cybersecurity Information Security
Discuss Malware
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- What is malware?
- Discuss at least five types, describing each.
- Discuss what they are and what they do.
- Discuss a notable instance of each type
- What impact can malware have on an organization
- How can an organization reduce risks associated with malware? (Hint: talk about appropriate types of policies, procedures, and the use of technology)
- What is software piracy or license violations?
- What can an organization do to avoid it?
- What are the potential consequences of it?
- What relationship does it have with malware?
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
week 8 discussion NS
Select a specific phishing attack tool/method (NOT vishing, BEC, CEO fraud) such as Emotet, Blackhole etc. etc. and explain how the attack works along with how we, as defenders, can prevent this attack from being successful.
Software Engineering Assignment
the question is in the file that I upload.
use that file Overview of the NUST Strategic Plan 2021-2025 ONE PAGER.pdf as the reference
paper
week2
dis
main
Network Security
1.1 What is the OSI security architecture?
1.2 What is the difference between passive and active security threats?
1.3 List and briefly define categories of passive and active security attacks.
1.4 List and briefly define categories of security services.
1.5 List and briefly define categories of security mechanisms.
1.6 List and briefly define the fundamental security design principles.
1.7 Explain the difference between an attack surface and an attack tree.
https://www.schneier.com/essays/archives/1997/01/why_cryptography_is.html
APA 6th edition – Write a 3-4 page double space paper about how the course Cloud Computing is relevant to your current or future job. Grammatical and mechanical errors will be checked.
Write a 3-4 page double space paper about how this course Cloud Computing is relevant to your current or future job. Grammatical and mechanical errors will be checked. The paper should be in APA 6th standard with at least 3 professional references.
cloud computinhg
University of cumberlands
website : https://www.ucumberlands.edu/
Create a PowerPoint brief on the topic of Academic Integrity.
- Cover (Course, Student Name, Date)
- Topics (10 each – 1 Slide per topic)
- Add graphics or screen captures
- One slide is dedicated locating and listing at least three (3) UC resources that the university provides regarding writing assistance, avoiding plagiarism
- Conclusion
- A brief personal statement about your pledge to avoid academic dishonesty and what that means to you and the university (standards, morals, character, etc.)
assign
Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.
For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?
Describe the change in the time complexity of K-means as the number of clusters to be found increases.
Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
Explain the difference between likelihood and probability.
Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.