CYS-P-14

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing). 4 paragraphs

11

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

discussion-1

 Describe the difference between a fat AP and a thin AP.  What is needed to deploy a thin AP?  Are there any security considerations to think about between the 2 different APs? (AP-Access Point).

Week-10 discussion NS

Select a post-exploitation attack tool that may be used by an attacker. Explain how the tool works and how a defender may prevent and detect this tool from being successful. 

Make sure your post is at least 250 words

Security in Cloud Computing

One of the frequent concerns about the cloud computing environment is security. In 750 to 1000 words (excluding title page and references) and using Jamsa (2013) and Erl et al. (2013) as two of your sources, list five (5) security cloud concerns business personnel and consumers should consider when using the cloud (list these five concerns as Level 1 headers).

Then, in your own words, explain these vulnerabilities or concerns. Finally, utilizing scholarly research, provide recommendations for mitigating them and/or instituting safeguarding protocols.

Note:

  • Proper APA 7 format is required (including title page)
  • Use third-person only
  • Minimum seven references with matching intext citations

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

security architecture 15 .2

 

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section 

This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

social engineering attack (Cyber Security)

 

You have a new CEO (this is the same new CEO from Weeks 8 and 9). They are non-technical and came to your organization from a completely different market segment. You’ve been tasked with training this CEO on how to spot and avoid falling victim to a social engineering attack. You will also develop a pretend phishing email to test the CEO to see how much your training worked.

Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures. Slides, infographics, interpretive dance – any of these can be used to convey to the CEO what social engineering is and how to avoid falling prey. If you use something other than a letter or memo you’ll need an introductory document (yes, with letterhead!)

For the phishing email, you can type it out in Microsoft Word. It is understood that the phishing email might not be grammatically correct.

***Give your CEO a name. CEOs can be any gender***

Computer Security – week 12

 What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?