NS-10 -P

  • 0.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Cyber-attacks

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Post should be at least 300 words.

Upload Assignment: Week 2 Assignment

Complete the following assignment in one MS word document: 

Chapter 3 –discussion question #1-4 & exercise 12

Chapter 4 – discussion question #1-5 & exercise 1

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 3

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824269?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25203_Analytics%252C%2520Data%2520Science%252C%2520%2526%2520Artificial%2520Intellience.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200901T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200901%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=79ca50856b53a560c4740192c3518c11dc425f27210b2a53fca1397a6d4480d7

Chapter 4

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824270?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25204_Analytics%252C%2520Data%2520Science%252C%2520%2526%2520Artificial%2520Intellience.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200901T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200901%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=acba21c45f208cec48ef8bffc5352d3b440c6a5aefb69e826b6f000bbaa9d4c9

http://www.youtube.com/watch?v=VSDDKlrVidc

http://www.youtube.com/watch?v=RNQmvY_LA0E

Web Assignment

 

  • You are going to write a 2-3 page research paper in APA format, with all supporting references and visuals on the following :
    You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

    https://technumero.com/most-popular-web-browsers/
    https://www.toptenreviews.com/best-internet-browser-software

White Hat Hacking

Topic: White Hat Hacking

Abstract – Brief summary that identifies the purpose, goal, problem, methods, results, and conclusion of your work. (Format- Introduction, Body and Conclusion). 

Paper Format- Write 3 full-pages word, double spaced paper, written in APA format, showing sources and a bibliography.

Include this information for your research:

Purpose-

· Why did you decide to do this study or project?

· How did you conduct your research?

· What did you find?

· Why is this research and your findings important?

· Why should someone read your entire essay?

Problem-

· What problem is your research trying to better understand or solve?

· What is the scope of your study – a general problem, or something specific?

· What is your main claim or argument?

Method- 

· Discuss your own research including the variables and your approach.

· Describe the evidence you have to support your claim

· Give an overview of your most important sources.

Results-

· What answer did you reach from your research or study?

· Was your hypothesis or argument supported?

· What are the general findings?

Conclusion-

· What are the implications of your work?

· Are your results general or very specific?

References-

· Scholarly articles (ex. Harvard etc), peer-reviewed journals, publications, textbooks

w6

In 300 Words, Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Emerging threats_4.1

Question:

For this assignment, please review the below attachment and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: Answer should be in APA format and no plagiarism