Ridge Security provides security consulting and assurance services. You have recently been hired as an intern to assist them.
Believe It’s Magic (BIM) is a regional hair salon with retail outlets in major cities. Because the company was the victim of several recent attacks, BIM wants to completely change its network infrastructure. Currently, the company has a small IT staff, so they have contracted with North Ridge to make recommendations and install the new equipment. First, however, they have asked North Ridge to provide a table with the recommended network security appliances to their executive staff about the current state of network security defenses.
Create a table for the executive staff about network security appliances. Include firewalls, proxy servers, IDS and IPS, and network hardware security modules.
One of the BIM’s executives has heard about honeypots and has decided BIM should install it to, in his words, “punish those attackers.” North Ridge has advised BIM that the purpose of a honeypot is not retaliation, but the executive has been difficult to persuade. However, he reviewed your recommendations and was impressed with your knowledge. North Ridge has asked you to create a memo about deception instruments and why it could be risky and unnecessary for BIM to install those devices. Create a-one-page memo that outlines the advantages and disadvantages of deception instruments, and give your recommendation.
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its
To protect DNS, some providers are using DNS-over-HTTPS, also called DoH. As its name implies, DoH uses HTTPS instead of HTTP to send DNS queries via an encrypted HTTPS connection (Port 443) rather than sending them in clear text (Port 53). The encrypted DoH query is sent to a special DoH-resolving server that aggregates all user’s DoH queries and then translates them into regular unencrypted DNS queries for processing by DNS servers. However, DoH has become controversial. Why? What are the advantages of DoH? What are its disadvantages? How does it compare with DNS-over-TLS (DoT)? Write a one-page paper on your research.
For each answer, please explain your reasoning.
Assignments must be in Microsoft Word and submitted as an attachment.
Each assignment has to be at least one (1) page long.
North Ridge Security provides security consulting and assurance services. You ha
North Ridge Security provides security consulting and assurance services. You have recently been hired as an intern to assist them.
The new CEO of Premier Landscape Services (PLS) wants to migrate all IT functions to the cloud. He argues that PLS could then downsize the IT staff as well as eliminate the need to purchase hardware and software on a regular cycle. The CEO also wants to outsource all security functions to MSSPs. The current CIO supports a migration to the cloud but only for selected services, and is opposed to using MSSPs for security. North Ridge has been brought in to help PLS.
– Create a table for the executive staff about cloud computing. Include types of clouds, locations, architectures, models, and management.
– The CEO of PLS was impressed with your knowledge of cloud computing and has asked for your opinion of moving all IT resources to the cloud and contracting with MSSPs for security. Create a-one-page memo that outlines the advantages and disadvantages of each side of the argument, and then give your recommendation.
Is the wireless network you own as secure as it should be? Examine your wireless
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and determine which security model it uses. Next, outline the steps it would take to move it to the next highest level. Estimate how much it would cost and how much time it would take to increase the level. Finally, estimate how long it would take you to replace all the data on your computer if it was corrupted by an attacker, and what you might lose. Would this be motivation to increase your current wireless security model? Write a one-page paper on your work.