Skip to main content

Cookies as Spyware.

1)  
2) Week Two Assignment
Learning About Cookies as Spyware.
Research what kind of information cookies store. You might find the following  websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

3) Week Four Discussion

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.

4) Week Four Discussion

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
5) Week Five Assignment
Learn About Defending Against DDoS

 
Using WORD, write an ORIGINAL brief essay of 300 words or more:
· Find a DoS attack that has occurred in the last six months
· You might find some resources at www.f-secure.com.
· Note how that attack was conducted.
· Write a brief explanation of how you might have defended against that specific attack.

6) Week Six Assignment

Use a search engine to find the names of five different cyber viruses.
Using WORD, write a short paragraph on each.
Use your own words and do not copy  the work of another student.

7) Week Seven Discussion

Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved. 
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.

8) Week Eight Assignment

Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
9) Week Nine Assignment
1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
2). Send a brief message (ten words minimum) using the Caesar Cypher

10) Week Ten Assignment

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.

 
Write between 200 and 300 words.

11) Week Eleven Assignment

Using the guidelines provided in this week's chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

12) Week Eleven Submit Final Project Topic

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
Possible Computer Security Research Project Topics
Anonymous
Citizen Rights vs Security
Cloud Computing
Computer Forensics
Data Center Security
Disaster Recovery
Edward Snowden – Traitor or Hero
Encryption
Hardware and Software Security
I Love You virus
Keyloggers

13) Week Twelve Assignment

Do some basic research on security certifications.
See https://www.giac.org/.
Write  a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

14) Week Thirteen Project Abstract

Your final project material is due this week.
Submit your project abstract here.

13.1) Week Thirteen Discussion

Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented.
Read and respond to at least two other students Discussions.
Post your initial response by the end of the day on Thursday and reply to at least two other students by the end of the day on Sunday.
Post between 200 and 300 words.
15) Week Fourteen Final Project Detail
Gather all final project material:
final paper
PowerPoint

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH