Category: Cyber Security

  • cyb 400 project 5-1

    see rubric… Using your analysis from your Project One Milestone assignment, you will now make your remediation recommendations.

    Requirements: see rubric plz

  • cyb 310 5-3 project

    see rubric plz

    Requirements: see rubric plz

  • cyb 310 5-2 activity

    see rubric plz

    Requirements: see rubric plz

  • CYB 310 LAB 5-1

    (INFOSEC)

    • Closing Ports and Unnecessary Services

    username: mhussaini

    password: Urbangray100$

    Requirements: see rubric plz

  • cist1001 savannah tech evaluating hardware

    1. Game Devices: Use the web to research three popular recent game consoles. Choose five characteristics to compare the game consoles, such as Internet capabilities, multiplayer game support, storage capacity, television connection, and game controllers. Write your report in paragraph form and do not copy charts or lists.

    Requirements: 1-2 pgs

  • IAS 5015 FUNDS AND CRYPTOGRAPGHY

    This is week 4 Discussion post

    Research a recent (within the last two years) specific case, or speak from your own personal or professional experience, of a significant security breach that involved compromising a network or host firewall implementation in a computing environment.

    Discuss the following:

    • Attack vectors and techniques used to carry out the attack.
    • Probable motivation of the attacker.
    • How the incident was detected.
    • Steps taken to mitigate the effects of the attack.

    Requirements: well, explanatory

  • CYBR 520 Human Aspects of Cybersecurity

    Peer Review Template:

    REVIEWER NAME: [Your Name]
    REVIEWEE NAME: [Classmate’s Name]

    1. STRENGTHS (Required – minimum 100 words)
    What aspects of this phishing campaign plan are most effective? Consider target
    audience selection, psychological principles applied, and potential effectiveness.

    2. SUGGESTIONS (Required – minimum 100 words)
    What specific improvements would make this campaign more effective? Offer at
    least two concrete suggestions.

    3. ETHICAL CONSIDERATIONS (Required – minimum 75 words)
    Comment on the ethical aspects of this campaign. Is it appropriately educational
    without being harmful?

    4. TECHNICAL ELEMENTS (Required – minimum 75 words)
    Evaluate the technical aspects of the proposed phishing approach. Are there any
    technical considerations the creator should address?

    5. OVERALL RATING
    On a scale of 1-5 (5 being highest), how would you rate this plan? [ ]

    Briefly explain your rating: [2-3 sentences]

    Requirements: see above

  • Macintosh (Mac) Operating System Versions Report

    Write a 1- to 2-page report comparing different versions of Macintosh operating systems that does the following:

    • Compares at least three different versions of Macintosh operating systems
    • Examines changes in major system functions
    • Examines changes in management of volatile data
    • Examines changes in security such as encryption and biometrics
    • Discusses aspects of each version of the operating system that can be challenging to forensic investigators and reasons why

    Requirements: 1-2 page

  • IAS 5015 NETWORK AND FUNDS

    Requirements: WELL EXPLANATORY   |   .doc file