Cyber Weapons

 

Week 9 Forum – Cyber Weapons

For your initial post, discuss all three topics below. 

Zero-Day exploits and Cyber Weapons

  1. Analyze the significance of the STUXNET malicious code events in Iran, and the significance of the Dragonfly malicious code currently found in the US and Europe (Do not dwell on describing the effects, instead describe the significance).
  2. Analyze the effects of the global market for sale of ZDEs.  Can the proliferation of ZDEs and cyberweapons be controlled or managed by a treaty similar to the Nuclear Non-proliferation Treaty?   Is it possible to keep a count of cyber weapons the same way we can monitor nations to count their nuclear weapons?  Explain your answer.
  3. Describe the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy.  Compare those characteristics and effects on computers to the traditional effects that are commonly associated with a malicious code cyberattack.  Look up the costs for various commercial EMP devices found for sale on the Internet. 

Written Work/ Assignment/Minitrex Case Study

Read the CRM at Minitrex Case Study on pages 243-245 in the textbook: IT Strategy: Issues and practices, McKeen, J. D., & Smith, H. A., Pearson, 2015, Third Edition. 

Answer the Discussion Questions at the end of the Case Study.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

    

Discussion Questions 

  1. Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called.
     
  2. Outline the steps that Bettman must take in order to implement CRM at Minitrex. In your plan be sure to include people, processes, and technology.
     

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Assignment

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier

Network Design and Plan – Part 1

 

Project Part 1: Network Design

Scenario

The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

§ Current infrastructure elements

§ A logical topology that separates the Accounting and Sales departments

§ Redundant communications

§ Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

3. Include a high-level plan that ensures communications are available 24/7.

4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.

5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

6. Create a draft report detailing all information as supportive documentation.

7. Cite sources, where appropriate.

Required Resources

  • Internet access

§ Course textbook

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font:      Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Length of report: 3–4 pages

Discussion 4- Legal

Assigned Readings:Chapter 5. Business and the Constitution.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain the difference in procedural due process and substantive due process, providing examples of each.
  2. Beets R Us, LLC is a medium-sized farm in Iowa that grows beets that are only sold in Iowa.  It does not export its beets outside of Iowa, though sometimes customers from out of state buy its beets while visiting Iowa.  Is Beets R Us, LLC’s business practices subject to federal jurisdiction under Article I, Section 8 of the United States Constitution?  Why or why not?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Week 1

1. In 500 words or more, compare the performance of Excel on Windows and Mac. Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.

Database Systems – Discussions

Discussion 1: Create a discussion thread (with your name) and answer the following question(s): (Chapter 3):  

Consider the ER diagram shown in Figure 3.22 for part of a BANK database (also below for reference). Each bank can have multiple branches, and each branch can have multiple accounts and loans.

(a) List the strong (nonweak) entity types in the ER diagram.

(b) Is there a weak entity type? If so, give its name, its partial key, and its identifying relationship.

(c) What constraints do the partial key and the identifying relationship of the weak entity type specify in this diagram?

(d) List the names of all relationship types, and specify the (min,max) constraint on each participation of an entity type in a relationship type. Justify your choices.

Discussion 2: Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 5):  Discuss the characteristics of relations that make them different from ordinary tables and files. 

literature review

Overview: Using mentor or model texts is a strategy to improve your own writing.  The New York Times describes mentor texts as, “Demystifying the writing process via examples students can learn from and emulate.” In this assignment, you will locate a mentor text in the form of a dissertation that may or may not be similar to your own topic to use as a model while you write your chapter 2.  It is most helpful to find a dissertation with a literature review similar to your own, but if that is not possible, you may look for the next best option.

Topic :   

The Smart Phone as a Dangerous Technology

 Directions:

  1. Use ProQuest Dissertations & Theses Global database on the UC Library website to locate mentor text dissertation (preferably it would be related to your topic). 
  2. You may need to use advanced search options to help narrow your search. 
  3. Scan read the entire dissertation.
  4. Carefully read the literature review section.
  5. Provide a one-paragraph summary of the entire literature review.  
  6. Write a second paragraph about what you learned through reviewing chapter 2

APA format with references needed

500 words