Category: Cyber Security

  • 5 Jblearning labs I will provide the info and username

    I have 5 labs to complete on jblearning.com lab 2 4 5 6 and 7 I will provide log in info

  • assignmet-1

    • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
    • It is your responsibility to check and make sure that you have uploaded both the correct files.
    • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).
    • Email submission will not be accepted.
    • You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
    • You must use this template, failing which will result in zero mark.
    • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
    • Late submission will result in ZERO mark.
    • The work should be your own, copying from students or other resources will result in ZERO mark.

    Use Times New Roman font for all your answers

  • do home work

    Just complete it according to the requirements. You may use AI, but you must rephrase the content in your own words.

  • do home work

    Just complete it according to the requirements. You may use AI, but you must rephrase the content in your own words.

  • do home work

    Just complete it according to the requirements.

  • The company’s IT director has shared the following concerns.

    You have been hired as a consultant to evaluate a medium-sized financial services company’s network architecture. The company has experienced significant growth and is concerned about both performance bottlenecks and security vulnerabilities. Currently, they operate a primarily flat network with basic segmentation between client-facing and internal systems.

    The company’s IT director has shared the following concerns:

    • Network traffic congestion during peak business hours
    • Difficulty implementing consistent security policies across departments
    • Challenges in meeting compliance requirements for financial data protection
    • Limited visibility into network traffic patterns and potential threats
    • Concerns about the network’s ability to scale with continued business growth

    Discussion Questions:

    1. What architectural changes would you recommend to balance performance, scalability, and security needs? Consider specific network segmentation strategies, security frameworks, and infrastructure components that would address the company’s concerns.
    2. How would you prioritize these recommendations based on the specific financial industry requirements? Think about regulatory compliance, data protection standards, and business continuity needs that are critical in financial services.
    3. .What potential challenges or trade-offs might arise when implementing these changes, and how would you address them? Consider factors such as implementation costs, staff training requirements, and potential disruption to business operations.
    1. (250 words) addressing all three discussion questions
    2. Demonstrates clear understanding of network architecture principles
    3. Shows consideration of financial industry requirements and constraints
    4. Uses appropriate technical terminology and concept
  • Cyber Security Question

    Imagine you work for a 60-employee company that performs forensic investigations of employees’ use of company equipment (usually computers and mobile devices). The company has seven different U.S. federal agencies as its only clients and generally works directly with their human resources department. Many of these agencies must complete annual risk assessments of their IT infrastructure and will investigate random employees every year. They will also investigate employees that they think might be misusing organizational resources. You work in their IT department with three other individuals (IT department head, hardware specialist, and software specialist). You mainly work on risk assessments and educating the company employees on how to keep the IT systems safe. You also serve as the incident response manager.

    One major risk you have been worried about is malware. It can be embedded in almost any file, from a photo to a PDF document, and has caused IT issues a few times this year. While it is important for forensic investigators to be able to search for malware within a file using the latest forensic techniques, it is also important for your forensic investigators not to infect your companys computers when they are investigating malware.

    You have decided to conduct a malware investigation safely and share the results with your companys investigators.

    Complete the following steps:

    1. Select a PDF file, a Microsoft Office file, and a third file of your choosing that is not a PDF or Microsoft Office file
    2. Identify static malware analysis software tools you will need and install them, if needed. You can use online tools such as malwaretracker.com, malwr.com, or virustotal.com.
    3. Identify safety precautions you need to take to keep your computer free from malware
    4. For this assignment, you will consider the files as having a high risk of containing malware. Perform static analysis on the file that should include the following steps:
    5. Search for hidden code or programs.
    6. Search for PE headers.
    7. Search for potentially malicious strings.
    8. Search for linked libraries.
    9. When relevant, review or disassemble the code.

    Write a 1- to 2-page report on the potential risk of malware in the three files and how the investigators should handle malware when investigating it. Your report should do the following:

    • Document the important aspects of output from any software used.
    • Document all suspicious elements of the file and any suspicious aspects of the code, which could include DLLs, packages, or strings.
    • Describe each files risk level for containing malware.
    • Describe how you were able to perform the malware investigation while minimizing the risk of infecting company computers.
    • Recommend steps investigators should take to reduce the risk of malware exposure at the company.
  • what is meant by cyber safety / security

    when a computer is connected with outside would through a public network like internet important using. in cyber safety & security.