Category: Cyber security

  • “Contingency Planning: The Four Components and Choosing the Right Method” Contingency planning is a crucial aspect of risk management for any organization. It involves anticipating potential disruptions or disasters and developing strategies to mitigate their impact on business operations.

    Contingency planning consists of four major components: The Business Impact Analysis, the Incident Response Plan, the Disaster Recovery Plan, and the Business Continuity Plan. Whether an organization adopts one plan or multiple plans, each of these components must be addressed and developed entirely.
    Taking into consideration the material from this module, discuss your experience with these four components of Contingency Planning. Additionally, discuss whether your organization has adopted the one-plan method or multiple-plan method. Do you think one method is better than the other? Justify your response.
    Be sure to post an initial, substantive response by Thursday at 11:59 p.m. MT and respond to 2 or more peers with substantive responses by Sunday at 11:59 p.m. MT. Be sure you write a substantive initial post, answer the question presented completely and/or ask a thoughtful question pertaining to the topic. Also ensure your substantive peer responses has a thoughtful question pertaining to the topic and/or has answers to a question (in detail) posted by another student or the instructor.

  • “Developing an Original Program: From Idea to Execution”

    ASSIGNMENT: For this Touchstone, you will learn how to effectively plan, design, develop, and test an original program of your choosing. This program is your choice and it can be as complex as you wish. The goal is to start with an idea for your program and then step through the process of most phases of the development lifecycle to turn your idea into an actual program. This includes planning out the algorithm using pseudocode, coding your program using everything you learned from Units 1-3, and finally, testing and debugging your program to make sure it fulfills your intended purpose. You will fill out a journal (template link below) which has five sections that correspond to the five steps you will complete for your final project. Use this template to write your journal responses for each section of the project. When you have finished, you will submit this journal as a Word .doc/docx.

  • Title: “The Impact of Cyber Warfare on US National Security Strategy and Policy”

    I have added  Capstone Research Paper Topic Proposal to use for this project 
    Following leads on the references pages of relevant module content, you should also consider researching the  topic in these key journals – 
    International Security
    Security Studies
    Foreign Affairs
    Foreign Policy
    Orbis
    Survival
    Washington Quarterly
    Parameters 
    Joint Force Quarterly
    IISS Adelphi Paper 
    Intelligence and National Security
    Studies in Intelligence (CIA publication)
    International Journal of Intelligence and CounterIntelligence 
    What is the National Security topic that you are examining (e.g., its research or thesis question, key relationship or subject matter, etc.)?
    Why is this topic significant in the interdisciplinary field of national security studies? 
    For example, what national security problem, dilemma, or threat are you addressing, and how does it affect the field’s understanding of this topic?
    What dimensions of US power (or others’) are most at play in your topic (e.g., material, motivational, specific DIME-FIL aspects, etc.)?
    How have these dimensions been affected by, or used by key actors in your study? 
    How is US national security strategy and policy (or others’) affected by your topic? 
    What strategy or policy assessments, recommendations, etc. can you reach based on your evaluation and research findings?
    Finally, what has your research findings added to the body of knowledge in national security studies?
    For example, how might what you have found lead to improved strategy, policy, or even the overall position of the US in the world?

  • “Remote Access Control Policy for Richman Investments: Ensuring Secure Connections for Distributed Offices”

    Learning Objectives and Outcomes
    Create a remote access control policy for an IT infrastructure.
    Assignment Requirements
    You are an IT security professional at Richman Investments, a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently there are eight branch offices in:
    Atlanta, Georgia
    Chicago, Illinois
    Cincinnati, Ohio
    Denver, Colorado
    Los Angeles, California
    Montreal, Canada
    New York City, New York
    Washington, D.C.
    The North American offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices.
    The Phoenix office has an Internet connection to all remote offices because redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office.
    For this assignment:
    Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access.
    Include the design and justification for using the selected access controls for systems, applications, and data access. Your policy may include the following points:
    Methods that can be used to connect remotely
    Requirements for user systems before they are allowed to connect
    Required Resources
    Course textbook
    Internet access
    Submission Requirements
    Your submission must have a title page (See Sticky Section)
    Format: PDF
    Font: Arial, size 12, double-space
    Length: 2-3 pages
    Self-Assessment Checklist
    I created a remote access control policy for the given scenario.
    I correctly selected appropriate access controls for systems, applications, and data access.
    I included my justification for using the selected access controls for systems, applications, and data access.
    I created a well-developed policy with proper documentation, grammar, spelling, and punctuation.
    I followed the submission requirements.
    You must start a thread before you can read and reply to other threads

  • Exploring Ethical Dilemmas in Technology and Society

    AI, Death, and Mourning Using a “Grief Bot”-https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/ai-death-and-mourning/
    Privacy, Technology, and School Shootings-https://www.scu.edu/ethics/privacy/case-study-on-online-privacy/
    The Vulnerability Disclosure Debate- https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-vulnerability-disclosure-debate/
    The “Goodbye Fears Monster”-https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/the-goodbye-fears-monster/
    Students and Sensors: Data, education, privacy, and research- https://www.scu.edu/ethics/focus-areas/internet-ethics/resources/students-and-sensors-data-education-privacy-and-research/
    (Above are the links for the assignment, instructions say to choose one)

  • Title: The Crucial Role of Employee Training in Cybersecurity for Effective Security Management

    Research paper for the importance of employee training in cybersecurity for enhanced security management.
    Utilize 10 sources with in text citations.

  • Title: Leadership Theories in IT Project Management: Resolving Common Challenges

    IT projects present a different set of challenges from traditional projects since they are usually unique in nature and represent something new being developed for the stakeholders.
    For this assignment, you must use the four core theories of project management leadership to write an analysis in which you address how the leadership theories of project management can be used to resolve common issues facing IT project managers today.
    Your paper should include the following:
    Outline the most important leadership challenges facing IT projects today. This section is important to identify how these challenges can be addressed by the leadership theories of project management.
    Describe how particular leadership theories could be applied to address IT project challenges.
    Discuss how you would apply the core leadership theories to create your own leadership style. Based on the core leadership theories that you have chosen, provide a summary of your own leadership style that you would use to manage the IT projects. Provide specific examples of the leadership style that you need to have to be successful in IT project management.
    Length: 3-4-page academic paper, not including title and reference pages
    References: Include a minimum of 3 scholarly resources
    The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards

  • Title: “Secure Remote Access: The Importance of Access Controls in a Work From Home Environment” Talking Points: I. Introduction A. Explanation of Access Controls B. Importance in asset protection C. Overview of access

    Your task: You have been asked to give a presentation at an online training session for employees who are now working from home. The subject of this training session is: Access Controls and Why They Matter.
    Background: Access controls are security features that are usually considered the first line of defense in asset protection. They are used to dictate how subjects access objects, and their main goal is to protect the objects from unauthorized access. Access control models are frameworks that use access controls to enforce the rules and objectives of the model (e.g. MAC, DAC, RBAC).
    For this training, you should focus on the need to use Access Controls to protect corporate assets and data which are accessible via equipment and networks within the Work From Home setting. In your talking points you should also consider and address the frustrations that employees may feel when they encounter access controls that are not set up to allow the same type of “inside” access as employees had when working on company equipment inside company networks. (Explain why “turning off” access controls is not an acceptable solution to remote access to internal networks and resources.) Finally, address some potential “insider threats” which may exist in the Work From Home environment that need the countermeasures provided by access controls. Such threats could include the actions of others residing in the home who have access to the employee’s laptops or who use the same networks and network connections.
    Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work.

  • Title: The Impact of Social Media on Mental Health: A Comprehensive Analysis Thesis Statement: The rise of social media has had a significant impact on mental health, leading to increased rates of anxiety, depression, and other psychological disorders. This paper

    Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. 
    Include at least 3 references supporting your paper research.

  • Linux Operating System: Commands and Directories

    Please Seperate Each Response!!
    Discussion 1: 
    1.     Why is Linux, especially Kali Linux, rather than some other operating systems, such as Windows, preferred by most people for penetration testing?
    Discussion 2:
    Agree or Disagree? Why?
    How are passwords stored on Linux systems?
    Similar to Windows, Linux stores passwords as a hash; however, Linux stores then in the /etc/shadow file rather than an SAM file in Windows (Easttom, 2018). Easttom explains that Linux uses a salt algorithm which periodically inserts bits into the passwords (2018). Additionally, salt is often utilized in hashing to prevent attacks on rainbow tables (Easttom, 2018). One may be able to use a rainbow table in an attempt to recover a password if you can recover the hash from Linux (Easttom, 2018).
    For a simpler answer, I found the following explanation on the Red Hat website: passwords stored in Linux in the /etc/shadow file ARE hashes. When you sign in, the process of authentication compares the stored hash with the hashed version of the password you keyed in- if the checksums of both are identical, the correct password was entered, and authentication is complete (Garn, 2021). Furthermore, by checking the first 2 characters of the encrypted password (ie $1, $5, or $6), then the password is encrypted by MD5, SHA256, or SHA512 respectively (Garn, 2021).
    Easttom, C. (2018). Penetration Testing Fundamentals (Ch 3). Pearson Education, Inc.
    Garn, D. (2021, January 18). An Introduction To Hashing And Checksums In Linux. Red Hat. Retrieved June 9, 2024, from https://www.redhat.com/sysadmin/hashing-checksums
    Discussion 3:
    1.     Select five or more Linux commands from the list below and describe their purposes.
    ·       ls, cd, grep, ps, kill
    ·       mkdir, rm, mv, rmdir, chown, chmod
    ·       useradd, userdel, users, who
    2.     Select three or more Linux directories from the list below and describe them briefly.
    ·       /root
    ·       /bin,
    ·       /etc/passwd
    ·       /etc/shadow
    ·       /dev
    ·       /boot
    ·       /usr