Category: Cyber Security

  • Cyber ThreatRiskAttack Landscape Survey

    Assignment 1: Cyber ThreatRiskAttack Landscape Survey

    Weight: 20%

    Assessment Type: Survey

    Format: Individual Assignment

    Description:

    In this assignment, you are required to research and analyze and conduct in-depth survey of the current cyber threatriskattack landscape, exploring the evolving nature of cybersecurity challenges faced by organizations today. You need to focus on cyber threat landscape from a global, GCC and UAE perspective that

    changes both over time and has significant impact on the organization and the internetworked users (IU).

    The objective is to examine and critically assess how risks, threats, and attacks interrelate, and how they shape business vulnerabilities in various industries and what organizations are doing to protect themselves.

    You are expected to:

    Part A: Identify at least 10 real-world examples of cyber incidents from recent years, analyze their causes and impacts, and evaluate the broader trends these cases reveal. The analysis should include specific discussion of:

    Risk: The potential for loss or damage to assets, systems, or data.

    Threat: The actors, vectors, and conditions that could exploit vulnerabilities.

    Attack: Specific incidents or actions taken to compromise confidentiality, integrity, or availability.

    Identify and analyze the emergence and discovery of threats and the associated vulnerabilities that

    provide cybercriminals with new attack opportunities (pre covid and post covid).

    Part B: Review and comment on current best practices and strategies organizations employ for risk mitigation, including frameworks, technologies, and governance approaches. Identify the global events such as the COVID-19 pandemic compelling organizations to make major changes to their IT infrastructure.

    Deliverable:

    A comprehensive written report (~2,000 words) that:

    (Use this report template)

    1. Explains the relationship between risk, threat, and attack in the cybersecurity context.
    2. Provides at least three detailed case studies from recent real-world incidents.
    3. Identifies patterns and trends in the current cyber landscape.
    4. Discusses the effectiveness of current industry/business best practices for risk mitigation.

    Assignment Evaluation Criteria:

    Depth and clarity of analysis.

    Relevance and credibility of cited examples.

    Integration of theory with real-world evidence.

    Critical evaluation of mitigation strategies.

    Report structure, writing quality, and citation of sources (APA format).

    Assignment Information

    Length:

    2000

    Weight:

    20%

    Requirements: 2000

  • Cyber Security Question

    View pdf pls

    Requirements: As needed

  • Explore protocols related to network services and end-to-end…

    For this assignment:

    Explore the basic ideas behind data networks and examine how they make our internet and digital connections work smoothly and securely.

    Explain the main principles and technologies that make sure our information travels safely.

    Include the maintenance the privacy and accuracy of our data in today’s network systems.

    Use scholarly sources to support your findings.

    Length: This assignment must be 4-6 pages (excluding the title and reference pages).

    References: Include 3 scholarly resources.

    Requirements: 3 – 4 pages

  • Cyber threat intelligence

    Im looking for an experienced cybersecurity researcher to produce a professional threat-intelligence analysis of a single Advanced Persistent Threat (APT) group, delivered as one Word document and one PowerPoint presentation.

    The work should be written originally, in the authors own words, with a clear, human writing style suitable for a professional audience.

    Scope & Requirements:

    • Analyze one APT group in depth
    • Cover:
      • Threat actor profile (persona)
      • Victims and targeting patterns
      • Infrastructure
      • Tools, techniques, and procedures (TTPs)
    • Apply:
      • Diamond Model of Intrusion Analysis
      • Lockheed Martin Cyber Kill Chain
    • Use at least three (3) full industry threat-intelligence reports from reputable vendors (e.g., major security firms)
    • Include proper in-text citations with specific page numbers
    • Provide a final sources/works citedsection
    • Ensure the content is consistent across the Word document and PowerPoint
    • Follow a clear, logical structure and professional formatting

    Materials Provided:

    • Two example files (one Word, one PowerPoint) to follow for structure, depth, and formatting

    Deliverables:

    • One well-written Word document (narrative analysis)
    • One concise PowerPoint deck (briefing format)

    Attention to detail, accuracy, and professional presentation are critical.

    Integrity & AI Usage:

    • All content must be original and written in the authors own words (pass AI detection)
    • No copying/pasting
    • paraphrasing, or reuse of existing reports beyond properly cited references
    • Work should be produced without generative AI content creation
    • Accuracy, transparency, and professional research ethics are required

    Requirements: Complete | C

  • Cyber Threat Intelligence Research & Analysis (Word + Po…

    Im looking for an experienced cybersecurity researcher to produce a professional threat-intelligence analysis of a single Advanced Persistent Threat (APT) group, delivered as one Word document and one PowerPoint presentation.

    The work should be written originally, in the authors own words, with a clear, human writing style suitable for a professional audience.

    Scope & Requirements:

    • Analyze one APT group in depth
    • Cover:
      • Threat actor profile (persona)
      • Victims and targeting patterns
      • Infrastructure
      • Tools, techniques, and procedures (TTPs)
    • Apply:
      • Diamond Model of Intrusion Analysis
      • Lockheed Martin Cyber Kill Chain
    • Use at least three (3) full industry threat-intelligence reports from reputable vendors (e.g., major security firms)
    • Include proper in-text citations with specific page numbers
    • Provide a final sources/works cited section
    • Ensure the content is consistent across the Word document and PowerPoint
    • Follow a clear, logical structure and professional formatting

    Materials Provided:

    • Two example files (one Word, one PowerPoint) to follow for structure, depth, and formatting

    Deliverables:

    • One well-written Word document (narrative analysis)
    • One concise PowerPoint deck (briefing format)

    Attention to detail, accuracy, and professional presentation are critical.

    Integrity & AI Usage:

    • All content must be original and written in the authors own words (pass AI detection)
    • No copying/pasting
    • paraphrasing, or reuse of existing reports beyond properly cited references
    • Work should be produced without generative AI content creation
    • Accuracy, transparency, and professional research ethics are required

    Requirements: Word doc + ppt (pdf or ppt file)

  • HLSC710: Contemporary Issues in Cyber Security and WMD (CBRN…

    You will post one thread of at least 500- 1000 words. For each thread, you must support their assertions with at least 2 scholarly citations in APA format. Each reply must incorporate at least 2 scholarly citations in APA format. Acceptable sources include the textbook, peer-reviewed journal articles, government sources, professional association websites, etc. Each original discussion will also require a biblical reference/quote (which is not a part of the original source count). Each discuusion mush have between one to two bible reference.

    Requirements: 2 PAGE

  • HLSC720: Critical Infrastructure: Vulnerability Analysis and…

    You will post one thread of at least 500- 1000 words. Foreach thread, you must support their assertions with at least 2 scholarlycitations in APA format. Each reply must incorporate at least 2 scholarlycitations in APA format. Acceptable sources include the textbook, peer-reviewedjournal articles, government sources, professional association websites, etc.Each original discussion will also require a biblical reference/quote (which isnot a part of the original source count). Each discuusion mush have between oneto two bible reference.

    Requirements: 2 PAGE

  • Cyber Security Question

    This assignment focuses on developing and understanding the full lifecycle of cybersecurity policiesfrom initial drafting to long-term maintenance and review.

    Requirements:

    1. Identify and explain the key components of a policy (300400 words).
      • Purpose
      • Scope
      • Policy statements
      • Roles and responsibilities
      • Enforcement and sanctions
    2. Describe the end-to-end policy creation process (300400 words).
      • Drafting
      • Stakeholder review
      • Approval workflow
      • Publication and dissemination
      • Identify audiences and participants for each stage
    3. Explain the review and update lifecycle (300400 words).
      • Recommended review frequencies
      • Sources of guidance (e.g., NIST SP 800-53, organizational governance)
      • How policies evolve with technology and regulatory changes

    Submission Expectations:

    • Professional tone and structure
    • APA 7 references
    • Clear explanation of lifecycle processes

    Requirements: Follow the syllabus

  • M4.2 Bonus SQL problems

    M4.2: Practice Problems

    Name:

    Instructions:

    These SQL practice problems are designed as a skill-building journey, progressing from foundational queries to more advanced problems that will help you prepare for the Final Exam. When using Generative AItools, you are required to follow this e on how to use GenAI tools to learn SQL coding responsibly.

    Each SQL practice problem is worth 1 bonus point.

    For each problem:

      • Write and execute an SQL query in Oracle Live SQL.
      • Execute the following command: SELECT sysdate, ‘your name’ FROM dual; where your_name is substituted with your name.
      • Take a screenshot that includes both SQL statements and all results.
      • Copy and paste the screenshot into a Word file containing your solutions.

    In addition, after completing this assignment, include a short overall reflection on your experience using ChatGPT (or another generative AI tool) to support your SQL learning. Answer the following questions:

    • When was AI most useful or effective, and when did you find it less helpful or potentially misleading?
    • How did you decide whether to trust, revise, or reject AI-generated SQL?
    • What would you do differently the next time you use AI to support your SQL work?

    Practice Problems: Basic SQL SELECT Statements

      1. Display all data contained in one of the tables in the JustLee Books database.
      2. Retrieve two columns from one of the tables in the JustLee Books database.
      3. Retrieve several columns from one of the tables in the JustLee Books database. Use an alias for one of the columns.
      4. Retrieve several columns from one of the tables in the JustLee Books database. Use an alias that contains blank space(s) for one of the columns.
      5. Find a table in the JustLe Books database that contains duplicate values in one of the columns. Retrieve that column but list each value only once.
      6. Retrieve data from two character columns from one of the tables in the JustLee Books database and display the result in a single column with a descriptive heading. Values in the output should be separated by a comma and a blank space.
      7. Find a table in the JustLe Books database that contains numerical values in one of the columns. Retrieve that column and perform a basic arithmetic operation on data.
      8. Find a table in the JustLe Books database that contains numerical values in one of the columns. Retrieve that column and increase each value by 10%. Display the original value and the new value with descriptive headings in the output.
      9. Create a mailing list of all customers stored in the CUSTOMERS table. Create a mailing list from the CUSTOMERS table. The mailing list should display the name, address, city, state, and zip code for each customer. Each customers name should be listed in order of last name followed by first name, separated with a comma, and have the column header Name. The city and state should be listed as one column of output, with the values separated by a comma and the column header Location.
      10. Calculate a list of the percentage of profit generated by each book in the BOOKS table. To determine the percentage of profit for a particular item, subtract the items cost from the retail price to calculate the dollar amount of profit, and then divide the profit by the items cost. The solution is then multiplied by 100 to determine the profit percentage for each book. Use a SELECT statement to display each books title and percentage of profit. For the column displaying the percentage markup, use Profit % as the column heading.

    Requirements: Answers completely | Assembly Language

  • M4.2 Bonus SQL problems

    M4.2: Practice Problems

    Name:

    Instructions:

    These SQL practice problems are designed as a skill-building journey, progressing from foundational queries to more advanced problems that will help you prepare for the Final Exam. When using Generative AItools, you are required to follow this e on how to use GenAI tools to learn SQL coding responsibly.

    Each SQL practice problem is worth 1 bonus point.

    For each problem:

      • Write and execute an SQL query in Oracle Live SQL.
      • Execute the following command: SELECT sysdate, ‘your name’ FROM dual; where your_name is substituted with your name.
      • Take a screenshot that includes both SQL statements and all results.
      • Copy and paste the screenshot into a Word file containing your solutions.

    In addition, after completing this assignment, include a short overall reflection on your experience using ChatGPT (or another generative AI tool) to support your SQL learning. Answer the following questions:

    • When was AI most useful or effective, and when did you find it less helpful or potentially misleading?
    • How did you decide whether to trust, revise, or reject AI-generated SQL?
    • What would you do differently the next time you use AI to support your SQL work?

    Practice Problems: Basic SQL SELECT Statements

      1. Display all data contained in one of the tables in the JustLee Books database.
      2. Retrieve two columns from one of the tables in the JustLee Books database.
      3. Retrieve several columns from one of the tables in the JustLee Books database. Use an alias for one of the columns.
      4. Retrieve several columns from one of the tables in the JustLee Books database. Use an alias that contains blank space(s) for one of the columns.
      5. Find a table in the JustLe Books database that contains duplicate values in one of the columns. Retrieve that column but list each value only once.
      6. Retrieve data from two character columns from one of the tables in the JustLee Books database and display the result in a single column with a descriptive heading. Values in the output should be separated by a comma and a blank space.
      7. Find a table in the JustLe Books database that contains numerical values in one of the columns. Retrieve that column and perform a basic arithmetic operation on data.
      8. Find a table in the JustLe Books database that contains numerical values in one of the columns. Retrieve that column and increase each value by 10%. Display the original value and the new value with descriptive headings in the output.
      9. Create a mailing list of all customers stored in the CUSTOMERS table. Create a mailing list from the CUSTOMERS table. The mailing list should display the name, address, city, state, and zip code for each customer. Each customers name should be listed in order of last name followed by first name, separated with a comma, and have the column header Name. The city and state should be listed as one column of output, with the values separated by a comma and the column header Location.
      10. Calculate a list of the percentage of profit generated by each book in the BOOKS table. To determine the percentage of profit for a particular item, subtract the items cost from the retail price to calculate the dollar amount of profit, and then divide the profit by the items cost. The solution is then multiplied by 100 to determine the profit percentage for each book. Use a SELECT statement to display each books title and percentage of profit. For the column displaying the percentage markup, use Profit % as the column heading.

    Requirements: Just follow each parts