Category: Cyber Security

  • cyb 310 module 4 lab

    You will need to access these labs in the InfoSec environment:

    -Identifying & Analyzing Network Host Intrusion Detection System Alerts

    -Intrusion Detection using Snort

    username: mohmand.hussaini@snhu.edu

    password: Urbangray2025$

    you will be working on the worksheet below i atttached

    Requirements: see rubric plz

  • cyb 310 discussion post with 2 replies to peers

    see rubric plz

    Requirements: see rubric plz

  • What is the use of compiler in C language?

    What is the of compiler in C language

    Requirements: C++

  • Advanced Cybersecurity Framework Design for a High-Risk Indu…

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Objective:

    Students will create a fully customized cybersecurity framework tailored for a specific, high-risk

    industry.

    This will require in-depth research, synthesis of learned concepts, and practical application of NIST

    CSF and MITRE ATT&CK.

    Scenario:

    You are a cybersecurity consultant tasked with developing a cybersecurity framework for a niche

    industry.

    Choose one of the following industries:

    1. Maritime Shipping and Logistics

    2. Smart Agriculture Systems (e.g., IoT in farming)

    Your client recently suffered a data breach and ransomware attack targeting their critical operations.

    Develop a comprehensive cybersecurity plan based on the tasks below.

    Assignment Tasks

    Part 1: Industry Analysis (Research and Manual Data Collection)

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Requirements:

    1. Research the chosen industry.

    – Describe its unique cybersecurity challenges and risks.

    – Include at least three real-world incidents affecting this industry. Cite original sources.

    2. Summarize findings.

    – Compile your research findings into a concise 2-page report.

    Part 2: Framework Design

    Requirements:

    1. Develop a NIST CSF-Based Plan

    – Using the NIST Cybersecurity Framework, create a customized plan addressing your chosen

    industry’s specific risks.

    – Include four specific actions under each function: Identify, Protect, Detect, Respond, and

    Recover.

    2. Analyze MITRE ATT&CK Tactics

    – Choose three real-world attack techniques from MITRE ATT&CK relevant to your industry.

    – Describe the tactic, vulnerabilities it exploits, and countermeasures using NIST CSF functions.

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    3. Create Manual Flow Diagrams

    – Create a manually-drawn or custom visual representation of the framework.

    Part 3: Incident Simulation and Playbook Development

    Requirements:

    1. Simulate a Cybersecurity Incident

    – Create a fictional incident scenario specific to your chosen industry.

    2. Develop an Incident Response Playbook

    – Write a step-by-step playbook for responding to the incident.

    Part 4: Report and Reflection

    Requirements:

    1. Create a Comprehensive Report

    – Include sections for industry analysis, framework design, incident simulation, and the response

    playbook.

    2. Reflection

    – Describe challenges and lessons learned while tailoring the framework for your industry.

    Submission Guidelines:

    – Format: Submit a single PDF document including your research, visuals, and diagrams.

    – Plagiarism Policy: Use of AI tools, templates, or pre-written content is strictly prohibited.

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Grading Rubric (100 Points)

    – Part 1: Industry Analysis and Research (20 points)

    – Part 2: Framework Design (30 points)

    – Part 3: Incident Simulation and Playbook (30 points)

    – Part 4: Report and Reflection (20 points)

    Demonstrate creativity, critical thinking, and original work.

    I have a sample assignment. get me one for any of the above topic.

    Requirements: answer all questions | Typescript

  • Windows Operating System Versions APA Report

    Write a 1- to 2-page report comparing different versions of Windows operating systems that does the following:

    • Compares at least 3 different versions of Windows operating systems
    • Examines changes in major system functions
    • Examines changes in management of volatile data
    • Examines changes in security such as encryption and biometrics
    • Discusses aspects of each version of the operating system that can be challenging to forensic investigators and why that is

    Format your paper according to APA guidelines.

    Requirements: 1-2 page Report

  • Advanvced Cybersecurity Framework Design for a High-Risk Ind…

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Objective:

    Students will create a fully customized cybersecurity framework tailored for a specific, high-risk

    industry.

    This will require in-depth research, synthesis of learned concepts, and practical application of NIST

    CSF and MITRE ATT&CK.

    Scenario:

    You are a cybersecurity consultant tasked with developing a cybersecurity framework for a niche

    industry.

    Choose one of the following industries:

    1. Maritime Shipping and Logistics

    2. Healthcare IoT Device Manufacturers

    3. Smart Agriculture Systems (e.g., IoT in farming)

    Your client recently suffered a data breach and ransomware attack targeting their critical operations.

    Develop a comprehensive cybersecurity plan based on the tasks below.

    Assignment Tasks

    Part 1: Industry Analysis (Research and Manual Data Collection)

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Requirements:

    1. Research the chosen industry.

    – Describe its unique cybersecurity challenges and risks.

    – Include at least three real-world incidents affecting this industry. Cite original sources.

    2. Summarize findings.

    – Compile your research findings into a concise 2-page report.

    Part 2: Framework Design

    Requirements:

    1. Develop a NIST CSF-Based Plan

    – Using the NIST Cybersecurity Framework, create a customized plan addressing your chosen

    industry’s specific risks.

    – Include four specific actions under each function: Identify, Protect, Detect, Respond, and

    Recover.

    2. Analyze MITRE ATT&CK Tactics

    – Choose three real-world attack techniques from MITRE ATT&CK relevant to your industry.

    – Describe the tactic, vulnerabilities it exploits, and countermeasures using NIST CSF functions.

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    3. Create Manual Flow Diagrams

    – Create a manually-drawn or custom visual representation of the framework.

    Part 3: Incident Simulation and Playbook Development

    Requirements:

    1. Simulate a Cybersecurity Incident

    – Create a fictional incident scenario specific to your chosen industry.

    2. Develop an Incident Response Playbook

    – Write a step-by-step playbook for responding to the incident.

    Part 4: Report and Reflection

    Requirements:

    1. Create a Comprehensive Report

    – Include sections for industry analysis, framework design, incident simulation, and the response

    playbook.

    2. Reflection

    – Describe challenges and lessons learned while tailoring the framework for your industry.

    Submission Guidelines:

    – Format: Submit a single PDF document including your research, visuals, and diagrams.

    – Plagiarism Policy: Use of AI tools, templates, or pre-written content is strictly prohibited.

    Advanced Cybersecurity Framework Design for a High-Risk Industry

    Grading Rubric (100 Points)

    – Part 1: Industry Analysis and Research (20 points)

    – Part 2: Framework Design (30 points)

    – Part 3: Incident Simulation and Playbook (30 points)

    – Part 4: Report and Reflection (20 points)

    Demonstrate creativity, critical thinking, and original work.

  • cyb 400 journal entry

    First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.

    Auditing plays a critical role in ensuring the security and efficiency of computing environments. Inherent complexities and vulnerabilities within the infrastructures leave the potential for unauthorized access, data breaches, and performance bottlenecks.

    Describe why auditing each of these environments (User, Workstation, and LAN) is essential for identifying and mitigating security risks, optimizing network performance, and ensuring compliance with regulatory standards.Submit journal assignments as Word documents with double spacing, 12-point Times New Roman font, and one-inch margins. Responses should be at least two paragraphs long and address the points indicated in the journal prompt for each module.

    Requirements: see above (2 paragraphs)

  • explains the importance of critical infrastructure protectio…

    Hide Assignment Information

    Turnitin

    This assignment will be submitted to Turnitin.

    Instructions

    Assignment Directions:

    This position paper will require students to critically analyze how security risks are aligned with the nation’s critical infrastructures and examine the asset types, functions, and regulatory structures that correlate to the Department of Homeland Security’s (DHS) policies.

    For this Assignment, complete the following steps:

    • Download the to write your paper.
    • Locate sources to aid in writing your paper.
    • Write a position paper that addresses the following:
      • Introduction that explains the importance of critical infrastructure protection within the context of homeland security.
      • Discuss the various types of security risks and how they align with the nation’s critical infrastructures, referencing the National Infrastructure Protection Plan and at least one other government document.
      • Examine the nation’s critical infrastructures, including asset types and functions.
      • Analyze the regulatory structures that correlate to DHSs policies.
      • Conclude with a synthesis of how these elements interact to form a cohesive homeland security strategy.

    Submission Instructions:

    • Your paper must be at a minimum of 3-5 pages (the Title and Reference pages do not count towards the minimum requirement).
    • Scholarly and credible references should be used. At least six (6) scholarly articles are required for this Assignment.
    • Scholarly sources include peer-reviewed articles, government publications, and academic texts.
    • Type in Times New Roman, 12-point, and double space.
    • Studentswill follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
    • Points will be deducted for using Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
    • Use the Template that is provided to develop this Assignment.
    • All submissions will be graded using the Assignment rubric.

    Be sure to review the following prior to submitting your Assignment:

    • Assignment Rubric
      • If you do not see the rubric, select Course Tools in the blue horizontal navigation bar and then Assignments. Select the appropriate Assignment, and the rubric will be located near the bottom of the page.

    This Assignment aligns with the following:

    • Course Objectives:
    • Learning Objectives:

    Assignment Resources & Supports

    • and : Provides information on how to cite in proper APA format.
    • : Provides an example paper with annotations.
    • : Watch this 3-minute video if you need guidance on submitting your Assignment.

    Requirements: 7 pages