Category: Cyber security

  • Title: Analysis of Consumer Complaints by Product Type and Company in the United States

    You are a data analyst working for a nonprofit organization that reviews business. You have been tasked to provide a briefing on consumer complaints. Using this Web site (http://catalog.data.gov/dataset/consumer-complaint-database) which has over 200,000 records, analyze the data, and provide insight regarding the following:
    Which type of product had the most complaints ordered by state?
    How many complaints have been filed for each company?
    Summarize the responses for each company (i.e., 32 in progress, 67 closed, and 22 closed with explanation).
    Please provide the report as a database application document. The final product will include a customer complaints table and a query for each of the questions above.

  • Title: The Role of Artificial Intelligence in Cybersecurity: Current Uses, SWOT Analysis, and Recommendations for Implementation Using the AI RMF Framework

    Step 1: Read About Artificial Intelligence
    This introductory PowerPoint presentation defines AI, its history and its use in Cybersecurity for the health sector. ChatGPT applications to offensive cybersecurity are introduced along with possible defensive mechanisms that may be applied to any sector.
    Federal and industrial AI use cases show the increase and diversity of AI-related applications in the federal government and industrial applications.  
    Cybersecurity is considered the next frontier in AI with the potential to help protect our nation’s infrastructure through the use of large datasets and algorithms that imitate human cognition. For most of us, the future is already here with applications using AI already present in cloud computing, chatbots, facial recognition, programming and more.
    Links: 
    https://www.hhs.gov/sites/default/files/ai-cybersecurity-health-sector-tlpclear.pdf

    Top 10 Industries Using Artificial Intelligence: Facts, Insights, Use Cases


    https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2702241/artificial-intelligence-next-frontier-is-cybersecurity/
    https://www.datacenters.com/news/artificial-intelligence-in-cloud-computing
    https://www.zendesk.com/service/messaging/chatbot/
    https://www.bbc.com/news/technology-65057011
    https://openai.com/index/openai-codex/
    ———————————————————————————
    Step 2: Concerns with AI
    Figure 1 shows how the National Institute of Standards and Technology (NIST) AI Risk Management Framework describes an AI system’s trustworthiness.
    Figure 1. AI System Trustworthiness (source)
    Bias can be introduced into a dataset used to train AI systems. Towards a Standard for Identifying and Managing Bias in Artificial Intelligence details problems associated with Bias and processes to eliminate it. Unfortunately biases are prevalent across many technologies using AI and can lead to harmful impacts resulting an overall lack of trust in AI-related products. 
    Generative AI has also raised some competitive concerns where those in more powerful positions and companies may bring about unfair competition and increase unfair conduct.
    Additional concerns for the use of AI include the possibility of vulnerabilities and threats introduced by AI applications and the importance of risk mitigations that must be part of any AI-enabled system.
    Links: 

    https://learn.umgc.edu/d2l/le/content/927821/viewContent/32468209/View
    https://crsreports.congress.gov/product/pdf/R/R47569
    https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2023/06/generative-ai-raises-competition-concerns
    https://inldigitallibrary.inl.gov/sites/sti/sti/Sort_57369.pdf
    ———————————————————————
    Step 5: Write Draft Artificial Intelligence (AI)
    Using your research and analysis from steps 1-4, prepare an eight-to-ten-page analytical summary of your research in which you identify and discuss the role of AI in Cybersecurity. Your summary should address the following:
    A description of current uses of AI across the government and other sectors. Include specific use cases for cybersecurity.
    Describe the strengths, weaknesses, opportunities and threats (SWOT) for using AI in general and specifically for cybersecurity.
    Discuss and make specific recommendations on how you could apply the AI RMF framework and associated playbook to AI applications you are considering or might consider in the future to be implemented.
    Summarize you paper in a short conclusion section.
    Provide all associated references using APA style
    See the following resources for information about writing and citing academic work.
    https://libguides.umgc.edu/gethelp/writing-citing  
    https://www.umgc.edu/current-students/learning-resources/writing-center/online-guide-to-writing/tutorial

  • Title: “Utilizing Mixed Methods Approach in Investigating the Impact of [Topic] on [Target Population] in [Location]: A Case Study Using IEEE Referencing Format” Introduction: The purpose of this dissertation is to investigate the impact of

    I want you to help me write my dissertation, it should be 17,000 words in IEEE Referencing format. I can provide you with my dissertation proposal as well as any other thing you might need.
    There is no specific software or coding required for the dissertation, data to be used based on the dissertation is secondary it should be mixed with quantitative, and qualitative.
    The referencing format is (IEEE Format)  

  • Title: The Role of the Private Sector in Preparedness for Attacks

    Should the private sector be proactively involved in all phases of preparedness for attack avoidance (either physically or cyber-based) or should the private sector act solely as a resource when called upon by the public/government sector? Why, or why not.    200 words

  • “Exploring the Impact of Social Media on Mental Health: A Critical Analysis”

    Please view attachment for instructions
    Also, I included the slim part I wrote and cited but I wont have time to form this with the work overload 

  • “Malware Analysis using Cuckoo Sandbox: Feature Extraction and Selection on a Large-Scale Dataset”

    1- Donwload academic Malware dataset i will provide
    2- Install Cuckoo sandbox on your PC
    3-Feed almost 4000 malware to Cuckoo sandbox
    4-Feature extraction of 4000 malware
    5-Feature selection of 4000 malware 
    6-Provide CSV file
    if you can do this at the price listed , contact me

  • “Exploring Data Backup and Data Archiving: A Comparative Analysis of Approaches and Considerations” Introduction: Data backup and data archiving are crucial processes in ensuring the security and accessibility of data in any organization. While both involve storing data

    Please upload a .pdf file containing your
    answers to the following exercises. Please use professional-grade formatting
    and organization (e.g., use headings and text styling, bullets and numbering,
    etc. when appropriate).
    Week 2
    Assignment
    Write
    a short paper (1 to 2 pages) comparing and contrasting the various approaches
    to data backup and data archiving.  What are appropriate considerations
    with respect to cost, recovery time, and protection against various
    threats.  Make sure to cite all references. 
    In
    this assignment, demonstrate that you can think deeply about the topics that we
    are covering.  Therefore, if you find yourself simply regurgitating
    material from the readings, then you are likely missing the point.  The
    readings (and the reading quizzes) deal with a lot of terms and definitions.
    In this homework assignment, try and tie those terms and definitions
    together, think about them more holistically, and reason about the
    relationships between them. 
    Your
    submission should be written in paragraph form with an introductory paragraph,
    at least a paragraph covering each incident, and a conclusion.  Your
    descriptions should be full sentences and not just bullet-points
    Lecture notes transcript included below to help if needed.

  • “Recommendations for a Secure Software Architecture and Engineering Model for [Organization Name]: A Comprehensive Analysis of Key Security Models and Rationale for Selection”

    Using what you have learned and researched about security architecture and engineering in this module, conduct in-depth independent research to learn more about the topic using the course materials and readings as a springboard. You will draft a memo recommending your approach for a security architecture and engineering model for the organization that you have been working with throughout the course.
    Software Architecture and Engineering Models Memorandum:
    Address your memo to your CEO and leadership, with coordination through the CIO. This memo will educate leadership on the importance of making the right software security decisions for the organization, so the memo will describe the software landscape and its applicability to the current needs of your organization.
    The 5-7 page memorandum should accomplish the following:
    Start by first researching the various security models, identifying key features, weaknesses, and targeted sectors and/or infrastructures. Then develop a short summary for each of the security models listed below and others that your research may uncover:
    Bell-LaPadula
    Biba’s Strict Integrity Policy
    Clark-Wilson
    Chinese Wall
    Clinical Information Systems Security
    Noninterference Security
    Deducibility Security
    Graham-Denning
    Begin your memo with a short summary for each model, including a descriptive and evaluative paragraph with the following attributes:
    The origins of the model- Who developed it? When was it developed? What was the context under which it was developed?
    Main characteristics of the model- Details on the business, sector, and/or industry for whom the model was developed
    Key features of the model
    Weaknesses of the model
    Targeted sectors/infrastructures
    The summaries for each of the security models will complement your final memo and will document the security models and their attributes, providing support for your recommended approach that you illustrate in your memo. 
    Please be sure to focus 2-3 pages on the reason for your model selection and the rationale.  
    Your submission should include a cover page, abstract,  introduction, and conclusion with scholarly references in APA format at the end. Information on APA formatting

  • Title: Evaluation and Improvement of a Penetration Testing Engagement Plan for Western View Hospital

    Write an evaluation of the penetration testing engagement plan by doing the following:
    A.  Evaluate the alignment between Western View Hospital’s goals, objectives, functions, processes, and practices and the penetration testing engagement plan by doing the following:
    1.  Describe the client’s goals, objectives, functions, processes, and practices.
    2.  Describe the structure of the penetration testing engagement plan (e.g., scope, test type, approach, technique).
    3.  Identify any potential misalignments between the penetration testing engagement plan and the company’s goals, objectives, functions, processes, and practices.
    B.  Evaluate the penetration testing engagement plan by doing the following:
    1.  Identify best practices and frameworks for a penetration testing engagement plan designed to meet Western View Hospital’s requirements.
    2.  Compare the penetration testing engagement plan to the best practices and frameworks identified in part B1.
    C.  Propose potential improvements and solutions to problems identified in the penetration testing engagement plan by doing the following:
    1.  Give at least  two specific recommendations for improvements to the penetration testing engagement plan.
    2.  Give at least  two specific examples of solutions to problems you identified in the penetration testing engagement plan.
    Note: Problems can include misalignments between the plan and the client’s goals, inappropriately applied frameworks, or failure to use industry best practices.
    D.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
    E.  Demonstrate professional communication in the content and presentation of your submission.

  • Title: Cybersecurity Test Questions and Case Studies in Texas

    1.I need 20 test questions from a PowerPoint I will upload. on a separate document.
    2. add some cyber attack examples(school, health system, police department) in Texas after slide 20. you can add videos too. add a side note(paragraph) at the bottom for each slide added. and the summary would be on the slide. about 3-4 slides.