Skip to main content

Cookies as Spyware.

1)  
2) Week Two Assignment
Learning About Cookies as Spyware.
Research what kind of information cookies store. You might find the following  websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

3) Week Four Discussion

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.

4) Week Four Discussion

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
5) Week Five Assignment
Learn About Defending Against DDoS

 
Using WORD, write an ORIGINAL brief essay of 300 words or more:
· Find a DoS attack that has occurred in the last six months
· You might find some resources at www.f-secure.com.
· Note how that attack was conducted.
· Write a brief explanation of how you might have defended against that specific attack.

6) Week Six Assignment

Use a search engine to find the names of five different cyber viruses.
Using WORD, write a short paragraph on each.
Use your own words and do not copy  the work of another student.

7) Week Seven Discussion

Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved. 
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.

8) Week Eight Assignment

Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
9) Week Nine Assignment
1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
2). Send a brief message (ten words minimum) using the Caesar Cypher

10) Week Ten Assignment

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.

 
Write between 200 and 300 words.

11) Week Eleven Assignment

Using the guidelines provided in this week's chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

12) Week Eleven Submit Final Project Topic

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
Possible Computer Security Research Project Topics
Anonymous
Citizen Rights vs Security
Cloud Computing
Computer Forensics
Data Center Security
Disaster Recovery
Edward Snowden – Traitor or Hero
Encryption
Hardware and Software Security
I Love You virus
Keyloggers

13) Week Twelve Assignment

Do some basic research on security certifications.
See https://www.giac.org/.
Write  a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

14) Week Thirteen Project Abstract

Your final project material is due this week.
Submit your project abstract here.

13.1) Week Thirteen Discussion

Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented.
Read and respond to at least two other students Discussions.
Post your initial response by the end of the day on Thursday and reply to at least two other students by the end of the day on Sunday.
Post between 200 and 300 words.
15) Week Fourteen Final Project Detail
Gather all final project material:
final paper
PowerPoint

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM