Categories
Telecommunications Engineering homework help

I included my outline previously written with the topic:  “Advanced Techniques f

I included my outline previously written with the topic:
 “Advanced Techniques for Cybercrime Analysis: Identifying and Mitigating Emerging Threats” 
Assignment Instructions:
By this time, you would have selected a topic and provided a proposal outline for your thesis or creative project of which must align with your core subject area.
Please use the Capstone Manual.  
The formal proposal must provide a clear and lucid description of a question, project or problem and a proposed method of answering the question, addressing the project or solving the problem. 
Proposal drafting is considered a learning process and helps you avoid oversights and possible mistakes; so you may send me a draft before going final. 
Again, guidance on the format of the proposal and a sample proposal are contained in the Capstone Manual provided. 
The proposal should explain the question, project, or problem to be investigated and convince the professor that the question, project or problem merits investigation. It should show that you have read the relevant and recent literature on the subject and it should contain a list of materials consulted during the preliminary stages of your research or project. In general, the research proposal or project should include background information related to the research topic or project, purpose of the thesis or project, and investigatory procedures to be used. 
The formal proposal should not exceed five (5) pages (proposal title page not included).  
Please add a table of contents.

Categories
Telecommunications Engineering homework help

Week 3 Discussion – Cybersecurity Policy Design Issues For your initial post, di

Week 3 Discussion – Cybersecurity Policy Design Issues
For your initial post, discuss the topics below.  Respond to posts by other students
Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security through business resilience and Continuity of Operations Planning
Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures.  Do you agree or disagree that businesses should protect national security by expanding their cybersecurity budget to prevent or reduce the effects of possible Cascade Failures that may affect their business and other downstream businesses that may depend on them?  Justify your answer.

Categories
Telecommunications Engineering homework help

Week 3 Discussion – Cybersecurity Policy Design Issues For your initial post, di

Week 3 Discussion – Cybersecurity Policy Design Issues
For your initial post, discuss the topics below.  Respond to posts by other students
Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security through business resilience and Continuity of Operations Planning
Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures.  Do you agree or disagree that businesses should protect national security by expanding their cybersecurity budget to prevent or reduce the effects of possible Cascade Failures that may affect their business and other downstream businesses that may depend on them?  Justify your answer.

Categories
Telecommunications Engineering homework help

TOPIC/THESIS AND OUTLINE RUBRIC Description: During Week 2, each student submit

TOPIC/THESIS AND OUTLINE RUBRIC
Description: During Week 2, each student submit a Topic/Thesis Proposal and Draft Outline. The instructor will Approve, Reject or Conditionally Approve pending further information. This exercise will be worth 10% and is necessary for the student to continue onto the paper development phase of the course.
The topic I chose is Advanced Cybercrime Analysis.
Submission Instructions: Submit your completed paper in Word.docx format.
Sample Paper posted for help with format.

Categories
Telecommunications Engineering homework help

Critical Infrastructures – Discuss cybersecurity policy issues affecting SCADA

Critical Infrastructures –
Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect traditional corporate office systems – why should there be a difference in priority order for Confidentiality, Integrity, and Availability?  View the suggested background sources below. 
2.  Discuss and compare security policy issues for Electric utilities, Oil Gas pipelines, traditional banking and alternative currencies, such as Bitcoin.  Use the Internet to find some examples for recent cybersecurity issues seen by these industries.

Categories
Telecommunications Engineering homework help

Consider jobs that require a solid understanding of basic computing, computer st

Consider jobs that require a solid understanding of basic computing, computer storage, and processing speeds as part of an information technology degree. Put yourself in the position of the hiring manager and think about what you would expect as competent responses from an applicant:
Briefly explain the four main parts of a computer system information.

Provide an example of each.

Managing data efficiently requires having sufficient processing speed, paired with the appropriate amount of memory and storage space. Briefly explain what you would recommend for an IT professional to have for their laptop’s memory, storage, and processor.
Your first post should be on or before Saturday and a minimum of 100 words. Include a link to any site you used to help you respond to the question. Make sure you respond substantively to at least two classmates.

Categories
Telecommunications Engineering homework help

Journalists and others sometimes mix phrases for cybersecurity concepts.  The pu

Journalists and others sometimes mix phrases for cybersecurity concepts.  The public can pick up these misnomers,  resulting in confusion.  Confusion during meetings between technology practitioners and management wastes time that could otherwise be useful to make progress toward solving a problem (perhaps some of you have sat through a frustrating first half of a meeting where this disconnect was gradually discovered by those present).  Some basic vocabulary definitions must be reinforced for cybersecurity practitioners to reduce the confusion that can creep into conversations and meetings.  Please write about these concepts listed below and support your definitions and discussions with reference sources that do not confuse the definitions. 
For your initial post, discuss the two topics below.  Respond to posts from other students.
Define and differentiate Vulnerability, Risk, and Threat
Define the term “Zero-Day Exploit”.  Discuss some recent examples where one or two ZDEs were used to bypass cybersecurity controls to open a hole in vulnerable Critical Infrastructures, SCADA systems, or Industrial Control Systems (ICS) so malicious code could enter to cause disruptive effects.  Describe how ZDEs can possibly be used by nation states, criminals, and political extremists.
Background Resources
Wk 1 – Zero Day Exploit.pdf
Zero Day Exploit (source)
Wk 1 – Critical Infrastructure Security and Industrial Control Systems.pdf
Critical Infrastructure Security and Industrial Control Systems (source)

Categories
Telecommunications Engineering homework help

Judge the efficiencies (or lack thereof) of the current regulatory and policy ne

Judge the efficiencies (or lack thereof) of the current regulatory and policy net neutrality system that affects Americans usage of the internet.  You will evaluate net neutrality through the lens of comparing and contrasting at least two such legal authorities. 

Categories
Telecommunications Engineering homework help

Choose one of this course’s substantive weekly topics, then explain how and why

Choose one of this course’s substantive weekly topics, then explain how and why the current cybersecurity-related statutes, regulations and policies related to your chosen topic developed as they did.  Based on what you have learned in this course, offer your observations as to whether these laws and policies should change to better fit the cybersecurity environment within the foreseeable future. 
Topic:
Cybersecurity and Criminal Law

Categories
Telecommunications Engineering homework help

Instructions From within the range of general cybersecurity topics discussed in

Instructions
From within the range of general cybersecurity topics discussed in this course, choose one narrow legal and/or ethical topic that adversely affects the general public in some way(s). Create a publish statute or regulation or policy that offers new ideas to better address the legal and/or ethical issues that currently hamper your selected topic by adversely affecting the general public. Within 10 – 12 pages, address all of the following:
Identification of the current statute or regulation or policy that underlies your selected topic;
Analysis of the legal and/or ethical challenges to your selected topic;
Presentation of your new proposed statute or regulation or policy that better addresses the legal and/or ethical challenges to your selected topic, along with an analysis that justifies your proposal (share both pros and cons for your proposal); and
Summary of all of the above for your conclusion.
NOTES:
1. All submissions must be DOUBLE-SPACED, in Microsoft Word, with one inch margins and 12 point font (Times New Roman).
2. When you submit your assignment, a Turnitin Originality Report will be automatically generated. This functionality has been set so that you can receive an Originality Report each time that you submit your assignment. [I strongly recommend that you submit it (perhaps several times, depending upon how you write) several times before this assignment is due. That way, you can use the Originality Reports for your earlier publishs as a tool to ensure that you will not have any potential plagiarism issues with your final publish, which will be graded.]
3. Ensure that you write formally and use proper grammar, spelling and citations (in footnotes, not endnotes).
4. You may use one quotation of less than 50 words in length to present the existing statute, regulation or policy that will form the basis for the rest of this assignment.
5. Proofread your paper several times to ensure that you have no errors and to ensure that your paper flows well and is well organized so that your thoughts flow neatly from one idea to the next.
Please let me know if you have any questions.