Category: Cybersecurity

  • Design Network for k-12

    instructions are listed in the file below.

    Attached Files (PDF/DOCX): Project Instructions (1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Design Network for k-12

    instructions are listed in the file below.

    Attached Files (PDF/DOCX): Project Instructions (1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Unit 7, Assignment 1: Cryptography and Cybersecurity Policie…

    Assignment Details

    NOTE: Unit 7 has two assignments: Assignment 1 and Assignment 2. Each will be submitted to its individual Dropbox.

    Unit 7, Assignment 1: Cryptography and Cybersecurity Policies

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Apply cybersecurity policies related to cryptography.
    • Analyze cybersecurity policies pertaining to data encryption.
    • Analyze cybersecurity policies regarding key management solutions.

    Course Outcome:

    IT484-5: Evaluate cryptology, network, and communications technology used to protect private information from public disclosure and supported by cybersecurity policies.

    Purpose

    Knowledge of keys and active directory is important for cybersecurity professionals. This assignment reinforces these concepts.

    Assignment Instructions

    Part 1:

    Using the internet and/or the library, research and complete the following:

    In 5001,000 words, respond to the following:

    Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security.

    Part 2:

    In 200 or more words for each answer, respond to the following:

    • Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
    • How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a one-way process?

    Assignment Requirements

    Your assignment should meet the specifications listed. Be sure to use appropriate APA format and cite your textbook or other sources that you used in the assignment.

    Answers should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.

    Directions for Submitting Your Assignment

    Compose your assignment in a Microsoft Word document and save it as IT484_YourName_Unit_7_Assignment1 and submit it to the Assignment 1 Dropbox for Unit 7.

    Review the before beginning this activity.

    Attached Files (PDF/DOCX): Unit 7 Assignment 1.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Assignment 4

    Please include a screenshot of the assignment showing it is green. Write a single report (Word or pdf) that includes the solutions. For each activity, you should provide a detailed description of the steps (e.g., input used for the attack, examining HTTP requests, etc.) you took to solve the activity, along with a screenshot of the solved activity (turned green as indicated in the above image).

    Link to video to download WebGoat:

    Attached Files (PDF/DOCX): assignment4.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • assigenment 2

    This assignment has three parts:

    Part One:

    ** Analyze, compare the performance implications between Linux vs Windows Operating Systems or MacOS – depending which OS you have (some points to describe, explain, compare and analyze) security, encryption, file structure, access controls, applications use for, efficiencies, vulnerabilities.

    Part Two:

    ** Drawn a diagram for Linux OS to include

    Hardware

    Kernel

    Shell

    Applications

    Users

    ** Drawn a diagram for Windows OS to include

    Hardware

    Kernel

    Shell

    Applications

    Users

    ** Describe some of the design principles of the two OS diagrams

    Refer to OSI and TCP/IP diagrams

    ** Explain the differences among OSI and TCP/IP models

    Part Three:

    For this part download Linux (Khali) using one of the following methods

    USB flash drive

    Virtual Machine

    Dual boot

    ** For this part you need to research and describe document with screen shots How to change the Linux Root password.

    ** Explain some of the key issues in the design of Linux OS.

    Use available resources, class material, book(s) and follow APA style guide for citation for all your references.

    Let me know if you have any questions or need further help.

    Best Regards,

    Dr Antoniou

    Evaluation criteria 0-100 Points.

    Part One: Analyze and Compare Linux vs Windows Operating Systems (Total: 40 Points)

    1. Security Analysis (10 points): Detailed comparison of security features, including encryption methods, vulnerabilities, and mitigation strategies.
    2. File Structure and Access Controls (10 points): A clear comparison of how each OS manages files and controls access.
    3. Application Use and Efficiency (10 points): Analysis of the types of applications best suited for each OS and their performance efficiencies.
    4. General Analysis (10 points): Overall depth, clarity, and accuracy of the analysis, including real-world implications and examples.

    Part Two: OS Diagrams and Principles (Total: 35 Points)

    1. Diagrams (20 points): Clear, accurate diagrams for both Linux and Windows OS, including all required components (Hardware, Kernel, Shell, Applications, Users).
    2. Design Principles Description (5 points): Insightful description of the design principles underlying each OS, with reference to OSI and TCP/IP models.
    3. OSI vs TCP/IP Models (10 points): A clear, accurate explanation of the differences between these models.

    Part Three: Practical Exercise with Linux (Total: 25 Points)

    1. Documenting Linux Root Password Change (10 points): Detailed, step-by-step documentation with clear screenshots.
    2. Key Issues in Linux OS Design (10 points): Well-researched and articulated discussion of key design issues in Linux.
    3. APA Style and Citations (5 points): Proper use of APA style for citations and overall format of the assignment.
  • 8-2 Cyber Playbook Submission

    CYB 230 Playbook Submission Guidelines and Rubric

    Prompt

    Using this course’s cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning.

    What to Submit

    Submit a screenshot from your current playbook and two to three sentences in a Microsoft Word document or equivalent.

    Module Five Resource:

    Module Five Resource:

    Module Five Resource:

    Attached Files (PDF/DOCX): Cyber Playbook.pdf, Cybersecurity Doc Playbook Template.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Business Security

    Write a two-page, single-spaced summary of what you learned from the reading assignment. Use one inch margins and 12 point Times New Roman font in your document. Upload your document here. You should use relevant figures, tables, screen shots, or other supplemental items to enhance your submission. These are in addition to the two full pages of text with your own thoughts.

    ***Please use information from attached reading documents and outside web sources***

    Attached Files (PDF/DOCX): Data Center Physical Security Checklist – Accessible.pdf, Requirements for the Design of a Secure Data Center – Accessible.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Anything

    Instructions in picture below

  • Part 2 Assignment: Written Portion Requirements

    lab details

    Unit 6 Lab: Forensic Analysis of a Windows 10 Client

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Examine Windows files for evidence of a compromise.
    • Use Windows commands to easily examine a system.
    • Use EFS forensic analysis to perform an analysis.

    Course Outcomes:

    IT411-3: Apply various types of forensic analysis tools for data recovery to forensic scenarios.

    GEL-1.02: Demonstrate college-level communication through the composition of original materials in Standard English.

    PC-3.5: Engage in career development and advancement strategies, including effective networking, mentoring, and creating a personal brand.

    In many forensic investigations, the goal is to determine if any information was exfiltrated or to be able to confidently determine it was not. Many different tools are available that aid in this process, and in this unit, you explore two major approaches. One is examining logs that could be months old for evidence, and the other is real-time detections.

    Part 1 Lab: Forensic Analysis of a Windows 10 Client

    Complete the lab Forensic Analysis of a Windows 10 Client” in the InfoSec Learning (ISL) environment located in Unit 6. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). The encrypted file system first came into use on NTFS volumes starting with Windows 2000, and has since been a reliable way to keep files and folders secure on Windows server and client systems. If the user changes their password, they may need to use a recovery key to access the file. In this lab, you will see how it is possible to provide access to other users to the files or folders that were encrypted using EFS.

    In 300 words or more, answer the following:

    • What are the benefits of using encryption?
    • What are some of the drawbacks of using encryption?
    • How secure is the use of encryption?
    • Could current forms of AI break this type of encryption?

    Respond to the question by comparing and contrasting your position using both pros and cons.

    Your compare and contrast paper must:

    1. Include a title page.
    2. Use a font size of 10 or 12.
    3. Be at least two full double-spaced pages in length, not counting the title page or reference page.
    4. Include a highly developed viewpoint, purpose, and exceptional content.
    5. Demonstrate superior organization and be well-ordered, logical, and unified.
    6. Be free of grammar and spelling errors.
    7. Contain no evidence of plagiarism.
    8. Include at least two references.

    The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.

    For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.

    Directions for Submitting Your Lab

    The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in one Microsoft Word document, save it as a file entitled IT411_Unit6Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.

    Attached Files (PDF/DOCX): Unit 6 Lab assignment.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Part 2 Assignment: Written Portion Requirements

    Unit 5 Lab: Using Hash Functions to Validate Data Integrity

    Outcomes addressed in this activity:

    Unit Outcomes:

    • Collect volatile data in a text file.
    • Practice commands helpful to the forensic examiner.
    • Capture running RAM.
    • Conduct a memory dump using Volatility.

    Course Outcome:

    IT411-3: Apply various types of forensic analysis tools for data recovery to forensic scenarios.

    Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). There are many different types of hashing functions. For example, MD5, SHA-1, SHA-256, SHA-384, and SHA-512. Different mathematical calculations result in stronger hash values. The strongest of these hash values listed is SHA-512, and the weakest is MD5. Although weaker than the others, the MD5 hash is still accepted in court for testimony. As the number of files continues to increase, larger hash values ensure even more reliability than older ones that were used.

    Part 1 Lab: Using Hash Functions to Validate Data Integrity

    Complete the lab “Using Hash Functions to Validate Data Integrity” in the InfoSec Learning (ISL) environment located in Unit 5. Completion is automatically graded and posted to the Gradebook entry for the lab.

    Part 2 Assignment: Written Portion Requirements

    There are five types of hashing algorithms. Write a 300-word explanation of each type of hashing algorithm.

    The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.

    For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.

    Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.

    Directions for Submitting Your Lab

    The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in a Microsoft Word document, save it as a file entitled IT411_Unit5Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.

    Attached Files (PDF/DOCX): Unit 5 Lab assignment.docx

    Note: Content extraction from these files is restricted, please review them manually.