Research in Information Security (Cyber security/blockchain)

 You should review two papers that are presented in class. You will be expected to voice your opinion of the paper during the discussion phase of the presentation. You must use the form below and the review should be at most 2 page (single side). For the grading in your review imagine that we are making […]

Cyber Warfare

 We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in […]

Government and the Cyber Sector

 Respond to each Individual Project Week 1 Individual Project – Overview of Cybersecurity Today The Executive Branch has inherent responsibilities to protect the nation and national infrastructure, including cyber networks and systems as well as the information that transits or is stored on that infrastructure. The theory of national policy-making is complicated, but it is […]

Homeland Security: CYBER SECURITY THREATS

There are many examples of failures in cybersecurity including the Stuxnet computer virus interfering with the Iranian uranium enrichment process; Wall Street (NASDAQ); and Identity Theft from banks and on-line retailers and corporations. What are some of the measures that can be employed to protect our banking, defense and critical infrastructure from cyber-assault?   —————– […]

CYBER SECURITY: Either DDOS or Ransomware.

1- Choose just one topic from Telstra report: either DDOS or Ransomware. Having two will not bring extra points. Better to choose one and explain better. 2- Excluding Chapters 1 and 2, the rest is all about the Cybersecurity! As I explained in the class, whole report should be dedicated to the chosen topic (either […]

Cyber Security Term Paper Instructions

The IT Risk Management Subcommittee of your corporate Enterprise Risk Committee is struggling to manage cyber risk in your organization and has requested information regarding the possibility of automating some or all of the process. Your manager has confirmed that there are technical tools that can support most risk management and compliance activities. The subcommittee […]

Explain in some detail its contents and relevancy to Cyber Security

Cyber Security and Mass Transportation Create a Reference List for Cyber Security and Mass Transportation of 10 or more scholarly sources including reports, studies, and-or manuals. Please avoid non-scholarly sources such as Wikipedia, newspaper articles, and blogs. 5 are already included for the 10 that are needed. Explain in some detail its contents and relevancy […]

Cyber Security

Cyber Security Term Paper Assignment/Requirements The IT Risk Management Subcommittee of your corporate Enterprise Risk Committee is struggling to manage cyber risk in your organization and has requested information regarding the possibility of automating some or all of the process. Your manager has confirmed that there are technical tools that can support most risk management […]

Cyber loafing

 https://mycstate.cincinnatistate.edu/webapps/Bb-McGrawHill-bb_bb60/app/link/launchAssignment?course_id=_140273_1&content_id=_6988187_1 For this week’s case, watch the above video about cyberloafing. Pick a side and examine the issue presented in the case using the Ethical Decision Making Process outlined in the text. You can refer back to chapters two and three if you need a reminder. The case response should be at least a seven […]