Category: Cybersecurity

  • essay 2

    s Purdue University’s Online Writing Lab says, “The expository essay is a genre of essay that requires the

    student to investigate an idea, evaluate evidence, expound on the idea, and set forth an argument concerning

    that idea in a clear and concise manner. This can be accomplished through comparison and contrast, definition,

    example, the analysis of cause and effect, etc.” with one major exception–we won’t be focusing on arguing in

    this essay so much as explaining AI to a specialized audience. For example, you can choose one of these

    audiences:

    1. A group of 11th graders (17-18 years old) who are about to be eligible to vote. OR

    2. A group of older, recent immigrants who are in the process of becoming American citizens.

    Topic Selection Options:

    We will all be focusing on AI, but because there are many types of AI, you get to narrow this per your personal

    interest(s). This paper will be informational in nature and will have a main point but no guiding thesis.

    Assignment Parameters:

    1. Word Count: 1,500 words from introduction to conclusion

    2. Formatted in MLA style, with

    Double-spaced, indented paragraphs

    12 pt. Times New Roman font

    1″ margins

    the specific ai is going to be google translation and the audience towards the immagrints options with 5 sources minimum from .org or .edu websites

  • Fatima Alzaabi

    The ( A hybrid Ensemble Learning-based Intrusion

    Detection System for the Internet of Things) is not a lit review u should do its AN EXAMPLE , paper specifically this one its very similar to ours make sure to include the dataset accuracy and the classifiers used example Ex Alzaabi et al (year) [x] and comment the link so we can go back later and reference everything

    Attached Files (PDF/DOCX): A_Hybrid_Ensemble_Learning-Based_Intrusion_Detection_System_for_the_Internet_of_Things (4).pdf, Advanced intrusion detection in the industrial internet of things using federated learning and LTSM models.pdf, A_New_Explainable_Deep_Learning_Framework_for_Cyber_Threat_Discovery_in_Industrial_IoT_Networks.pdf, Intrusion Detection in industrial control Systems using transfer learning guided by reinforcement learning.pdf, Towards a hybrid deep learning model for anomalous activities detection in internet of things networks.pdf, DeepIIoT_An_Explainable_Deep_Learning_Based_Intrusion_Detection_System_for_Industrial_IOT.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Testing and Securing Computer networks and Systems Performan…

    DO NOT REQUEST WITHOUT READING THIS FIRST!!

    Due to the numerous and increasingly malicious attacks on computer networks and systems, current security tools are often not enough to resolve the issues related to illegal users, reliability, and to provide robust network security. Recent research has indicated that although network security has developed, a major concern about an increase in illegal intrusions is still occurring. Addressing security on every occasion or in every place is an important and sensitive matter for many users, businesses, governments and enterprises. A Network Intrusion Detection and Prevention System (NIDPS) is one of the most tested, reliable, and strongest forms of technology used to sniff out network packets, monitor incoming and outgoing network traffic, and identify the unauthorised usage and mishandling of computer system networks. It can provide a better understanding of the things that are really happening on the network. In addition, an NIDPS has the potential to detect, prevent, and report any evidence of attacks and malicious traffic.

    However, due to the wide-ranging environments and platforms that are in use, and the lack of security awareness by many users, network security is a complex task. This has resulted in a high level of traffic/data loss or theft amongst business users, particularly in relation to information or networked systems accessed via physical or virtual networks and systems interfaces. This assignment allows you to build your knowledge and understanding of the theoretical and practical issues in network & system security architectures. In particular, you will demonstrate the threats to networked computers and ways in which these threats may be mitigated by the deployment of appropriate security countermeasures.

    To pass the coursework you must

    demonstrate your understanding of securing system including computer networks, web applications, or servers based on security technologies (e.g., Intrusion Detection and Prevention System (IDPS), Firewall, or others such as antivirus, malware, etc) using a virtual operating system (Ubuntu);

    demonstrate your understanding of securing a network and system by building on work conducted in lecture and lab sessions;

    test security performance for your network (which consists of local hosts, vulnerable web application or servers) when it faces different attacks techniques e.g., SQLi attacks, Backdoor attacks, flood attacks (TCP, UDP, ICMP, HTTP), high-speed malicious traffic, Mitigate attacks (PacketTracer), etc;

    use various proactive and reactive security tools and techniques to test security performance of your network and system implementation. This builds on experience gained in lab sessions to provide a practical demonstration of securing systems or computer networks in general.

    This is an individual-based coursework.

    Assessment Scenario/Problem

    You will work individually. You are required to:

    1. Research and report on security challenges for networks or systems including web applications, computer networks or servers. This section should be approximately 800 words long.
    2. You will then set up a prototype network. Here and as an optional, you can choose one of 3 (three) following options:
    3. a. The prototype network consisted of 3 (three) virtual stations including (e.g., Ubuntu Mate 22.04 (IDPS), Kali, and Vulnerable web application) connected together in one internal network.
    4. b. The prototype network consisted of 2 (two) virtual stations including (e.g., kali and Vulnerable web application) connected in one internal network.
    5. c. The prototype system consisted of one virtual station including e.g., internal web application.

    Equal marks will be given whichever option is chosen because there are different challenges involved in each option. Some options may be more suitable for computers with limited capacity.

    Several tools and hackers techniques (which were introduced in the lab sessions and should find out more by your research) can be used to test your network or system security performance. You should use Snort IDPS to test your systems security (analysis, detection and prevention performance). The result should be reported and discussed.

    1. You must detail your testing strategy, for example, discussing the implementation of tools and techniques (introduced in lab sessions and identified by your research) that would aid you in this task.
    2. Then you should implement your security testing strategy for your system (VM) security, detail the results obtained, and evaluate the security of system. You are encouraged to make recommendations on (a) how the networking and systems may have its security improved. (b) how to raise the level of security of OS to meet the needs for Internet readiness and to demonstrate that the system is secure by employing appropriate tools and techniques introduced in the lab sessions and identified by your research. This section should consider 2 or 3 issues such as access control, remote access applications, OS, network interfaces, network security architecture and maybe others. The level of security required is medium, i.e. it provides an appropriate level of security (ensuring confidentiality, integrity and availability) for systems providing services over networks. You will demonstrate that the required level of security of your e.g., Ubuntu IDPS has been achieved by employing appropriate tools and techniques. This part of the coursework will use screenshots and textual descriptions to illustrate any practical work undertaken. This section will be supported with references to papers in journals, conference proceedings, Web sites or books on securing computer systems.
    3. Each student is required to write a reflective statement based on skills learned from the module and coursework. Your reflective statements should be approximately 300 words. It will reflect on the skills learned in completing this coursework.
    4. You must give a demonstration of your overall system and its network security. This part of the coursework should use screenshots and textual descriptions to illustrate any practical work undertaken.

    Your report should not exceed 4000 words (excluding references and appendices). You are encouraged to link any references in the practical elements of the assignment to relevant and related academic literature. Particular care should be made to ensure that the report contains correct references to all cited work in an appropriate style, e.g., the Harvard Referencing System.

    Summary of COURSEWORK 2. Please see task 1 to 6 below. Also I have included sample coursework 2 under assessments in the learning room.

    To pass the coursework you must

    demonstrate your understanding of securing system including computer networks, web applications, or servers based on security technologies (e.g., Intrusion Detection and Prevention System (IDPS), Firewall, or others such as antivirus, malware, etc) using a virtual operating system (Ubuntu);

    demonstrate your understanding of securing a network and system by building on work conducted in lecture and lab sessions;

    test security performance for your network (which consists of local hosts, vulnerable web application or servers) when it faces different attack techniques e.g., SQLi attacks, Backdoor attacks, flood attacks (TCP, UDP, ICMP, HTTP), high-speed malicious traffic, Mitigate attacks (PacketTracer), etc;

    use various proactive and reactive security tools and techniques to test security performance of your network and system implementation. This builds on experience gained in lab sessions to provide a practical demonstration of securing systems or computer networks in general.

    Your Task 1 to 6 as detailed below:

    1. Research and report on security challenges for networks or systems including web applications, computer networks or servers. This section should be approximately 800 words long.
    2. You will then set up a prototype network. Here and as an optional, you can choose one of 3 (three) following options below a, b or c:
    3. a. The prototype network consisted of 3 (three) virtual stations including (e.g., Ubuntu Mate 18.04 (IDPS), Kali, and Vulnerable web application) connected together in one internal network.
    4. b. The prototype network consisted of 2 (two) virtual stations including (e.g., Kali and Vulnerable web application) connected in one internal network.
    5. c. The prototype system consisted of one virtual station including e.g., internal web application.
    6. You must detail your testing strategy, for example, discussing the implementation of tools and techniques (introduced in lab sessions and identified by your research) that would aid you in this task.
    7. Then you should implement your security testing strategy for your system (VM) security, detail the results obtained, and evaluate the security of system. You are encouraged to make recommendations on (a) how the networking and systems may have its security improved, and (b) how to raise the level of security of OS to meet the needs for Internet readiness and to demonstrate that the system is secure by employing appropriate tools and techniques.
    8. Each student is required to write a reflective statement based on skills learned from the module and coursework. The reflective statement should also contain some information about the sections/parts that you did (contributed with) to the report. Your reflective statement should be approximately 300 words. It will reflect on the skills learned in completing this coursework.
    9. You must give a demonstration of your overall system and its network security. This part of the coursework should use screenshots and textual descriptions to illustrate any practical work undertaken.

    Your report should not exceed 4000 words (excluding references and appendices).

    Please Follow this to the letter and make sure it matches everything required for a good grade, any questions feel free to ask.

    I have attached the grading criteria and a sample for your reference please follow the grading criteria to get a First Class Grade.

  • Part 2 Assignment: Written Portion Requirements

    lab details

    Unit 7 Lab: Windows Kerberos Exploitation

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Use a SPAN port and commands to capture network traffic.
    • Use a program to brute force a login.
    • Use log information to detect a brute-force attack.

    Course Outcome:

    IT411-4: Prepare audits and investigations of electronic computing devices.

    In this unit, you will examine how a forensic investigator audits and investigates computing devices. Both auditing and investigating often use the same techniques, as many forensic investigations require accessing archived data.

    Part 1 Lab: Windows Kerberos Exploitation

    Complete the lab Windows Kerberos Exploitation” in the InfoSec Learning (ISL) environment located in Unit 7. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    In 300 words or more, answer the following:

    • What are some known Kerberos vulnerabilities?
    • How do they allow a user to escalate privileges?
    • How can we use AI to perform audits and analysis on computing devices?
    • Can we use AI to detect vulnerabilities and remediate them?
    • What are some ways that you can prevent escalation of privileges?

    The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.

    For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.

    Directions for Submitting Your Lab

    The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in a Microsoft Word document, save it as a file entitled IT411_Unit7Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.

    Attached Files (PDF/DOCX): Unit 7 Lab.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Registry

    Unit 8 Discussion

    Registry

    In this unit, you are exploring the registry. Explain how Windows uses the registry to store value and how a program might store data in the registry. Can we use AI to analyze the Windows registry in terms of helping find or locate issues (to be fixed)?

    Attached Files (PDF/DOCX): Unit 8 Discussion.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Unit 8 Key Note Adress

    Purpose

    Fostering a culture of continuous learning is an essential skill of a CISO. You are now at your 2-year mark as a successful CISO. Your challenges and expertise handling your companys recent cyber exercise and the global expansion of your company has made you somewhat known in the CISO community. You are invited to speak at the Global Defender CISO Conference this year. The theme of your talk is A Proactive and Strategic Approach to Cybersecurity Management and Policy.

    Instructions

    Develop a keynote briefing for this conference highlighting your lessons learned from your experience in your first two years as a CISO. The goal of your talk is to capture your thoughts and help other CISOs learn from your approach and experience. Submit a narrated PowerPoint of your speech (or a video where you have slides). Each member must narrate a section of the presentation. The presentation must be no longer than fifteen (15) minutes.

    Keynote Briefing Development:

    • Reflect on your experiences and challenges as a CISO over the past two years.
    • Identify key lessons learned, strategic approaches, and insights gained from managing cybersecurity within your company.
    • Develop an outline for your keynote briefing, organizing key points and themes to be addressed during the conference.
    • Craft engaging and informative content that aligns with the conference theme and resonates with fellow CISOs.

    Narrative PowerPoint or Video Submission:

    • Prepare a narrated PowerPoint presentation or a video presentation with slides, delivering your keynote briefing.
    • Each member of the group must brief a section of the speech, ensuring a cohesive and well-rounded presentation.
    • Use visuals, statistics, case studies, and real-life examples to support your key points and engage the audience.
    • Ensure clarity, professionalism, and coherence in both content and delivery.

    Break

    Optimization- Mike

    Expectations:

    Next each person will be responsible for:

    Responding to this email chain with a brief description of their contribution.

    Creating one PowerPoint slide with a reference slide and voice over. I would recommend using no more than two references (your choice).

    All slides will be provided via email and/or OneDrive for final consolidation and editing.

    Deadlines:

    Slide deck tone:

    Craft engaging and informative content that aligns with the conference theme and resonates with fellow CISOs. Three objectives of your message can be:

    Initial reaction

    Solution to challenge

    Lessons learned or advice to current and/or future CISOs

    Theme:

    A Proactive and Strategic Approach to Cybersecurity Management and Policy.

    I have also provided a list of examples below that you can select from. You are free to select any content/focus area as long as it complements the slide deck tone (stated above).

    Possible focus areas:

    The First 90 Days: Stabilizing the Foundation

    From Reactive to Proactive: Shifting the Cybersecurity Mindset

    Incident Response as a Leadership Discipline

    Third-Party & AI Risk: Expanding the Risk Horizon

    Global Expansion & Regulatory Complexity

    Elevating Cybersecurity to the Boardroom

    Building a Culture of Cyber Accountability

    Metrics That Matter: Measuring What Drives Resilience

    Strategic Lessons from Two Years as CISO

    The Future of Proactive Cybersecurity Governance

  • Virtual Private Networks and NAT

    Virtual Private Networks and NAT

    • What did this technology replace?
    • What are the different types of VPNs, and under what circumstance would you use each?
    • Discuss the considerations of NAT. How has it allowed the continued use of IPv4?
    • How is it different from a firewall?
    • How is it the same as a firewall?
    • What is a state table?
    • How can you access resources publicly behind a NAT server?

    Attached Files (PDF/DOCX): Unit 8 Discussion.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • A Proactive and Strategic Approach to Cybersecurity Manageme…

    Need work by deadline

    Attached Files (PDF/DOCX): Unit 8 Assignment Directions.docx, Assigment Rubrics.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Group project

    • Prepare a PowerPoint presentation which summarizes your team’s project
    • Ensure that any graphics or screen shots used in the slides are large enough to be easily readable (refer to the “NU-CSIA Examples of Good and Poor Use of Graphics.pdf” under Course Resources | Course Docs)
    • Limit the number of slides with actual content to 7; this excludes (1) a title/cover slide, (2) agenda/topic slide, (3) References slide (optional), and (4) Q&A slide (that would be 14 slides, maximum total)
    • More important than the number of slides – all presentations are limited to 12 minutes (exceeding the time limit will result in points being deducted)
    • All team members must perform their segment of the presentation, each with approximately equal time (i.e., 2-3 minutes each) regardless of whether submitting a recorded screencast or performing a live presentation
    • Recorded team presentations (in the event the instructor does not hold live, online presentations) must be in one of the following formats; there must only be one, narrated presentation for the team submitting individual segments will not be accepted
    • PowerPoint Show (.ppsx file)
    • Windows Media Video (.wmv file)
    • MPEG-4 Video (.mp4 file)
    • Check with the instructor to find out if other formats might be acceptable (for example, .AVI or .MOV files)

    ALL YOU WILL BE DOING IS TAKING INFORMATION FROM THE ATTACHMENT AND TURNING IT INTO A POWERPOINT ALL OF THE WORK IS ALREADY DONE. PRETTY EASY, INCLUDE THE PICTURE ATTACHMENT, USE THE OTHER ONES TO MAKE THE SLIDES.

    Attached Files (PDF/DOCX): Group project.docx, Overflowing Inboxes NICE Challenge.docx, KevinMaldonaldo_NCPReport150045 (1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Progress report

    Based on the Technical Communication textbook, under “Projects” (p. 491) at the end of Chapter 20, Item #1 under the ‘General’ category: Each student will separately write a progress report to the instructor, describing the progress your team has made through the end of Week Three on your Course Team Project. Use the guidelines suggested in Chapter 20. This is an INDIVIDUAL assignment, not part of the team project; students should not collaborate with other team members on this assignment. This assignment will not be used in grading the actual Team Project report or presentation.

    Other criteria:

    • At the top of the first page, include the Course #/title, your name, “Week Four Writing Assignment,” the date, and the professor’s name
    • Margins all 1 inch
    • Use 12pt font size only
    • Use a standard font style (e.g., Times Roman, Arial, Calibri)
    • Use 1.5 line spacing
    • Written memo should be 1 1/2 page

    Technical Communication by Mike Markel and Stuart A. Selber. The group project is what you can base your writing on. tell the professor that it is coming along well and make something up, nothing too crazy.

    Attached Files (PDF/DOCX): Group project.docx

    Note: Content extraction from these files is restricted, please review them manually.