Its 834 emerging threats and countermeasures homework


ITS 834 Emerging Threats and Countermeasures Homework: University of the Cumberlands

Discussion Post: Physical Security and Threats

Chapters 5, 9, and 10 in the course textbook

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion-into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she's protecting the business and not his belongings.

o When or where would you think it would be necessary to implement security measures for both?

Research Paper:Cyber security and the internet of things

For this homework, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Evaluate it in 3+ pages, using your own words, by addressing the following:

o What did the authors investigate, and in general how did they do so?

o Identify the hypothesis or question being tested

o Summarize the overall article.

o Identify the conclusions of the authors

o Indicate whether or not you think the data support their conclusions/hypothesis

o Consider alternative explanations for the results

o Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)

o The relevance or importance of the study

o The appropriateness of the experimental design

When you write your evaluation, be brief and concise. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you'll be completing during the dissertation process.

Format your homework according to the following formatting requirements:

o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

o The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Reference

o Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88.

o NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122.

o Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10 .

Chapters 5, 9, and 10 in the course textbook

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Its 834 emerging threats and countermeasures homework
Reference No:- TGS03164006

Now Priced at $40 (50% Discount)

Recommended (94%)

Rated (4.6/5)