Category: Cyber Security

  • cyb 310 project two 6-2

    Requirements: see rubric plz

  • cyb 310 project one 6-1

    SEE RUBRIC PLZ

    Open the CYB 310 Sandbox environment and click on the GNS3 icon. Open the Project One file to complete the assignment. username: mohmand.hussaini@snhu.edu password: Urbangray2025

    Requirements: see rubric plz

  • cyb 400 module 6 activity

    Requirements: 1-2 pages see rubric plz

  • cyb 400 discussion post with 2 replies to peers

    Consider this scenario: Management has been proud that sensitive customer information stored in company systems has never been accessed by an unauthorized party. This is a major bragging point with the chief technology officer (CTO). Your supervisor reports directly to the CTO and is always trying to please them. You are responsible for ensuring that this data remains secure.

    Sensitive data is stored in a database protected by technical and administrative controls. A scheduled audit report reveals a vulnerability that could be exploited. However, there is no immediate evidence of an adversarial presence or unusual internal traffic. In looking into this matter, you find that a technical control is out of date. You missed installing a patch.

    While the company has an incident response plan, invoking that will call for a team response. Does this apparently unexploited vulnerability rise to the level of an incident? With a simple upgrade, the system should be secure.

    What should you do and why?

    In your initial response, select and defend a course of action. You may consider the following possibilities or craft one of your own:

    • Fix the issue and don’t tell anyone. There’s no reason to make a big deal of this minor event.
    • Fix the issue and explain to management that there was a problem. They need to know.
    • Don’t fix it. Start by reporting the issue internally. Follow the incident response plan.
    • Turn this matter over to a colleague for decisions and action; you may be caught up in the investigation and should avoid any conflict of interest.

    In response to your peers, play the part of a trusted colleague who wants to give advice. What would you ask or advise in considering your colleague’s decision?

    Requirements: discussion post

  • Cyber Security Question

    Requirements: Just answered

  • Cyber Security Question

    Background -Company Overview

    You have just been hired as Director of Compliance for a large, publicly tradedhealth insurance company named “Green Sword, Purple Armor” (GSPA).

    GSPA is a leading health insurance and managed healthcare provider in Illinois and has the following aspects to consider:

    • Only provides services to Illinois, Wisconsin and Indiana residents.
    • Offices located in Chicago, Milwaukee, Indianapolis, Springfield (IL) and Schaumburg.
    • About 1000 employees in Illinois.
    • Publicly traded on Nasdaq.
    • Revenue of $2.5 Billions in 2019.
    • Net profits of $500 Millions in 2019.
    • Allows its customers to pay for their deductibles via all major credit cards

      Part 1: Determine compliance requirements Based on the overview presented above, research and document the major laws, regulations or industry standards that GSPA must comply with. You should be able to identify at least 3 major compliance requirements. Document these compliance requirements and justify why GSPA need/should comply.

    • Part 2: Security controls requirements table. Based on the compliance requirements identified in step one, create a table or an XLS spreadsheet that lists all the security controls that you should implement and document the section(s) from the compliance/standards/laws that refer to the control. Also mention if mandatory or optional. Your table/XLS may look like this:

    #

    Control Name

    CIP v5

    French Regulation 123

    Polar Laws

    Yet Another Industry

    1

    Firewall protect French People

    N/A

    Part 1, paragraph12 Required

    Law #45,b

    N/A

    2

    Encrypt critical data

    CIP xxx page 123

    NA

    NA

    Page 44

    3

    …etc…

    • Make sure that you group similar controls for different regulations together even if names are different. For example, one compliance requirement would be to “filter packet” while another may refer to “firewall”
    • Part 3: Explain the controls For each of the control, write a few lines explaining the controls and how they apply for each regulation Also if you feel other controls, not required should be in place, please include them here and describe them in more details.

    Part 4: Recommendation for Implementation

    Please present your plan for implementing these control and prioritize the implementation based on what you think is most critical. Assume that no controls are currently in place.

    Requirements: 4 pages

  • Asymmetric Cryptography and Algorithmic

    1. Encryption
    2. Decryption
    3. Digital Signature
    4. Compare the two algorithms in terms of key size and speed of encryption/Decryption.

    Requirements: Just done

  • evaluate risk using both qualitative and quantitative method…

    This assignment is designed to help you apply core cybersecurity risk assessment techniques used in real-worldenvironments. You will evaluate risk using both qualitative and quantitative methods commonly employed bycybersecurity professionals.

    1. CVSS-Based Vulnerability Risk Assessment
    2. Quantitative Risk Assessment Using ALE

    Requirements: in-depth guide with all details

  • Cyber ThreatRiskAttack Landscape Survey

    Assessment Type: Survey

    Format: Individual Assignment

    Description:

    In this assignment, you are required to research and analyze and conduct in-depth survey of the current cyber threatriskattack landscape, exploring the evolving nature of cybersecurity challenges faced by organizations today. You need to focus on cyber threat landscape from a global, GCC and UAE perspective that

    changes both over time and has significant impact on the organization and the internetworked users (IU).

    The objective is to examine and critically assess how risks, threats, and attacks interrelate, and how they shape business vulnerabilities in various industries and what organizations are doing to protect themselves.

    You are expected to:

    Part A: Identify at least 10 real-world examples of cyber incidents from recent years, analyze their causes and impacts, and evaluate the broader trends these cases reveal. The analysis should include specific discussion of:

    Risk: The potential for loss or damage to assets, systems, or data.

    Threat: The actors, vectors, and conditions that could exploit vulnerabilities.

    Attack: Specific incidents or actions taken to compromise confidentiality, integrity, or availability.

    Identify and analyze the emergence and discovery of threats and the associated vulnerabilities that

    provide cybercriminals with new attack opportunities (pre covid and post covid).

    Part B: Review and comment on current best practices and strategies organizations employ for risk mitigation, including frameworks, technologies, and governance approaches. Identify the global events such as the COVID-19 pandemic compelling organizations to make major changes to their IT infrastructure.

    Deliverable:

    A comprehensive written report (~2,000 words) that:

    (Use this report template)

    1. Explains the relationship between risk, threat, and attack in the cybersecurity context.
    2. Provides at least three detailed case studies from recent real-world incidents.
    3. Identifies patterns and trends in the current cyber landscape.
    4. Discusses the effectiveness of current industry/business best practices for risk mitigation.

    Assignment Evaluation Criteria:

    Depth and clarity of analysis.

    Relevance and credibility of cited examples.

    Integration of theory with real-world evidence.

    Critical evaluation of mitigation strategies.

    Report structure, writing quality, and citation of sources (APA format).

    Assignment Information

    Length:

    2000

    Weight:

    20%

    Learning Outcomes Added

    • : Assess information security vulnerabilities, threats, and risks, for developing an appropriate risk management strategy.

    Requirements: 2000

  • Cyber Security Question

    Write a 1- to 2-page report comparing different versions of Linux operating systems that does the following:

    • Compares at least three different versions of Linux operating systems
    • Examines changes in major system functions
    • Examines changes in management of volatile data
    • Examines changes in security such as encryption and biometrics
    • Discusses aspects of each version of the operating system that can be challenging to forensic investigators and reasons why

    Requirements: 1-2 page