Categories
Computer Science

Write a profile of yourself and another person of your choosing. Describe charac

Write a profile of yourself and another person of your choosing. Describe characteristics such as age, cultural and educational background, physical abilities or limitations, and prior experience of technology. Explain why each person would be considered a digital native (born into the world of technology) or digital immigrant (introduced to technology later in life). Discuss how differences might affect interaction with technology.

Categories
Computer Science

Write a profile of yourself and another person of your choosing. Describe charac

Write a profile of yourself and another person of your choosing. Describe characteristics such as age, cultural and educational background, physical abilities or limitations, and prior experience of technology. Explain why each person would be considered a digital native (born into the world of technology) or digital immigrant (introduced to technology later in life). Discuss how differences might affect interaction with technology.

Categories
Computer Science

Confidentiality is key! Inherently we must decrypt data while working on it whic

Confidentiality is key! Inherently we must decrypt data while working on it which brings risk. We use homomorphic encryption to do this as it allows data to be worked on without decrypting it first… well somewhat. Please describe in simple terms the difference between partially, somewhat, and fully homomorphic encryption. Describe the pros and cons of each kind of homomorphic encryption. Additionally, describe NIST’s lightweight cryptography in your own words, and why it is beneficial for IoT devices. Answer in 200-300 words
<
<
In your own words what is ARP poisoning? How does it work? What could an adversary do with this to benefit them? What are some preventative measures to stop this attack from happening? Answer in 150-250 words
<
<
In your own words, explain what a Redundant Array of Independent Disks is. Explain how RAID 0, 5, and 0+1 work, and pros and cons with each kind. Make sure to explain what parity bits are. Answer in 150-250 words.

Categories
Computer Science

Confidentiality is key! Inherently we must decrypt data while working on it whic

Confidentiality is key! Inherently we must decrypt data while working on it which brings risk. We use homomorphic encryption to do this as it allows data to be worked on without decrypting it first… well somewhat. Please describe in simple terms the difference between partially, somewhat, and fully homomorphic encryption. Describe the pros and cons of each kind of homomorphic encryption. Additionally, describe NIST’s lightweight cryptography in your own words, and why it is beneficial for IoT devices. Answer in 200-300 words
<
<
In your own words what is ARP poisoning? How does it work? What could an adversary do with this to benefit them? What are some preventative measures to stop this attack from happening? Answer in 150-250 words
<
<
In your own words, explain what a Redundant Array of Independent Disks is. Explain how RAID 0, 5, and 0+1 work, and pros and cons with each kind. Make sure to explain what parity bits are. Answer in 150-250 words.

Categories
Computer Science

The PowerPoint template for this assignment can be found here. This template on

The PowerPoint template for this assignment can be found here. This template only contains one slide and that is all that is required. For this template you can select one of the following:
<
<
Being cybersecurity aware
<
Why is Secure Coding important
<
One of the secure coding topics we went over
<
What’s the worst that can happen (sort of like I included in my PowerPoints)?
<
Using the template, you will fill it out as though you’re making a poster to educate someone that isn’t aware of the need for cybersecurity. There is an area where you are asked to submit images (these can be images of either the “disaster” or code snippet). There is also an “interview” area in the template. For this you can just include a quote that you find online about your topic.
<
<

Categories
Computer Science

Assumptions for this Assignment: What threat has occurred? (i.e., wha

Assumptions for this Assignment:
<
<
What threat has occurred? (i.e., what type specifically)
<
<
What should be your next actions to recover from this incident? (Hint: TestOut 8.3.2) (Also I did not speak of which cryptographic protocol this was, so you do not need to address those kinds of threats, this should help eliminate some)
<
<
Requirements for this Report:
<
<
The report must include a cover page (Name, section, institution, and date)
<
<
The report must be at least two pages, and at most three pages in length.
<
<
-This does not include the cover page (I.E., cover page, then two to three pages of content, double-spaced)
<
<
The report must be Times New Roman, 12-point, double-spaced, 1-inch margins.
<
<
This report must be a word document, or I will not accept it.
<
<
The report must address the correct threat which has occurred.
<
<
The report must include three actions to recover from the incident and you must describe them in technical detail, and how they help attribute to recovery and hardening.
<
<
-Example: MAC address filtering would help if any unrecognized devices connected to the network, so even if an incident like this happens and credentials are stolen, this device would not be able to connect…. You may use this example but must add more content and clarification to it.
<
<
I am not requiring any references for this assignment, so you do not need a references page.
<
<
Here is an example outline for the report (This is good to note)
<
<
Cover Page
<
<
Introduction (1 full paragraph)
<
<
Action (Control 1) (1 full paragraph)
<
<
Action (Control 2) (1 full paragraph)
<
<
Action (Control 3) (1 full paragraph)
<
<
Conclusion (1 full paragraph)

Categories
Computer Science

The PowerPoint template for this assignment can be found here. This template on

The PowerPoint template for this assignment can be found here. This template only contains one slide and that is all that is required. For this template you can select one of the following:
<
<
Being cybersecurity aware
<
Why is Secure Coding important
<
One of the secure coding topics we went over
<
What’s the worst that can happen (sort of like I included in my PowerPoints)?
<
Using the template, you will fill it out as though you’re making a poster to educate someone that isn’t aware of the need for cybersecurity. There is an area where you are asked to submit images (these can be images of either the “disaster” or code snippet). There is also an “interview” area in the template. For this you can just include a quote that you find online about your topic.
<
<

Categories
Computer Science

Assumptions for this Assignment: What threat has occurred? (i.e., wha

Assumptions for this Assignment:
<
<
What threat has occurred? (i.e., what type specifically)
<
<
What should be your next actions to recover from this incident? (Hint: TestOut 8.3.2) (Also I did not speak of which cryptographic protocol this was, so you do not need to address those kinds of threats, this should help eliminate some)
<
<
Requirements for this Report:
<
<
The report must include a cover page (Name, section, institution, and date)
<
<
The report must be at least two pages, and at most three pages in length.
<
<
-This does not include the cover page (I.E., cover page, then two to three pages of content, double-spaced)
<
<
The report must be Times New Roman, 12-point, double-spaced, 1-inch margins.
<
<
This report must be a word document, or I will not accept it.
<
<
The report must address the correct threat which has occurred.
<
<
The report must include three actions to recover from the incident and you must describe them in technical detail, and how they help attribute to recovery and hardening.
<
<
-Example: MAC address filtering would help if any unrecognized devices connected to the network, so even if an incident like this happens and credentials are stolen, this device would not be able to connect…. You may use this example but must add more content and clarification to it.
<
<
I am not requiring any references for this assignment, so you do not need a references page.
<
<
Here is an example outline for the report (This is good to note)
<
<
Cover Page
<
<
Introduction (1 full paragraph)
<
<
Action (Control 1) (1 full paragraph)
<
<
Action (Control 2) (1 full paragraph)
<
<
Action (Control 3) (1 full paragraph)
<
<
Conclusion (1 full paragraph)

Categories
Computer Science

Please read the two attached articles to get an understanding of what social med

Please read the two attached articles to get an understanding of what social media screening is for potential employees. As well, you will want to note the pros and cons of this practice for employers regarding risk management and determining risk for potential employees during the pre-onboarding process. Although these articles are rather encompassing, you may need to do additional research to formulate your opinion on this topic. Ultimately, the question you should be asking yourself is “is social media screening ethical?”
<
<
Report Summary and Questions:
<
<
This report is an argumentative piece. You must choose two of the four following questions from below and defend your standpoint. The ideal length for this paper is one to two pages (Times New Romain, 12-point, double-spaced, 1-inch margins)
<
<
1. Does social media screening truly represent whether an employee will or will not bring risk into a job for which they are being hired? If so, what sort of content within their social media profiles would indicate this? If not, why?
<
<
2. Is social media screening fair to potential employees? As well, is social media screening an ethical practice for employers to utilize?
<
<
3. What would be an example of an employer taking social media screening to far? Where should employers who do practice social media screening draw the line regarding privacy?
<
<
4. Is social media screening an invasion of privacy, or is it truly accessing public information?
<
<
Report Requirements:
<
<
Report is approximately one to two pages long (This does not include your cover page; it is the total amount of written content)
<
<
Report is Times New Roman, 12-point, double-spaced, 1-inch margins
<
<
A cover-page is included
<
<
At least three academic sources are included

Categories
Computer Science

As it goes the profession of penetration testing has been subject to scrutiny fo

As it goes the profession of penetration testing has been subject to scrutiny for a long time, as independent security researchers (pentesters, whitehats, etcetera) find security flaws in many different things and disclose them for the greater good, or so they say. The parties who are for penetration testing tend to side with the notion that it can help harden security and that the testing can help these companies. Those who are opposed to penetration testing tend to say that it can open a metaphorical can of worms and cause many different new security concerns for organizations.
<
<
In one to two pages please choose a side, and defend your response in a report format, just like the other report assignments. Please refer to the attached rubric to see what I am looking for in your writing.
<
<
Some topics for your writing, please use these, feel free to include more if you would like:
<
<
-Does penetration testing show the true weaknesses (security flaws) of an organization?
<
<
-Does the kind of penetration test determine the fairness of the testing? (Whitebox, greybox, etc.)
<
<
-Is it fair to put employees on the spot via social engineering techniques?
<
<
-Would it be better to hire ex-black hat hackers to best represent these simulated criminal actions?
<
<
-Can a penetration test bring harm to an organization, if so, how?