Categories
Cyber Security

please help me to answer these questions ASAP 1- Human Error through Social Eng

please help me to answer these questions ASAP
1- Human Error through Social Engineering is accountable for all data loss?
2-What are technical recovery requirements?
3-What are business recovery requirements?

Categories
Cyber Security

Blockchain Case Study Use references Use existing case studies Every case stu

Blockchain Case Study
Use references
Use existing case studies
Every case study has a page limit of 1
Attempt all questions
Refer marking guidelines
In recent years many small to large industries are transforming their process to more innovative technologies like Blockchain and Automation. The use of Blockchain has been slowing growing despite its complexity and low awareness. Though the use of Blockchain technology can enhance multi-party data exchange and secure data processing, the maturity of such implementations is limited. There are different sectors like Supply Chain, Health, Energy and Legal invested in Blockchain technology to enhance transparency, increase speed and reduce cost of transfers.
In this assessment, you need to identify at least 3 blockchain case studies from different industries (like Supply chain, Energy, Finance, Healthcare, etc..) and write in your own words following sections. 1. What is the core business of the company you identified? (5 marks)
2. What are the business challenges faced by identified company? (5 marks)
3. What are the benefits and advantages gained by the company after implementation of Blockchain

Categories
Cyber Security

You are an attorney who practices International Law. Your coworkers know nothing

You are an attorney who practices International Law. Your coworkers know nothing about cyber law so your boss asks you to make a short guide to education them.
Using the United States as one reference point and another country (see list below of choices) as the other reference point, discuss the similarities and differences between the two in the following areas of cybersecurity law

Categories
Cyber Security

Task 1: Visit dev.maxmind.com/geoip/geoip2/geolite2/ and download MaxMind GeoLit

Task 1: Visit dev.maxmind.com/geoip/geoip2/geolite2/ and download MaxMind GeoLite2 database (.mmdb) files. You need to unzip to see the .mmdb files
Task 2: Import the MaxMind GeoLite2 database into Wireshark (Check review contents above for instructions)
Task 3:Download this file and perform earth location analysis using Wireshark and MaxMind GeoLite2 mapping database
GeoIPMapping.pcapng is a capture pcap file. You will need this file for your analysis.
Deliverable/Submission
This assignment requires you to submit screenshots to ensure you have completed the steps. All screen captures must include time-stamps (date and time) and titles. You need to submit your report on canvas. Provide results of your command outputs. Delivery must include the map and number of IP addresses located in different locations.
Question: Which countries are included on the map (provide names of the location and artifacts to back it up).

Categories
Cyber Security

Hello, Please write a paper as per given guidelines in word document brief guid

Hello,
Please write a paper as per given guidelines in word document brief guidelines mentioned in attached PDF document
Assignment 1: Cyber Attack Case Study
PART 1 Technical Analysis ::
Assessment task details – provide a description of the task
The WannaCry Ransomware attack was an impactful cyber attack that had worldwide effect and repercussions. This attack spread through computers running Microsoft operating systems, encrypting the data and demanding a bitcoin ransom for the decryption key.
This attack has been a prevalent driving force behind much of the changing public perception of Cyber Security and gave raise to many policy changes both within governmental and organisational approach to cyber security
In this assignment you are tasked with investigating the WannaCry attack looking at the initial stages of the Cyber Kill chain to analyse how the attack took place from a technical standpoint and should consider the following elements:
Introduction
A technical overview of the attack,
Weaponization
How was this weapon created at a technical level and what was the deliverable payload?
Delivery & Propagation
How did the attacker gain access to the system?
What tools and techniques were used by the attacker?
How did the attack propagate to other systems?
Exploitation & Installation
How did the payload exploit the system?
Conclusions
Summarise your technical findings and draw conclusions on the impact of the attack on infected systems.

Categories
Cyber Security

Assignment Details Your individual project for this unit has you researching and

Assignment Details
Your individual project for this unit has you researching and applying your knowledge of digital evidence volatility, and the order of volatility.
With the identification and preservation of the physical and digital evidence completed the incident response team must now enter the data collection phase. During the data collection phase, the investigative team must collect volatile evidence first, and non-volatile second. For each of the four items in the list below (SSD, Virtual Memory, CPU Cache, and Printout), perform the following three actions (Ch. 14-15):
Identify if they are volatile and non-volatile, and their correct order of volatility
Explain the importance of the order of volatility
Describe the methods to both collect and analyze at least two types of evidence from this list.
List:
SSD
Virtual Memory
CPU Cache
Printout
Save the document with your name, course, and unit number.

Categories
Cyber Security

You are an attorney who practices International Law. Your coworkers know nothing

You are an attorney who practices International Law. Your coworkers know nothing about cyber law so your boss asks you to make a short guide to education them.
Using the United States as one reference point and another country (see list below of choices) as the other reference point, discuss the similarities and differences between the two in the following areas of cybersecurity law

Categories
Cyber Security

Hide Assignment Information Instructions If you haven’t already done so last wee

Hide Assignment Information
Instructions
If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.
The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.
Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.
On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.
How Will My Work Be Evaluated?
Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.
For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.3.5: Adhere to required attribution and citation standards.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
2.1.1: Identify the issue or problem under consideration.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
13.1.1: Create documentation appropriate to the stakeholder.
When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.

Categories
Cyber Security

Provide enough details so your peers understand the situation and risk strategy employed.

Compare risk strategies and explain a situation in your work or school life where you applied risk strategies.
Provide enough details so your peers understand the situation and risk strategy employed.

Categories
Cyber Security

Research paper

Case Study Link: attached as a file below
This is the case study you will write your Research Paper on:
BAE Automated Systems (A): Denver International Airport Baggage-Handling System
Lynda M. Applegate, Ramiro Montealegre, H. James Nelson, Carin-Isabel Knoop The case investigates the events surrounding the construction of the BAE baggage-handling system at the Denver International Airport. It looks specifically at project management, including decisions regarding budget, scheduling, and the overall management structure. Also examines the airport’s attempt to work with a great number of outside contractors, including BAE, and coordinate them into a productive whole, while under considerable political pressures. Approaches the project from the point of view of BAE’s management, which struggles to fulfill its contract, work well with project management and other contractors, and deal with supply, scheduling, and engineering difficulties.
Research Paper
Structure and Format: write a paper of a least 2,200 words (excluding citations) based on the topic below. The assignment will be submitted as a Word document adhering to the APA style guide (Title Page, Abstract, Citations in the paper and at end). All submissions will include your first name last name (not my name) in the file name, i.e., Sam Smith IT343 Final Paper It is mandatory that you provide 4 or MORE citations within the paper in addition to the citations at the end of the paper. Do not cite items that are not relevant, i.e., not used in the paper. You do not have to provide any citations for class lecture material. Double spaced is a MUST Specific Instructions For the Case Study: BAE Automated Systems (A)
Your paper starts on page 10 of the case study with the phrase.. “In April 1992, BAE was awarded the $175.6 million contract to build the entire airport system.”
YOU WILL BE THE PROJECT MANAGER starting on this fateful day. The paper should identify the major issues described in the case, and key decisions to be made by the project manager to set up and run a successful project. Include the following: circumstances, major issues, your approach to addressing those issues, and tools or techniques you would implement. The majority of the paper should be devoted to your action plan and decisions based on the case, the text, and your RESEARCH. The requirement is that the student seeks to understand how, as a project manager, you would react to the case situation. Grading Rubric
The bulk of the grade will be allocated to how well you have succeeded in describing your action plans and decisions. A portion of the grade will be reserved for how much care has been taken in preparing the paper.
SafeAssign: I understand that when writing a research paper, there are times when you will be quoting and taking work from another source. However, should your paper show more than 30% Overall Match in SafeAssign AND you do not have adequate source allocation, Don’t have a paper completely made up of quotes. If you comply with these guidelines, you’ll be OK. Rubric Weighting: Structure/Format 10% Organization of paper & file named correctly
Edits/Spelling 10% Grammar
Citations 5% Number, Relevance, APA format (in paper and at end) Style 5% Professional-level Writing
Facts 20% Use of case fact set
Analysis 25% Option Selected and Impact on PM
PM Approach 25% Level of Detail
Minimum Length Reduction of assignment grade
SAMPLE PAPER OUTLINE
Introduction/Abstract
Fact Set (bulleted set of facts related to the case study)
Problem Identification (5, 6, or 7 issues in order of impact or importance in the case study)
Analysis – give your opinion of what processes you’d implement as a PM, how those processes would be implemented, and stating key assumptions; MOST CRITICAL PART (example key assumption: I expect that the company would pay for any training I need the team members to take to ensure they are up to speed on the latest technology – don’t put this one in your paper).
Lessons Learned
Conclusion
Citations (4 or more)