Category: Cyber security

  • “Enhancing Literature Review with Personal Style: A Comparative Analysis of CNN and LightGBM for Feature Extraction and Classification in CIC IoT 2023 Dataset”

    i have over 15 literature reviews written , the problem with it is that i don’t have the exact reference
    in need 10 of them to be rewritten and restyled with specific link . please note no Ai what so ever and i need personal style in it .
    im using cic iot 2023 dataset , cnn for feature extraction and lightgbm for classification .
    this will help me build comparison in results section

  • “Enhancing Satellite Technology with Satelloon: A Comprehensive Analysis and Proposal”

    Hello, I have uploaded 4 files the first one is the actual Satelloon project and the second one is the Outline that i did with the feedback of my tutor at the last 2 slides. The last file is the Marking Criteria that i will be graded by so its gives you an inside of how the work will be graded.  I also have already submitted ( Section 1 Draft 1) to my tutor so I need the work related to the my draft 1, therfore you can fix or adjust section 1 but not change it completey maybe work with it and I have already submitted 4 sources that I used in my outline these sources must be used and you can add 6 or 7 more … minimum of 10 sources. Additionly the work will be submited by turnit in.  If you have any questions or need any help you can ask me.

  • “Understanding Network Threats and Conducting Risk Assessments: A Comprehensive Analysis”

    no need to use tools, just answer lab1, you can look through the Laboratory #1 ITCS4350
    Network Threats and Risk Assessment file.
    I’ll give more details if needed

  • Title: Comprehensive Study Guide for Comptia Security Plus Exam: Chapter 1 and Basic IT Troubleshooting Skills

    I am studying for my Comptia Security Plus Exam Write a 8 page study sheet/guide to help me learn the material. Topics from Chapter 1 include: Understanding Core Security Goals, What is a Use Case?, Ensure Confidentiality, Encryption, Access Controls, Provide Integrity, Increase Availability, Redundancy and Fault Tolerance, Scalability and Elasticity, Patching, Understanding Resiliency, Resource Versus Security Constraints, Introducing Basic Risk Concepts, Understanding Security Controls, Managerial Controls, Operational Controls, Technical Controls, Control Types, Preventive Controls, Detective Controls, Corrective and Recovery Controls, Physical Controls, Deterrent Controls, Compensating Controls, Response Controls, Combining Control Categories and Types, Using Command-Line Tools, Network Reconnaissance and Discovery, Ping, Using Ping to Check Name Resolution, Beware of Firewalls, Using Ping to Assess Organizational Security, Hping, Ipconfig and ifconfig, Netstat, Tracert and traceroute, Pathping, Arp, Linux and LAMP, cat Command, grep Command, head Command, tail Command, logger Command, journalctl Command, chmod Command, Understanding Logs, Window Logs, Network Logs, Centralized Logging Methods, SIEM Systems, Syslog, Syslog-ng and Rsyslog, NXLog, Linux Logs. Chapter 1 Exam Topic Review (Exam Questions in Drop File). Understanding Core Security Goals. Introducing Basic Risk Concepts. Understanding Security Controls. Using Command-Line Tools. Understanding Logs. Also include separately basic IT Troubleshooting skills, Active Directory Users and Computer, common commands, port numbers, and how to spin a desktop, What is a MAC Address?, switching and routing, Breakdown of OSI Layer, Subnet Mask, Default Gateway, DHCP, Spam Filtering/Proofpoint, DNS, Describe the procedure for installing ESXi VMware on a server. Please use diagrams and illustration to help with this study guide. Thank you!

  • “The Infiltration of Cyber Threats in Anti-Human Trafficking Efforts: A Comprehensive Analysis”

    The student will write a three to four page paper (1.5 spacing) describing how cyber can be found in almost every element of the asymmetric threats they would face as a member of a Anti-Human Trafficking Task Force. Its basically just researching and talking about the current and arising threats cyber display when it comes to human trafficking crimes. DO NOT write a book report.  Focus on being concise. 1.5 Line Spacing, There was no option for it so I just put single line spacing.

  • Title: “Uncovering the Vulnerabilities: A Case Study Analysis of the Cybersecurity Breach on Equifax”

    In this task, students are expected to select and thoroughly analyse a recent cybersecurity breach or attack on a business organization. The purpose of this case study analysis is to delve into the intricate details of the chosen incident, providing a holistic understanding of the event, its consequences, and the lessons that can be drawn from it.
    Write a 1000 word report by following the instructions listed below :-
    Choose a recent cybersecurity breach or attack on a business organization. (Eg – Uber, Netflix or any company of your choice)
    Provide a detailed case study analysis, including the background of the company, the nature of the attack, the vulnerabilities exploited, and the aftermath.
    Discuss the lessons that businesses can learn from this case and propose preventive measures.
    Background Information: Provide a comprehensive background of the targeted organization. This should include details about the industry, size, and significance of the company within its sector.
    Attack Description: Describe the nature of the cyber-attack, elucidating the specific tactics, techniques, and methods employed by the attackers. 
    Vulnerabilities Exploited: Analyze the vulnerabilities within the organization’s security framework that the attackers exploited to carry out the cyber-attack. This could include software vulnerabilities, social engineering tactics, or other weaknesses.
    Consequences and Impact: Discuss the repercussions of the cyber-attack on the targeted organization. Highlight how the attack affected the company’s operations, data, reputation, and financial standing.
    Lessons and Takeaways: Explore the key lessons that businesses and cybersecurity professionals can learn from this particular case. These lessons should encompass preventive measures, incident response strategies, and the importance of proactive cybersecurity practices.

  • “Mitigating Cybersecurity Risks and Ensuring Compliance: An Incident Analysis and Risk Assessment for Azumer Water”

    Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
    You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
    Part I: Incident Analysis and Response
    A.  Determine why the attack on Azumer Water’s infrastructure was successful, including the specific vulnerabilities that allowed the attack to occur. Provide details from the case study to support your claims.
    B.  Explain how the confidentiality, integrity, and availability of Azumer Water’s operations and PII (personally identifying information) data have been compromised, using NIST, ISO 27002, or another industry-standard framework to support two claims of compromise.
    C.  Identify a federal regulation this NGO violated, providing a specific example from the case study as evidence of Azumer Water’s noncompliance.
    D.  Recommend immediate steps to mitigate the impact of the incident, using specific examples from the case study to justify how these steps would mitigate the impact.
    E.  Explain how having an incident response plan in place will benefit Azumer Water, using details from the case study to support your explanation.
    Part II: Risk Assessment and Management
    F.  Discuss two processes to increase information assurance levels within the organization and bring Azumer Water into compliance with the violated federal regulation identified in part C.
    G.  Recommend technical solutions to counter the remaining effects of the attack in the case study and to prevent future attacks.
    H.  Recommend an organizational structure for IT and security management, including a logical delineation of roles and adequate coverage of responsibilities, to support the efficient discovery and mitigation of future incidents.
    I.  Describe your risk management approach for Azumer Water based on the likelihood, severity, and impact categorization of two risks in the case study.
    J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
    K.  Demonstrate professional communication in the content and presentation of your submission.

  • Creating a Forensic Case File Using Autopsy for Digital Evidence Analysis “Creating a Forensic System Case File Using Autopsy: A Step-by-Step Guide”

    INTRODUCTION
    In today’s digital world, most fraud can be tracked electronically. In this task, you will use Basis Technology’s Autopsy application to analyze a storage device for evidence related to a possible violation of company policy. You will analyze the storage device for data files, deleted data files, directories, or drive partitions. You will provide screenshots of your evidence, and then write a final report.
    To access the Autopsy application and the files you need to recover, you will use the “Performance Assessment Lab Area” web link. Instructions for how to access the tools are included in the lab area.
    SCENARIO
    An oil company’s senior management has reason to suspect that John Smith, one of the company’s mechanical engineers, allegedly took information that was clearly identified as proprietary. The company’s legal office has requested digital evidence regarding the potential violation of company policy, which prohibits the sharing of proprietary information without prior approval. The employee was not authorized to access proprietary information. All employees sign nondisclosure agreements (NDAs) and acceptable use policies (AUPs). Senior management and the legal office have approved the request for digital evidence.
    You are a member of the investigative team that has been assigned to examine the digital evidence captured from the suspect’s office laptop computer. You will create an incident report to present the findings to senior management.
    REQUIREMENTS
    Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
    You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
    Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
    A.  Write a report for the team of investigators by doing the following:
    1.  Describe all steps taken in Autopsy to create the forensic system case file. Provide screenshots of these steps.
    2.  Describe all steps taken in Autopsy to identify potential evidence including data files, deleted data files, directories, or drive partitions. Provide screenshots of these steps.
    3.  Summarize the findings you identified during your investigation and the conclusions you made regarding the suspect and the collected evidence. Provide screenshots from Autopsy or reports to support your findings and conclusions.
    B.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
    C.  Demonstrate professional communication in the content and presentation of your submission.
    File Restrictions
    File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
    File size limit: 200 MB
    File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
    RUBRIC
    A1:STEPS USED TO CREATE FORENSIC CASE FILE
    NOT EVIDENT
    The submission does not describe the steps taken in Autopsy to create the forensic system case file or does not provide screenshots of these steps.
    APPROACHING COMPETENCE
    The submission describes the steps taken in Autopsy to create the forensic system case file, but the description contains inaccuracies, or 1 or more steps are missing or not described. Or the provided screenshots do not reflect each step.
    COMPETENT
    The submission accurately describes all steps taken in Autopsy to create the forensic system case file. The provided screenshots reflect each step.
    A2:STEPS USED TO IDENTIFY POTENTIAL EVIDENCE
    NOT EVIDENT
    The submission does not describe the steps taken in Autopsy to identify potential evidence or does not provide screenshots of these steps.
    APPROACHING COMPETENCE
    The submission describes the steps taken in Autopsy to identify potential evidence, but the description contains inaccuracies, or 1 or more steps are missing or not described. Or the description is missing either data files, deleted data files, directories, or drive partitions. Or the provided screenshots do not reflect each step.
    COMPETENT
    The submission accurately describes all steps taken in Autopsy to identify potential evidence, including data files, deleted data files, directories, and drive partitions. The provided screenshots reflect each step.
    A3:SUMMARY OF FINDINGS AND CONCLUSIONS
    NOT EVIDENT
    The submission summarizes neither the findings identified during the investigation, nor the conclusions made regarding the suspect or the collected evidence. Or Autopsy screenshots or reports are not provided.
    APPROACHING COMPETENCE
    The submission summarizes either the findings identified during the investigation, or the conclusions made regarding the suspect and the collected evidence, but it does not summarize both. Or the summary contains inaccuracies. Autopsy screenshots or reports are provided, but they do not support the summarized findings or conclusions.
    COMPETENT
    The submission accurately summarizes both the findings identified during the investigation and the conclusions made regarding the suspect and the collected evidence. The provided Autopsy screenshots or reports support the summarized findings and conclusions.
    B:SOURCES
    NOT EVIDENT
    The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.
    APPROACHING COMPETENCE
    The submission includes in-text citations for sources that are quoted, paraphrased, or summarized and a reference list; however, the citations or reference list is incomplete or inaccurate.
    COMPETENT
    The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available or the candidate does not use sources.
    C:PROFESSIONAL COMMUNICATION
    NOT EVIDENT
    Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.
    APPROACHING COMPETENCE
    Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.
    COMPETENT
    Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.
    WEB LINKS
    https://lrps.wgu.edu/provision/272148024

  • “Securing SSID on Wireless Networks and Virtualization in Cloud Computing” Securing SSID on Wireless Networks: According to Cisco, securing the SSID on wireless networks is crucial for protecting the network from unauthorized access and potential security threats (Cisco

    Topic 1: SSID
    Service Set Identifier (SSID), also known as the wireless network name, identifies the wireless network. An SSID is configured on the wireless AP (on the access point for the infrastructure mode) or on an initial wireless client (for ad hoc mode). The SSID is periodically advertised by the wireless AP or the initial wireless client using a special 802.11 MAC management frame. Do some research on securing the SSID on wireless networks and share your findings with your classmates. Include a relevant question to your classmates. Cite your resources. 
    Topic 2: Cloud Computing
    Cloud Computing goes hand-in-hand with virtualization. Do some research on this topic and describe a scenario of a cloud company’s infrastructure that is virtualized. What is one reason to incorporate virtualization into cloud computing? What are the security risks for clients using a cloud-based service? Cite your resources.
    CITE ALL SOURCES AND SEPARATE THEM PER TOPIC