This is a rough draft only please. This class just started so do not write like I am super knowledgeable yet.
What is expected: a document with an introduction explaining the purpose and scope of the project, body of information filled with sections of info based on the rubric as well as any assumptions and additional informational you think is helpful to explain your points. Finally a conclusion of some sort that summarizes your points and ultimately a comparison of the old method compared to the new method and why it will be a better solution going forward. Do NOT copy and paste any information from the help documents given to you, you will lose points if you do so. Much of this project is factual information of the what but you also need to include the why, how and when. It all logically needs to make sense. The rubric content is accurate, the rubric points are for the final draft.
What is expected –
A 3-5 page paper of content with an introduction explaining the purpose of this topic. The body of the paper will address all the questions you would have such as who, what, when, how…things like this. The body would be made up of the information gathered from the rubric items and anything else that is helpful to your points. Finally you should end with some type of conclusion that explains why this information is important or what you gained from preparing the paper such as the major takeaways. A cover page is optional but you should have a works cited page. Neither of these is counted in the 3-5 pages.
Category: Cyber security
-
“Streamlining Processes: The Benefits of Implementing a New Method”
-
Title: Enhancing Security Protocols: A Proposal for Addressing the Consequences of a Company Hack.
Your company has recently been hacked, and you need to
update security protocols. Conduct research regarding the importance of
updating protocols and suggest a course of action based on your research.
A. Create a proposal (suggested length of 2–4 pages) by doing the following:
1. Identify a problem that is relevant to a professional setting.
2. Describe the significance of the problem.
3. Provide a statement of purpose at the beginning of the proposal that recommends a solution(s) to the problem.
4. Explain the proposed course of action with 2–4 logical steps or justifications (suggested length of 1–2 paragraphs per step or justification).
5. Justify how your proposed course of action supports the solutions(s) listed in part A3 and is a suitable choice, using threecredible sources to support your response.
6. Identify
the challenge(s) that might be encountered while implementing the
solution(s) and explain how the challenge(s) could be overcome.
7. Provide a conclusion for the proposal.
B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
C. Demonstrate professional communication in the content and presentation of your submission.
does not have to be 3 pages and can be whichever format comfortable
the document attached has some sources that i found that can be useful -
“Visualizing My Favorite Things: A PowerPoint Presentation”
Overview
For this hands-on project, you’ll be creating a Microsoft PowerPoint presentation of your choice from one of the following topics. You may only choose one topic, and it must meet all the requirements listed below. You’ll be using most of the tools that you learned throughout this lesson in a real-world situation. Choose one of the following topics, then use the requirements below to craft your presentation:
A presentation featuring your Dream Vacation Destination
A presentation featuring your Favorite Sports Team
A presentation featuring your favorite band
A presentation featuring your favorite movie
A presentation featuring your favorite video game
A presentation featuring Yourself and your Resume
REMEMBER
If you use any outside sources, such as pictures, text, or quotes, be sure to properly cite them using APA style on the last slide of your slide show. For more information and help in citing please reference the Citation Help (opens in a new tab) page within the Rio Library Research Guide and Purdue University Online Writing Lab (OWL) (opens in a new tab).
Citation, spelling, grammar, and the overall look and feel of your presentation will be evaluated, so be sure to create, edit, and revise before turning in.
Project Preparation
Download the Lesson 5 Storyboard Template (opens in a new tab) Word document to your course lesson folder.
Storyboard Project
Choose your topic from the list presented above. Using the Storyboard template document, map out your presentation. Be sure to include the main topic of each slide, the layout you will use, and a list of the types of content that will be included on each slide.
Your presentation should be at least 10 slides long: one title slide, one slide for references at the end, and eight or more content slides.
Review all the requirements below and include items where applicable in your Storyboard document.
REMEMBER
The Storyboard is meant to be a brainstorming document to help you plan out how the presentation will flow and which topics you’ll cover. This Storyboard is not set in stone; it can evolve and change as you decide to add more or less to your final presentation. PowerPoint Presentation
Create a New PowerPoint Presentation. Do not use a Template, but start a New Blank Presentation.
Apply a Theme to the presentation.
Create a Title Slide that features your title, name, MEID, and today’s date.
Create eight or more content slides.
The first content slide should be an introduction of what you will present.
You must use at least three different slide layouts.
Each slide must contain some text (don’t just have a picture by itself on the slide).
Each slide must have at least one of the following. And you need to use each one at least once in your presentation:
Picture or Clip-Art
Shapes/Diagram
On the slide where shapes are used, group the shapes together.
Your content should match your previously created Storyboard document.
Use at least one bulleted list.
Use at least one numbered list.
Use font formatting at least once. This can be bolding, underlining, or italicizing text on a slide.
Using the Master Views, edit the Slide Master for your presentation and add a text box shape with your MEID in the lower-left corner of every slide. (Be sure to choose an appropriate text color based on your theme and background image.)
Create a References slide as the final slide in your presentation. Any outside material should be cited here using APA format.
Review your presentation and create presenter notes for each slide.
Apply animations to each slide of your presentation (at least one object per slide must be animated).
Apply transitions to each content slide of your presentation.
For all pictures in your presentation, add Alt Text
Preview your presentation in Presentation Mode.
Use the Pen Annotation Tool and make a note on at least one slide.
Review each slide for grammatical and spelling errors. -
“Exploring Networking Protocols, Cabling, and Evolution of Ethernet”
Part 1 Links(https://www.youtube.com/watch?v=fO5dQ9Jkv2M & https://www.youtube.com/watch?v=FEEor4MH8mw & https://www.youtube.com/watch?v=I1neBj0WeX0)
Discussion – Discuss ONE of the Following Topics:
Discuss the Spanning Tree Protocol and how it is used in networking. Make sure you discuss how STP is used to protect against loops in routing. Also, talk about how it is configured on a switch and why it is or is not the best method to use.
Compare and contrast solid core and stranded core cabling. What is better, or more used? Provide examples of their usefulness.
Discuss whether there are additional tools that are new to networking that help in the installation and configuration of a network. Are there better tools that are now available? Explain how they are used.
Research how to determine where to place a wiring room. Does it really make a difference where it is located in a building now? Looking at the five issues the book explains, give your opinion on which issue is the most important. Why do you feel that way?
Part 2
Assignment:
Time to add content to that Blog! Content for this week’s Blog should pertain to this week’s readings, videos, and/or assignments. Don’t just copy your discussion postings over. Come up with some insights into topics presented or discussed throughout the week.(using the links in part 1)
Part 3 Assignment:
Research how the Ethernet has evolved and discuss the common modern features of networking, including different variations of Ethernet. (i.e. Fast Ethernet, 10 Gigabit Ethernet, Fiber-based 10 GbE, etc.)
Take some time to show all of the different versions of how the communication is handled and what is the best and worst of each method. Give an example of a network setup you know about and what they used for their Ethernet setup.
This assignment should be a minimum of one page in length.
Part 4
Assignment:
The second milestone of your Research Paper is due. The Guidelines and Milestones for your paper are outlined in the Research Paper tab on the left.
When your paper is complete, you should have 6-10 resources. For right now, with this milestone, you should have 3-6 beginning resources that give you information on your approved topic.
If you just have a simple URL for a resource, explain in detail what information and content you can obtain from that resource along with your reference. If you cannot get sources, your topic may need to be modified to give you a good start on your paper.
Remember, your paper has to be original and in your own words. There are guidelines for plagiarism in the Research Paper tab on the left. Your final paper will go through a plagiarism check.
Check “Milestone 1 Cabling and Topology” to gain insight on the assignment -
Title: “Ensuring Organizational Security: Considerations, Policies, and User Buy-In” Organizational security policies are crucial for protecting sensitive information and assets, as well as maintaining the overall security posture of a company. These policies outline the rules
What are the major considerations of organizational security policies? (500 to 1,000 words)
Create two possible policies regarding risk assessment and analysis. (250 or more words)
Part 2
In 200 or more words for each answer, respond to the following:
What should the acceptable use policy cover and why?
What types of information should be covered in a commercial organization’s data classification policy and why?
What are some effective ways to get user buy-in of security policies? -
“Securing Information: An Analysis of Laws, Policies, and Concepts in Information Security”
RUBRIC: The research paper must be rooted in concepts related to information security. The paper must be coherent, unified, and effective to support the paper’s purpose and consistently demonstrate effective and appropriate transitions. The paper must identify issues of laws and policy correctly and coherently. The paper must be free of APA errors and spelling and grammatical errors.
-
“Strengthening Password Security in Healthcare Organizations: Evaluating and Implementing Password Cracking Tools”
Step 3: Password Cracking Tools
You
have successfully examined the threats to a healthcare organization’s
information systems infrastructure. Now, you must begin your research
into password cracking software. Do some quick independent research on
password cracking as it applies to your organization.
COMPLETE THIS LAB
Here are some resources that will help you complete the lab:
Accessing the Virtual Lab Environment: Navigating the Workspace and the Lab Setup.
Please review the WorkSpace and Lab Machine Environment Tutorial
Lab Instructions: Password Cracking With Cain & Abel and Ophcrack
Self-Help Guide: Workspace: Getting Started and Troubleshooting
Getting Help: To obtain lab assistance, email GraduateCyber@umuc.edu using the following template in the body of your email.Your full name:
Your user ID:
Preferred email:
Your course and section number:
Detailed description of the issue that you are experiencing:
Machine type (PC, tablet, mobile device):
OS type and version:
Browser type and version:
Provide
any information related to the issue that you are experiencing and
attach any screenshot that you may be able to produce related to the
issue.
Additional Lab Support Information:
More
lab-related self-help information is available if you register for CLAB
699, our free online graduate Cyber Computing Lab Assistance hub.
Registering for Cyber Computing Lab Assistance
After
completing the lab, you will have successfully tested more than one
password cracking tool. Not all password cracking tools will necessarily
perform with the same speed, precision, and results, making it
important to test a few different products. Compare the password
cracking tools based on these characteristics, and include as part of
your assessment and recommendations on the use of such tools. You will
test the organization’s systems for password strength and complexity and
complete validation testing. You will compare the results obtained from
your first and second tool.
You have
tested and made comparisons of the performance of various password
cracking tools and you have the data to support your recommendations for
the use of such tools.
Not all
password cracking tools will necessarily perform with the same speed,
precision, and results, making it important to test a few different
products. The comparison will be part of your assessment and help you
make recommendations on the use of such tools. You will test the
organization’s systems for password strength and complexity and complete
validation testing. You will compare the results comparing the various
tools.
Read this article about Cyberattacks,
perform two different types of cyberattacks in the first, and in the
second tool, crack user account passwords. Describe them in simple
nontechnical terms for the leadership. You can identify which tool is
the most effective and why for your organization’s IT environment
Compare
and contrast the results from the two methods used to crack the
accounts for the three passwords (each encrypted by the two hash
algorithms). Show their benefits. You can make certain conclusions that
help your company’s cybersecurity posture after using these methods.
Explain
to the director of IT and the members of the board that the healthcare
organization’s anti-virus software will detect password cracking tools
as malware. Also explain how this impacts the effectiveness of testing
security controls like password strength. Help the leadership understand
the risks and benefits of using password cracking tools, through
persuasive arguments in your report and presentation. If any of the
tools take longer than 4-5 minutes to guess a password, record the
estimated length of time the tool anticipates to guess it. -
“Developing a Comprehensive Contingency Planning Program for an Organization”
Based
on the knowledge obtained in this course and previous coursework, you will be
expected to assess the current state of Contingency Planning at your
organization (e.g., university or companies) or a fictitious organization and
design a suitable program for the development, implementation, testing and
maintenance of Incident Response, Disaster Recovery and Business Continuity
Planning. Students will submit a series of deliverables containing all
necessary documents and recommendations.
I have also attached a template for a risk management form that can be used, but does not have to be. -
The Importance of Confidentiality in Compliance Laws: Analysis and Consequences of Violations
Learning Objectives and Outcomes
Analyzing the importance of confidentiality in many compliance laws.
Assignment Requirements
Many compliance law requirements address data confidentiality. Even though ensuring availability and integrity of data is important, keeping private information confidential figures prominently in compliance matters.
Answer the following question
Why does confidentiality play such as major role with compliance laws? Consider the consequences of violations in your answer.
Fully address the questions in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.
Required Resources
Course textbook “fundamentals of information systems security 4th edition by David Kim Michael G. Solomon.”
Internet access
Submission Requirements
Your submission must have a title page (See Sticky Section)
Format: PDF
Font: Arial, size 12, double-space
Length: 1-2 pages
Self-Assessment Checklist
I fully addressed the question(s) in the discussion instructions.
I included justification or rationale for my choices, where applicable.
I responded to at least two other students’ views.
I followed the submission guidelines. -
“The Impact of Emerging Technologies on Politics, Society, and Economy: A Case Study on Artificial Intelligence”
For this assignment, you will write a 500-word expository essay on the topic of technology, history, and society. Your essay should have a clearly established and sustained viewpoint and purpose. In addition, your writing should be well ordered, logical, and unified, as well as original and insightful. Following are the content requirements of the essay:
Select one of the following emerging technologies: nanotechnology, biotechnology, artificial intelligence, and robotics.
Describe the emerging technology.
What problem was this emerging technology addressing?
What were the political effects of this emerging technology?
Describe at least one positive political outcome.
Describe at least one negative political outcome.
What were the social effects of this emerging technology?
Describe at least one positive social outcome.
Describe at least one negative social outcome.
What were the economic effects of this emerging technology?
Describe at least one positive economic outcome.
Describe at least one negative economic outcome.
Your paper should also meet the following requirements:
APA format.
Title page
Introduction
APA citations
Double-spaced sentences
12-point Times New Roman font
Conclusion
Reference page
Three sources minimum (including the class text)
Standard English grammar conventions
Correct grammar
Correct punctuation and spelling
Logical, well-ordered sentences