Assignment

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Emerging threats_2.1

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Topic- Security Issues with IoT Based Smart Home Devices Annotated Bibliographies related with your project selected topic

Details pls go through Required assignment doc and attached Annotated Bibliographies related with your project selected topic.

Topic-  Security Issues with IoT Based Smart Home Devices 

  

VERY IMPORTANT NOTE

1- You need to follow the format based on attached file.

2- You need to tell me which MIS journal publishing using along with URL.

3- ONLY” Peer-Reviewed Journals. Do not use any other source to support your research. Use only Peer-Reviewed Journals. 

4- Which peer review approval you are using I need each PDF url. Max 2 to 3 would be fine. 

5- Annotated Bibliographies (File attached).

6- Use generic security issues on smart home devices but elaborate for a one with details in next page. 

Cryptography (Please See Attached Rubric)

 

Review the following questions from Network security: Private communication in a public world and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

  1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

  1. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol’s answer to Alice’s challenge?

  1. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties— the good guys and the bad guys— get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. (note: this textbook is a reference for the assignment and not a required resource for learners)

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Multifactor Authentication

 

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Research paper

  Topic:

Assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Write a paper containing the IT strategic plan that will address Circuit City ecommerce initiatives. The following information should be covered in the presentation. 

1. History of Circuit City 

2. What were the issues and challenges that caused the collapse of Circuit City in 2009? 

3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative? 

4. Discuss the major competitors in global e-commerce. 

5. How would IT deliver value to the business? 6. Proposed the IT infrastructure required to support global e-commerce 

7. Proposed the IT budget for the e-commerce initiative 

8. Discuss the IT based risks associated with global e-commerce 

9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business 

10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.

12 pages excluding citations. Paper must be in APA format with Introduction, History, Methodology, Issues and challenges, Conclusion

Definition of a Team

Find three different definitions of a team.  Present a discussion of the three definitions of a team. (One reference per team definition)

Cyber Security planning&mgmt week 9

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.