Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
What is it about, which topic it covers; Why interesting; Which vulnerability is involved; What is its CVSS value? motivate the CVSS values.
Discussion Post: Cryptography- Analyze the history of Caesar Cypher and its impact on cryptography.
How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.
Discuss the event, and then discuss which of CIA (confidentiality, integrity and availability) principles were violated and specifically how they were violated.
Describe the importance of security in protecting data on computer systems. Describe the threats posed on the inside by employees of a company.
What are some other security models besides CIA triad? What are four components of security documentation? What are responsibilities of a security architect?
Define each layer and provide a brief description of each. Compare your chosen model with the OSI model.
What are some examples of computer crime? Are the current laws too restrictive or too prohibitive? What new legislation has been passed recently?
Utilize principles of critical thinking in problem-solving. Utilize information technology skills appropriate to interdisciplinary studies.
Identify the global cybersecurity risk management framework (other than NIST RMF) you would like to adopt.
Compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organization's security posture.
Create a Gmail account to be used for encryption. Download and configure Thunderbird, GnuPG, and Enigmail to work with your new Gmail account.
What things do you think make up the Web? When arriving at a crime scene, is it better to shut down the computer immediately or insure it stays on?
Understanding the nature of personally identifiable information. Understand the need for physical security. Explain threats to physical security.
Are cybersecurity threats similar from system to system? Where can you locate best practices for preventing or mitigating cybersecurity threats?
Knowing how to configure firewall rules can be very instrumental and very beneficial.
What are main concerns when collecting evidence? What precaution are necessary to preserve evidence state? How you ensure evidence remains in its initial state?
Describe SIEM concept in general, research the available implementations, tools, Splunk is perhaps the best known, find more.
What are the seven steps of a computer security defense plan? What are the Three Categories of Security Policies? List and briefly discuss each category.
Discuss the ways that employee users can protect themselves and the business from these types of privacy and security breaches and risks.
How to analyze wireless traffic using Wireshark and also began learning how to analyze wireless traffic using the NetWitness Investigator Tool.
Discuss the correspondences between the ER model constructs and the relational model constructs. How each ER model construct can be mapped to relational model.
What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access?
Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not.
What are the different types of denial-of-service attacks? How do you detect and respond to these types of events?