Category: Cybersecurity

  • Assignment1

    Scenario: Migrating On-Prem Infrastructure to a SASE Solution

    Your company has rapidly adopted cloud services, remote work, and third-party platforms to improve efficiency and accessibility. Employees, contractors, and partners now access systems from home networks, personal devices, and public locations. Sensitive data flows through collaboration tools, web applications, and SaaS platforms every day.

    As part of a security review and planning, you have been asked to assess network infrastructure based on the current network profile and prepare a technical report to modernize a companys traditional on-premises infrastructure by migrating it to a SASE (Secure Access Service Edge) solution.

    You must assess SASE-related security concerns associated with everyday digital activities in your company. These concerns may relate to identity and access management, data protection, secure web access, cloud application usage, network visibility, third-party risk, and compliance.

    Attached Files (PDF/DOCX): IET_Technical_Report_Writing_Guidelines.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Security Posture Failure Analysis and Improvement Plan

    Follow these guidelines for the structure of your research paper:

    • Length: 2-3 pages, excluding the title page and references, 12-point standard font (Times New Roman) and in APA format
    • Critical Requirement: Select ONE documented security breach from the provided list (see below). Your entire analysis must be based on publicly available credible information about the breach. You must analyze failures across all three security posture pillars (Technology, Process, People).
    • Select ONE breach from the following list:
    1. Equifax Data Breach (2017) – Unpatched Apache Struts vulnerability, 147 million records compromised
    2. Colonial Pipeline Ransomware Attack (2021) – Compromised VPN credentials, operational shutdown
    3. Target Data Breach (2013) – HVAC vendor compromise leading to 40 million payment cards stolen
    4. MOVEit Transfer Vulnerability (2023) – SQL injection zero-day affecting 2,000+ organizations
    5. MGM Resorts Ransomware Attack (2023) – Social engineering leading to $100M+ in losses
    • The paper should be broken down into the following sections (you should have three subsections in your paper with the following subsection titles):
    1. Breach Overview and Attack Analysis: Provide a comprehensive overview of the breach including: (a) timeline of events (initial compromise, discovery, disclosure), (b) attack vector and techniques used by the adversaries, (c) scope and impact (systems compromised, data stolen, financial losses, operational disruption), (d) attribution if known (threat actor group, suspected nation-state, cybercriminal organization), (e) immediate response actions taken by the organization. Use specific details from official incident reports, regulatory filings, or investigative analyses. Create a timeline graphic or detailed chronology of key events.
    2. Security Posture Failure Analysis: Analyze what security posture weaknesses enabled the breach across all three pillars. For EACH pillar, you must identify and explain specific failures:
    • Technology Failures: Identify at least 2 technology-related weaknesses (e.g., unpatched systems, lack of network segmentation, insufficient monitoring, missing security tools, misconfigured access controls, inadequate encryption).
    • Process Failures: Identify at least 2 process-related weaknesses (e.g., missing policies, inadequate vulnerability management, poor change control, insufficient vendor oversight, weak incident response procedures, lack of security testing).
    • People Failures: Identify at least 2 human-related weaknesses (e.g., inadequate security training, successful phishing, excessive privileges, insider threats, security culture issues, insufficient staffing).
    • For each identified failure, explain specifically how it contributed to the breach’s success. Support your analysis with evidence from post-incident reports.
    1. Prevention and Improvement Plan: Develop a comprehensive security improvement plan that addresses the failures identified in Section 2. For EACH pillar, propose specific, actionable improvements. Prioritize your recommendations (critical/high/medium priority) and explain the rationale for prioritization.
    2. Conclusion: Summarize the key findings of your research.
    3. References: Cite all references using APA style. You need to use at least three recent, credible references.
  • (Depends on the work of the article, but CHINESE LANGUAGE ON…

    This paper MUST be written in Simplified Chinese. Do not provide an English version.

    Template that meets specific journal requirements (I will provide)

    Choose some of the follow-up work mentioned in this article below to conduct in-depth research and experiments.

    “Secure and Efficient Distributed Matrix Multiplication Based on Polynomial Coding”.

    ()

    Article structure requirements:

    Abstract.

    1. INTRODUCTION
    2. RELATED WORKS
    3. CONCLUSION

    References.

    Rigorous deduction proof, algorithm step diagram, protocol flowchart, and reliable experimental data (in the form of charts) are required.

    Attached Files (PDF/DOCX): Secure and Efficient Distributed Matrix Multiplication Based on Polynomial Coding.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • (Depends on the work of the article)

    Choose some of the follow-up work mentioned in this article below to conduct in-depth research and experiments.

    “Secure and Efficient Distributed Matrix Multiplication Based on Polynomial Coding”.

    ()

    Article structure requirements:

    Abstract.

    1. INTRODUCTION
    2. RELATED WORKS
    3. CONCLUSION

    References.

    Rigorous deduction proof, algorithm step diagram, protocol flowchart, and reliable experimental data (in the form of charts) are required.

    Attached Files (PDF/DOCX): Secure and Efficient Distributed Matrix Multiplication Based on Polynomial Coding.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Final Paper Assignment

    Final Paper Assignment

    The paper objective is to develop a comprehensive understanding of an ethical issue in AI and propose a

    solution with supporting information.

    1. Choose one of the suggested topics or propose your own (with instructor approval).
    2. Conduct extensive research using academic and reputable sources.
    3. Write a 10-12 page paper discussing the chosen topic, its implications, and potential solutions.
    4. Include at least 10 citations from academic or reputable sources.
    5. Submit your paper via the ULTRA course portal by the due date.

    Suggested Topics:

    • Ethical implications of AI in healthcare
    • AI and autonomous weapons
    • The role of AI in social media and misinformation
    • Ethical considerations in AI-driven financial systems

    The future of AI and human-AI collaboration

    Formatting Guidelines:

    1. Use 12-point Times New Roman font, double-spaced.
    2. Include a title page with your name, course, and date.
    3. Use APA citation (or Chicago) style for references.
    4. Proofread your paper for grammar and clarity.
  • IT Capstone Proposal

    Edit the IT proposal to meet the competency on the Rubric Provided. Below are the issues identified that need correction.

    Overall Evaluator Comments:

    The project demonstrated a strong understanding of centralized security monitoring by explaining how decentralized logs prevent detection of lateral movement and delay identification of ransomware activity in the cclinic’sWindows and Microsoft 365 environment. Please see the comments for information about aspects that need further development.

    A1. PROBLEM SUMMARY

    Approaching Competence: The problem summary is incomplete or illogical. Or the summary does not include the context in which the problem exists. Or the summary lacks supporting details.

    Evaluator Comments:

    The submission rightly includes a discussion on the problem summary, including context and supporting details. The summary of the problem is incomplete or illogical.

    A2. IT SOLUTION

    Approaching Competence: The proposed IT solution would not feasibly solve the problem summarized in part A1. Or the proposal lacks supporting details that describe the relationship between the problem and the proposed solution.

    Evaluator Comments:

    The explanation accurately explains how the proposed IT solution addresses the identified problem. The proposal lacks supporting details that describe the relationship between the problem and the proposed solution.

    A3. IMPLEMENTATION PLAN

    Approaching Competence: The implementation plan description is incomplete or not related to the proposed solution in part A2. Or specific steps are not included. Or who will be implementing the plan is not included.

    Evaluator Comments:

    The submission includes a description of the implementation plan related to the proposed solution. Specific steps are not included.

    A3a. JUSTIFICATION OF PLAN

    Approaching Competence. The justification does not address why the implementation plan from part A3 is appropriate for the IT solution in part A2, or whether it is not feasible.

    Evaluator Comments:

    The submission rightly explains why the implementation plan is appropriate for the IT solution. The justification does not address why the implementation plan from part A3 is appropriate for the IT solution in part A2.

    B. REVIEW OF OTHER WORKS

    Approaching Competence: The summary of 4 works is provided, but one or more of the works are not related to the topic of the proposed project. Or a summary of only 13 works is provided. Or the summary is inaccurate.

    Evaluator Comments:

    The submission includes an apt summary of four works related to the proposed project topic. The summary of 4 works is provided, but one or more of the works are not related to the topic of the proposed project.

    B1. WORKS INFORMING DESIGN

    Approaching CompetenceThe description of how each of the 4 works summarized in part B is incomplete or not related to the design. Or a description of only 13 works is provided.

    Evaluator Comments:

    The explanation accurately explains how each of the four works informed the pproposal’sdesign. The description of how each of the 4 works summarized in part B is incomplete or not related to the design.

    C. PROJECT RATIONALE

    Approaching Competence

    Approaching Competence: The justification does not address the need of the proposed project or is not feasible.

    Evaluator Comments: Attempt 1

    The project rationale is provided. The justification does not address the need for the proposed project.

    D. CURRENT PROJECT ENVIRONMENT

    Approaching Competence: The justification of how the proposed solution in part A2 aligns with the current organizational culture, environment, and strategy is incomplete. Or the justification is not related to the proposed solution in part A2.

    Evaluator Comments:

    Alignment with the current organizational environment and strategy is evident. The justification of how the proposed solution in part A2 aligns with the current organizational culture, environment, and strategy is incomplete.

    E. METHODOLOGY

    Approaching Competence

    Approaching Competence: The explanation of how a standard methodology will be used to implement the project is incomplete. Or a description of the specific steps are not included. Or the described steps are not related to the standard methodology.

    Evaluator Comments:

    The submission rightly includes a discussion on the standard methodology used to implement the project. A description of the specific steps are not included.

    F1. RELATIONSHIP TABLE

    Approaching Competence: The provided table does not demonstrate the relationship between each goal and its supporting objectives and deliverables from part F1. Or the demonstrated relationship is inaccurate.

    Evaluator Comments:

    The submission includes a table that demonstrates the relationship among goals, objectives, and deliverables. The demonstrated relationship is inaccurate.

    F2. GOALS, OBJECTIVES, AND DELIVERABLES

    Approaching Competence: The described goals, objectives, and deliverables are not related to the project. Or each goal does not have at least 2 objectives, or each objective does not have at least 1 deliverable.

    Evaluator Comments:

    Goals, objectives, and deliverables are correctly discussed. No goal has at least 2 objectives.

    G. PROJECT TIMELINE WITH MILESTONES

    Approaching Competence: The estimated timeline is not feasible for the project. Or the timeline does not include either future dates, milestones, duration, or start and end dates for each milestone.

    Evaluator Comments:

    The submission rightly highlights a project timeline with milestones, including duration and projected dates. The timeline does not include future dates, milestones, duration, or start and end dates for each milestone.

    H. OUTCOME

    Approaching Competence: The description of the given points is incomplete or not relevant to the project.

    Evaluator Comments:

    A description of the expected outcome is present. The description of the given points is incomplete or not relevant to the project.

    I. SOURCES

    Not Evident. The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.

    Evaluator Comments:

    This aspect will be assessed once revisions are made.

    J. PROFESSIONAL COMMUNICATION

    Not Evident. This submission includes pervasive errors in professional communication, including grammar, sentence fluency, contextual spelling, and punctuation, negatively impacting the professional quality and clarity of the writing. Grammarly for Education has identified specific errors under the Correctness category.

    Attached Files (PDF/DOCX): Rubric.docx, IT Proposal.docx, IT Proposal.docx, Rubric.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Research Propasal

    Instructions

    REMEMBER TO USE THE SCHOOL’s RUBRICS FOR THE ASSIGNMENT. YOU ARE GRADED BY THE RUBRICS. BE VERY CAREFUL IN ENSURING YOU FOLLOW THE RUBRICS, FROM THE ABSTRACT TO THE LITERATURE REVIEW.

    You must start with a title page (title of the paper, your name, course number, date, and professor name). The page count does not include a title page, reference page, or table of contents. You must write to the rubrics and writing requirements, check for writing errors, write in third person, have a clear focus as the last sentence of the introduction, a clear conclusion, and use research appropriately, as per the requirements. Remember to indent a paragraph 5 spaces and have your name in the file name. Do use subtitles. No AI is permitted in any assignment. You need to indent the start of a paragraph 5 spaces. The rubrics are provided by the school and must be used for grading. You MUST apply the rubrics to every assignment. The rubrics are available for each assignment and you must review and use these. Remember that when you use research, you must have an appropriate intext citation (author name, page number or year or URL) immediately following the use of that research, and you must follow the writing requirements for the use of research. You must complete the minimum page count for all assignments. The title page and the reference pages do not count in the page count. Please have URLS for all references on the reference page. Remember to include the preliminary literature review and to follow the rubrics for all components you will be graded on. You must review and follow the rubrics!

    You must follow the school’s policy for the use of AI. There are several announcements about this in the classroom.

    Remember that a research question must start with “how” or “why”. Your research question must lead to critical analysis, not a list.

    Within INTL 647 you are required to design a line of research around an assessment of specific cyber issue. In this case, you can select the issue that you identified in your Cyber White Paper assignment (Assignment #1).

    You are encouraged to refer to Belcher, Wendy Laura. 2009. “Editing Your Sentences” In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.

    The goal of this assignment is to present a clear research proposal. Your research proposal should be between 5-6 pages in length not including your preliminary source list and references.

    Attached Files (PDF/DOCX): 06-INTL647-CYBER RESEARCH PROPOSAL.pdf, Bradrick Williams White Paper INTL647.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Report (Practical Hands-on Project)

    Case Overview

    Complete the Hands-on Project 1-3, Forensic Examination of Digital Media from the textbook (Nelson, B., Phillips, A., Steuart, C. & Wilson,

    R.S (2024). Guide to Computer Forensics and Investigations. (7th ed.) Boston: Cengage)

    After completing the hands-on project, submit a single file which contains a report on your findings from this project.

    Required Software and Tools

    To successfully complete this forensic investigation, you will need the following software and tools:

    Forensic Analysis Software

    Autopsy(Open-source digital forensics platform)

    Used to examine forensic images (.001 format)

    Identifies, tags, and extracts files for analysis

    Generates forensic reports

    Data Files : The data files required for this assessment has been provided in your subject site under the Assessment tab (it is also

    available in the companion site of the text book)

    Guidelines for Investigation Report

    Upon completing the forensic investigation, you must generate a formal report for Legal Review. The report can be a maximum 1200 words.

    This document should adhere to professional standards and include properly marked evidence with screenshots, captions, and in-text

    citations.

    Report Requirements

    Your investigation report must include:

    1. Investigator Details

    Full Name

    Email Contact

    Case Number: Assessment _2_Pr_01-3_2026_30

    2. Case Overview

    Briefly describe the case scenario.

    Outline the allegations and forensic objectives.

    3. Investigation Findings

    Identify any relevant files (e.g., boat-related photos).

    Provide timestamps for files created/modified in October 2022.

    Include metadata details (filename, format, access times).

    4. Screenshots as Evidence

    Each screenshot must be clearly marked with arrows, highlights, or boxes.

    Provide captions explaining the screenshot.

    The following screenshots are mandatory: Project_01-3_Autopsy_Report_Case_Summary;

    Project_01-3_Autopsy_Report_Tagged_Files; Project_01-3_Autopsy_Report_Tagged_Images

    Use in-text citations to reference the screenshots within your report.

    Example: See Figure 1 for a boat-related photo tagged during the investigation.

    5. Analysis of Tagged Files

    Explain why certain files were tagged as evidence.

    Correlate findings with the case allegations.

    6. Recommendations for Legal Review

    Summarize potential implications.

    Suggest next steps (e.g., deeper analysis, expert testimony).

    Formal Writing and Documentation Expectations

    Use professional and formal language.

    Avoid slang, contractions, or personal opinions.

    Maintain clarity and conciseness in explanations.

    Ensure proper grammar and structure

  • Unit 9, Assignment 2: Cybersecurity Professional Presentatio…

    Assignment Details

    NOTE: Unit 9 has two assignments: Assignment 1 and Assignment 2. Each will be submitted to its individual Dropbox.

    Unit 9, Assignment 2: Cybersecurity Professional Presentation

    Course Outcome addressed in this activity:

    PC-3.2: Interact with others in a professional manner using appropriate communication and presentation skills.

    Purpose

    The ability to make presentations is important for any professional. This assignment reinforces your ability to develop a presentation for upper management.

    Assignment Instructions

    Based on the knowledge you have achieved thus far in this class, compose a minimum 10-slide research presentation using the current APA version with title and reference slides using Microsoft PowerPoint. Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies contains a policy recommendation of some type. Your presentation will be to upper management at an enterprise firm with over 2,000 employees and six locations worldwide. Your presentation needs to include a title slide and follow APA formatting guidelines.

    Note: Be sure to use the notes portion within the slides to include additional content.

    Then, compose a one-page paper explaining how you will utilize interpersonal skills, including communication skills, problem-solving, decision-making, listening skills, negotiation, and assertiveness to obtain management buy-in for your policy recommendation.

    Assignment Requirements

    1. Include a title slide.
    2. 10 slides in length, not counting the title and reference slides.
    3. Includes a highly developed viewpoint and purpose, and exceptional content.
    4. Paper and slides demonstrate superior organization and are well-ordered, logical, and unified.
    5. Free of grammar and spelling errors.
    6. No evidence of plagiarism.
    7. At least three outside references on the topic of cybersecurity policies.
    8. One-page paper using the most current APA formatting.

    Your work should demonstrate a comprehensive understanding and expert-level application of interpersonal skills to embody a professional demeanor, utilizing all of the following skills: communication skills, problem-solving, decision-making, listening skills, negotiation, and assertiveness. Ensure that you demonstrate how you would apply all the skills in a professional setting.

    For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

    Directions for Submitting Your Assignment

    Compose your assignment using Microsoft PowerPoint and Word and save them as IT484_YourName_Unit_9_ Assignment 2 and submit them separately to Assignment 2 Dropbox for Unit 9.

    Attached Files (PDF/DOCX): Unit 9 Assignment 2.docx

    Note: Content extraction from these files is restricted, please review them manually.