Category Archives: Computer science : Cybersecurity

It is not possible for an organization to completely safeguard all of its assets

It is not possible for an organization to completely safeguard all of its assets at all times. There are limitations on resources, a balance between security and usability, and many other considerations.
Respond to the following questions:
How would you evaluate critical infrastructure within an organization to determine if it is susceptible to computer crime?
Who should be involved in the evaluation? Specify the designations or job responsibilities.
What factors should be taken into account when evaluating infrastructure for exposure to computer crime?

read article and discuss…How do you feel about data being collected about you

read article and discuss…How do you feel about data being collected about you when you allow apps to access your location? Do you know how that data is being used–is your individual data being recorded, or are a number of individuals’ data collected and used “aggregately”? Do you know if that data is being sold to other parties with or without your consent? Do the advantages of collecting these data (such as for COVID-19 research) outweigh the disadvantages?

Congratulations! You’ve completed CYS 526 and have hopefully learned skills that

Congratulations! You’ve completed CYS 526 and have hopefully learned skills that will take you through your degree and beyond. For our final reflection, consider the Course Outcomes below.  Select two of the outcomes and write a short paragraph on each. Your paragraphs should detail the evidence that you’ve met the outcome and how this accomplishment furthers your career goals.
CO1: Evaluate common cyberattacks and prioritize threats to IT organizations.
CO2: Construct cyber defenses against prevalent cyber-attacks.
CO3: Implementing vulnerability management and incident response processes.
CO4: Apply cyber defense analysis skills in real-world scenarios.
CO5: Evaluate the importance of secure software practices and security architectures.

Introduction Your organization is experiencing a data breach that has comprised

Introduction
Your organization is experiencing a data breach that has comprised systems internationally and you must pull together resources to effectively and efficiently return your organization to normal. Communication and centralization of efforts will be key. The wrong move can cost your company dearly or even can lead to the company being shut down due to regulatory fines, reputational damage, as well as lawsuits.
This is phase two of a multifaceted attack. In this assignment, you will learn during this exercise to actively respond to the scenario as if it were an actual attack and to interact with other functional areas that would also be impacted by the security incident.
The Scenario: OZCO Data Breach – INJECT
You now have what we call an “INJECT” into this scenario which throws a few wrinkles into it just as in the real world you can’t account for every move your attacker will make. An “INJECT” provides you with a changing environment and forces you to critically think about your next move and how to achieve the goal of returning your organization to normal operations.
You return to your laptop to now find demands that display on your computer screen below!
OZCO Customer & Employee PII For Sale. You are owned by “the void.” You have 48 hours to respond or your data will be sold!! Threat actor requests 35 bitcoins ($1,231,293.00) and sends a list of sample PII to validate this claim.
To further complicate matters, you’ve just gotten off a call with the VP of Marketing who’s heard about the data breach and requests a full debriefing. You have approximately 24 hours to pull together a PowerPoint that states whether or not there’s been a data breach, your reasons for your decision, and the actions you propose to return the organization to normal.  Please see detailed instructions for your PowerPoint below.
Instructions
Your PowerPoint should consist of between 12-18 slides that address the scenario above. Please include your international locations when constructing your systems, plans, process, and procedures and address the following elements:
Preparation: What systems, plans, processes, and procedures should be in place to detect this threat?
Detection: What systems, plans, processes, and procedures will allow you to detect these threats more efficiently?
Containment: What systems, plans, processes, and procedures should be in place to contain the threat?
Eradication: What systems, plans, processes, and procedures should be in place to remove the threat?
Recovery: What systems, plans, processes, and procedures should be in place to return your organization to normal?
Follow-up: What did we do right? What did we do wrong? What can we do better?
In addition to the above, the PowerPoint should include slides that cover the following:
A mock call tree for the incident response team and their backups if they cannot be reached that includes backup response team members and their numbers.
Information on whether your global company policy will adhere to the extorted demands of the attacker requesting money. “Remember they have your data!” Why will you pay? Why not?
The scope and whether this incident classifies as a global data breach, what severity level has it reached (Critical, Medium, Low) your reasons for your decision, and the actions you propose to return the global organization to normal. Be mindful of possible third-party partners and external legal resources.
The gaps in the plan and how can they be addressed. Remember your company has international concerns!
Any missed questions from Phase I to allow you to experience constructing a more efficient global plan and process going forward to be leveraged in the next Preparation phase of the IRP revision.

Answer all the questions. Number the answers. Answer the questions using your ow

Answer all the questions. Number the answers. Answer the questions using your own words based on the lessons learned. It is your own answer and analysis, and the use of any external resource and references is not allowed. Each question carries an equal number of points. There is no word or page limit but the total duration for answering the question is expected not to exceed three hours. In other words, if a student were to take this exam in the classroom then the exam would end in three hours. The questions can be adequately answered in less than three hours. The answer for each question could range between half a page and 1 page (there is no need to exceed 1 page to answer a single question).
Submit a single document (PDF, or Microsoft Word) with your answers. Use double spaced, 12 font, standard margin.
Question 1.
Explain the differences between the open web, the deep web, and the dark web, and how they affect the business/organizations.
The answer for this question could range between half a page and 1 page.
Question 2.
Explain three browser security settings and their benefits.
Question 3.
Describe what meta-data is and its role in social media sites.
Question 4.
Explain the differences between the micro and macro data set with reference to social media sites.
Question 5.
Explain three network security settings and their benefits.
Question 6.
Explain three database security settings and their benefits.
Question 7.
Explain three server security settings and their benefits.
Question 8.
Explain three software security settings and their benefits.
Question 9.
Explain three concerns with cryptocurrency and ways to address them.
Question 10.
Explain three uses to your professional/personal life that you will find based on the lessons learned from this class.

Answer the questions below: After reading the Morelli and Giguere article, do yo

Answer the questions below:
After reading the Morelli and Giguere article, do you see any research flaws in their study? Briefly explain.
Del Fresno et al. suggest that there is a strong similarity between the diffusion of disease and diffusion of ideas through social networks. Is this an accurate portrayal? Why or why not? Make references to the article.
According to Moreno et al., what is the difference between interactive research and observational research on social media?
Following links below:
Reid, A. A., Tayebi, M. A., & Frank, R. (2013). Exploring the structural characteristics of social networks in a large criminal court database. 2013 IEEE International Conference on Intelligence and Security Informatics, 209-214.
Del Fresno García, M., Daly, A. J., & Segado Sánchez-Cabezudo, S. (2016). Identifying the new Influences in the Internet Era: Social Media and Social Network Analysis.  Revista Española de Investigaciones Sociologicas, (153).
Moreno, M. A., Goniu, N., Moreno, P. S., & Diekema, D. (2013). Ethics of social media research: common concerns and practical considerations.  Cyberpsychology, Behavior, and Social Networking, 16(9), 708-713.
MORSELLI, C., & GIGUERE, C. (2006). Legitimate strengths in criminal networks  . Crime, Law & Social Change, 45, 185-200. Retrieved October 25, 2018,

Hide Assignment Information Instructions o Download the attached MS Word documen

Hide Assignment Information
Instructions
o Download the attached MS Word document below for this week’s assignment.
o Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last  name_Assignment #5).  Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a  minimum of 2 outside sources. Please be sure to follow APA guideline
o Upload your submission to this assignment.
o Assignments are due by 11:59 p.m. Eastern Time on Sunday.