Categories
Telecommunications Engineering homework help

Analyze the influence of anonymity on Cyber Bullying and Cyber Stalking.

For your initial post, discuss all points in the two topics below. Respond to posts from other students.
Motivations of Threat Actors –
Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and (3) world view as a political or social activist.  What kinds of targets do each of these influences lead hackers to direct their cyberattacks towards?
Analyze the influence of anonymity on Cyber Bullying and Cyber Stalking.

Categories
Telecommunications Engineering homework help

Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures.

Week 3 Discussion – Cybersecurity Policy Design Issues
For your initial post, discuss the topics below.  Respond to posts by other students
Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security through business resilience and Continuity of Operations Planning
Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures.  Do you agree or disagree that businesses should protect national security by expanding their cybersecurity budget to prevent or reduce the effects of possible Cascade Failures that may affect their business and other downstream businesses that may depend on them?  Justify your answer.

Categories
Telecommunications Engineering homework help

Discuss and compare security policy issues for Electric utilities, Oil Gas pipelines, traditional banking and alternative currencies, such as Bitcoin. 

Critical Infrastructures –
Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect traditional corporate office systems – why should there be a difference in priority order for Confidentiality, Integrity, and Availability?  View the suggested background sources below.
2.  Discuss and compare security policy issues for Electric utilities, Oil Gas pipelines, traditional banking and alternative currencies, such as Bitcoin.  Use the Internet to find some examples for recent cybersecurity issues seen by these industries.

Categories
Telecommunications Engineering homework help

Briefly explain the four main parts of a computer system information.

Consider jobs that require a solid understanding of basic computing, computer storage, and processing speeds as part of an information technology degree. Put yourself in the position of the hiring manager and think about what you would expect as competent responses from an applicant:
Briefly explain the four main parts of a computer system information.

Provide an example of each.

Managing data efficiently requires having sufficient processing speed, paired with the appropriate amount of memory and storage space. Briefly explain what you would recommend for an IT professional to have for their laptop’s memory, storage, and processor.
Your first post should be on or before Saturday and a minimum of 100 words. Include a link to any site you used to help you respond to the question. Make sure you respond substantively to at least two classmates.

Categories
Telecommunications Engineering homework help

Define and differentiate Vulnerability, Risk, and Threat.

Journalists and others sometimes mix phrases for cybersecurity concepts.  The public can pick up these misnomers,  resulting in confusion.  Confusion during meetings between technology practitioners and management wastes time that could otherwise be useful to make progress toward solving a problem (perhaps some of you have sat through a frustrating first half of a meeting where this disconnect was gradually discovered by those present).  Some basic vocabulary definitions must be reinforced for cybersecurity practitioners to reduce the confusion that can creep into conversations and meetings.  Please write about these concepts listed below and support your definitions and discussions with reference sources that do not confuse the definitions.
For your initial post, discuss the two topics below.  Respond to posts from other students.
Define and differentiate Vulnerability, Risk, and Threat
Define the term “Zero-Day Exploit”.  Discuss some recent examples where one or two ZDEs were used to bypass cybersecurity controls to open a hole in vulnerable Critical Infrastructures, SCADA systems, or Industrial Control Systems (ICS) so malicious code could enter to cause disruptive effects.  Describe how ZDEs can possibly be used by nation states, criminals, and political extremists.
Background Resources
Wk 1 – Zero Day Exploit.pdf
Zero Day Exploit (source)
Wk 1 – Critical Infrastructure Security and Industrial Control Systems.pdf
Critical Infrastructure Security and Industrial Control Systems (source)

Categories
Telecommunications Engineering homework help

Discuss what you deem is the most effective security management framework for your organization and why. 

Week 8 Discussion
There are many methods, mechanisms, and practices discussed for the management of security. Discuss what you deem is the most effective security management framework for your organization and why.  Peers in your responses, I encourage you to respectably rebut their selection and or point out the gaps/vulnerabilities?
Example: Use as example only.
Hello everyone,
Here we are again at the end of yet another course. Hope everyone had a great Thanksgiving holiday and didn’t eat too much. This week we are discussing what we perceive as the most effective security management framework for our organization and why. Being in the military the last 20+ years, I would have to select the defense in depth method. A defense in depth method leverages multiple overlapping security measures including administrative, physical, and logical / technical controls. Administrative controls include such mechanisms as access control restrictions, having employees sign acceptable use agreements, and posting regulations banning unauthorized employee activities. Separately, physical controls include the use of fences, gates, security cameras, badge readers, door locks and keypads. Physical access controls tend to garner much of the focus due to the ability to physically see the security mechanisms in place, as opposed to administrative or logical controls. Lastly, logical controls include the use of network firewalls, encryption, patch management, and antivirus/anti-malware protection. There are numerous other mechanisms and access control measures that are included in a defense in depth strategy, but as we learned in the first week’s reading regarding the multiple areas of security, each layer’s defense is complemented and reliant on all the other layers of security.
-Chris
Reference:
Fortinet. (2022). Defense in depth. Fortinet, Inc. Retrieved November 26, 2022, from https://www.fortinet.com/resources/cyberglossary/defense-in-depth.
Jacobs, S. (2015). Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons, Incorporated.

Categories
Telecommunications Engineering homework help

Discuss and share your thoughts on the evolution of IEEE standards and issues that come with securing wireless/mobile devices and or data.

Discuss and share your thoughts on the evolution of IEEE standards and issues that come with securing wireless/mobile devices and or data. You are welcome to discuss best practices and additional elements that help keep data secure discussed in chapters 10 and 11.

Categories
Telecommunications Engineering homework help

Explain how general principles of law and ethics apply to one or more contemporary cybersecurity issues. 

Using this week’s required resources as a general conceptual starting point, explain how general principles of law and ethics apply to one or more contemporary cybersecurity issues.  As you do so, please be sure to address the application of your chosen issue’s facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together.  In addition, reflect on what you have learned about why legal professionals need to pay attention to these matters.

Categories
Telecommunications Engineering homework help

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.

Categories
Telecommunications Engineering homework help

Compare the implementations of cryptographic solutions.

(2-3 pages + references) should use 1″ margins, 12 point font size, and should be single-spaced.
: Compare the implementations of cryptographic solutions.