Category: Cybersecurity

  • Intellectual Property Theft Case Study Analysis

    Theft of IP Case 1

    The insider worked as a chemist and later a product development director at a paint manufacturing plant. He made a business trip abroad to work with one of his organizations subsidiaries, and a coworker noticed that he was unusually interested in a competitor based in another country. A few weeks after the trip, the insider resigned abruptly. This raised some suspicion at his organization. They investigated the company laptop he had returned and noticed that he had deleted all of the temporary files. Upon further examination, they discovered a hidden file that contained, among other things, a prohibited data copy program and 44 GB of unauthorized data that included the organizations intellectual property. Upon executing a search warrant, authorities confiscated a USB drive from the insiders luggage as he was attempting to leave the country. The drive contained IP belonging to the organization, including formulas for products that the insider had not worked on and thus had no legitimate reason to possess. The authorities also noticed that his LinkedIn profile stated that he was now employed by a similar company in another country. The duration of the incident was approximately five months, but the majority of the trade secret theft occurred in the two weeks prior to his resignation. He was convicted, sentenced to 15 months of imprisonment and three years of supervised release, and ordered to pay more than $30,000 in restitution.

    Required Format for Written Analysis

    Your case study analysis must include the following sections:

    Executive Summary

    A brief overview of the case, key findings, and primary recommendations. Write this last but place it first.

    150-200 words

    Case Overview

    Summarize the facts of the case: who, what, when, where, and how. Stick to facts without analysis.

    200-300 words

    Problem Statement

    Clearly identify the key issues and problems revealed by this case. What went wrong?

    150-250 words

    Case Analysis

    This is the heart of your paper. Apply theories and concepts from the course to explain WHY this theft occurred. What vulnerabilities existed? What warning signs were missed? Support your analysis with specific evidence from the case.

    400-500 words

    Alternative Solutions

    Present 2-3 possible approaches the organization could take to prevent similar incidents. Discuss the pros and cons of each option.

    300-400 words

    Recommendations

    Select the best solution(s) and explain your rationale. Be specific about implementation. What should the organization do first? What resources are needed?

    250-350 words

    Conclusion

    Briefly summarize the key lessons learned from this case.

    100-150 words

    Total Minimum Length: 1,500 words

    • Submit as a .docx or .pdf file
    • Filename format: LastName_Assignment3_Analysis.docx
    • Double-spaced, 12-point font (Times New Roman or Arial)
    • Include a title page with your name, date, and case title
    • Cite sources using APA format (including the textbook)
    • Include a references page (not counted toward word count)
  • Intellectual Property Theft Case Study Analysis

    Theft of IP Case 1

    The insider worked as a chemist and later a product development director at a paint manufacturing plant. He made a business trip abroad to work with one of his organizations subsidiaries, and a coworker noticed that he was unusually interested in a competitor based in another country. A few weeks after the trip, the insider resigned abruptly. This raised some suspicion at his organization. They investigated the company laptop he had returned and noticed that he had deleted all of the temporary files. Upon further examination, they discovered a hidden file that contained, among other things, a prohibited data copy program and 44 GB of unauthorized data that included the organizations intellectual property. Upon executing a search warrant, authorities confiscated a USB drive from the insiders luggage as he was attempting to leave the country. The drive contained IP belonging to the organization, including formulas for products that the insider had not worked on and thus had no legitimate reason to possess. The authorities also noticed that his LinkedIn profile stated that he was now employed by a similar company in another country. The duration of the incident was approximately five months, but the majority of the trade secret theft occurred in the two weeks prior to his resignation. He was convicted, sentenced to 15 months of imprisonment and three years of supervised release, and ordered to pay more than $30,000 in restitution.

    Required Format for Written Analysis

    Your case study analysis must include the following sections:

    Executive Summary

    A brief overview of the case, key findings, and primary recommendations. Write this last but place it first.

    150-200 words

    Case Overview

    Summarize the facts of the case: who, what, when, where, and how. Stick to facts without analysis.

    200-300 words

    Problem Statement

    Clearly identify the key issues and problems revealed by this case. What went wrong?

    150-250 words

    Case Analysis

    This is the heart of your paper. Apply theories and concepts from the course to explain WHY this theft occurred. What vulnerabilities existed? What warning signs were missed? Support your analysis with specific evidence from the case.

    400-500 words

    Alternative Solutions

    Present 2-3 possible approaches the organization could take to prevent similar incidents. Discuss the pros and cons of each option.

    300-400 words

    Recommendations

    Select the best solution(s) and explain your rationale. Be specific about implementation. What should the organization do first? What resources are needed?

    250-350 words

    Conclusion

    Briefly summarize the key lessons learned from this case.

    100-150 words

    Total Minimum Length: 1,500 words

    • Submit as a .docx or .pdf file
    • Filename format: LastName_Assignment3_Analysis.docx
    • Double-spaced, 12-point font (Times New Roman or Arial)
    • Include a title page with your name, date, and case title
    • Cite sources using APA format (including the textbook)
    • Include a references page (not counted toward word count)
  • Incorporate and Justify Framework for Selected Interest Area

    Background

    Now that you have had an opportunity to explore and analyze theoretical frameworks and industry standards, it is time to Incorporate a framework that appropriately addresses your interest area from Lesson 2. Identify the selected IT governance framework that offers the best solution grounded in established ideas as your conceptual framework.

    For this assignment, you will use this lessons resources, the University library, and online search engines to continue research in the topic area of IT policy and strategy as part of IT governance framework. Incorporate and justify a framework for your selected interest area in your chosen domain of study.

    Instructions

    Provide a report that incorporates and justifies a framework for your selected interest area in your chosen domain of study. Specifically, the discussion should address the following information:

    1. Apply the industry-standard framework and the addition of a policy template or model.
    2. Use your tool to evaluate the IT policy and provide strengths and weaknesses.
    3. Provide three recommendations to improve the IT policy.
    4. Include a detailed outline for an integrated solution that covers all aspects of governance, policy formation and enforcement, compliance, and regulatory requirements, given the relevant industry.
    5. Ensure general industry best practices and specific needs of the organization are clearly defined, emphasizing the alignment of security strategy with the strategic goals and objectives of the organization.
    6. Offer recommendations for a balanced approach to improving crucial current needs while also describing an ongoing improvement process across multiple years.
    7. Provide details for anticipated changes in how technology will be used.

    Attached Files (PDF/DOCX): ADDiscussionRubricFEB2022.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Investigate Literature for Selected Interest Area

    Assignment : Investigate Literature for Selected Interest Area

    InstructionsBackground

    For this task, you will use the University library to perform research in your chosen problem domain of IT policy and strategy as part of IT Governance framework. Find 2 articles that involve some form of empirical research from the past 4 years. This could involve quantitative or qualitative methods. In addition, find 3-5 more articles that involve business journals and practical application of IT policy and strategy (Hint: Harvard Business Review is one example) also from the past 4 years. Make sure some of your articles have a global component. You will have located a total of 5-7 articles.

    Instructions

    Once you review the literature, summarize how the articles are related to each other. How are they similar? How do they differ? Then, conduct an analysis of findings across all of the articles? Are there any current operational and/or technical elements that are critical in todays information technology landscape that is missing or not thoroughly discussed? What are your overall impressions from these readings in regard to the topic of IT Strategic and Governance formulation and implementation?

    Your discussion should synthesize your findings by referring to the literature review conducted in your chosen problem domain. Do not summarize the articles. Instead, use them to inform yourself as you formulate a logical narrative that addresses the following:

    1. Determine the type of research that exists. Be sure to address this question from both an academic (theory) and business (practice) viewpoint.
    2. Identify three areas of interest to you from a theoretical standpoint.
    3. Identify which key constructs, concepts, or variables are used in these articles.
    4. Describe how the articles demonstrate innovative concepts in IT policy and strategy.
    5. Explain how the articles collectively advocate for proactive research, evaluation, and implementation of new ideas.
    6. Identify what you can draw upon in the articles that address beneficial and detrimental topics in IT policy and strategy for organizations.
    7. Explain how the articles approach IT policy and strategy from a global perspective.

    Attached Files (PDF/DOCX): Assignment.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Discussions

    Two sperate discussions that must be 250+ words each , following instructions in the document that meet highest level in rubrics. Must be familiar and comfortable in Cyber security topics

  • vlans

    As a senior network administrator, you are tasked with training junior network admins on VLANs. Write a minimum 2-page APA formatted essay on how to configure VLAN including trunking. Your essay should be written like a training guide where you are training junior network administrators on how to properly configure VLAN including trunking. Make sure you include commands needed and descriptions on how the commands help make the VLAN functional on an enterprise network. The format should include steps and screenshots so it is easy for someone else to follow.

  • CYBERCRIME PAPER Technical, Social, and Legal

    Paper Structure

    Introduction (1/2 – 3/4 page)

    • Hook the reader with a real-world example or statistic about your chosen cybercrime
    • Clearly define the specific form of cybercrime you will analyze
    • Preview the three analytical dimensions (technical, social, legal) that structure the paper
    • End with a thesis statement that frames your argument (e.g., “While [crime] may appear to be purely technical in nature, understanding its prevalence requires attention to the social motivations of offenders and the persistent limitations of legal enforcement mechanisms”)

    Technical Dimension (1 – 2 pages)

    • Explain how the cybercrime is technically executed in clear, non-technical language
    • Describe the tools, vulnerabilities, or techniques involved
    • If applicable, discuss the evolution of the crime (e.g., how techniques have become more or less sophisticated)
    • Avoid overly detailed “how-to” content; focus instead on the strategic aspects of how the crime works
    • Key question to address: What technical factors make this crime possible or attractive to perpetrators?

    Social Dimension (1 – 2 pages)

    • Identify and analyze the motivations, demographics, or social contexts of perpetrators
    • Consider both individual-level factors (psychology, skill, intent) and structural factors (economic opportunity, community norms, organizational pressures)
    • Discuss how the crime affects victims and communities
    • If relevant, analyze the role of online communities or subcultures in facilitating the crime
    • Key question to address: Who commits this crime, why do they commit it, and what social or organizational conditions enable it?

    Legal Dimension (1 – 2 pages)

    • Identify relevant federal and/or international laws that criminalize this activity
    • Discuss how law enforcement agencies attempt to investigate, prosecute, and prevent this crime
    • Analyze significant prosecutions, legal cases, or policy responses
    • Identify challenges in enforcement (e.g., jurisdiction, anonymity, attribution, international cooperation)
    • Consider gaps between the scope of the criminal activity and the capacity of legal systems to address it
    • Key question to address: How do legal systems attempt to control this crime, and what are the practical and jurisdictional obstacles to effective enforcement?

    Synthesis and Conclusion (1/2 – 3/4 page)

    • Bring together insights from the technical, social, and legal dimensions
    • Discuss how understanding all three dimensions provides a more complete picture than focusing on technology alone
    • Reflect on implications for policy, prevention, or future enforcement strategies
    • Conclude with a forward-looking statement about emerging challenges or changes in this form of cybercrime

    Citation and Source Requirements

    • Minimum of 8 scholarly sources (books, peer-reviewed journal articles, government reports, or credible investigative journalism)
    • At least 3 sources must be from peer-reviewed academic journals in criminology, computer science, law, or related fields
    • Use APA 7th Edition format for in-text citations and reference list
    • Acceptable sources include:
    • Academic books and journal articles
    • Government reports and law enforcement publications (FBI, DOJ, Secret Service, INTERPOL)
    • Industry reports and security research (e.g., from cybersecurity firms) when supplemented with academic sources
    • High-quality investigative journalism from reputable outlets
    • Not acceptable: Wikipedia, course lectures, personal blogs, or unattributed online sources

    References

    Chan, C.-k., Wang, X., & Yang, X. (2024). Prevalence and relationships of dating application usage, cyber-fraud and mental health among emerging adults in Hong Kong. Psychiatry Research Communications, 4, Article 100197.

    BBC News. (2025, January 29). How Tinder Swindler Simon Leviev scammed his way around the world.

    VG. (2019). Tindersvindleren [Special report in English].

    Garaad, N. (2023). The Tinder Swindler: Analyzing public sentiments of romance fraud using machine learning and artificial intelligence. Journal of Economic Criminology, 2, Article 100023.

    Lopez, K. (2022, February 3). The true story of the Tinder Swindler and where Simon Leviev is now. Esquire.

    Newsweek. (2022, February 16). LLD Diamonds Simon Leviev response: Netflixs Tinder Swindler exposes Shimon Hayut.

    Of, by and for the smartphone: Tinder Swindler investigation captures millions of readers. (n.d.). Global Investigative Journalism Network.

    Organized Crime and Corruption Reporting Project. (2025, February 3). Tinder Swindler arrested in Georgia, placed in extradition custody.

    People Staff. (2025, January 14). Where is Simon Leviev now? People.

    Redling, E. (2023). Modern dating and performance: Creative blendings of practices and platforms. Journal Name, Volume(Issue).

    Times of Israel. (2022, February 7). Tinder Swindler seduces way to top of Netflix charts.

    Delano Cole van der Linde, LLB LLM LLD. (Year). Online Dating Fraud Under the Common Law and the Cybercrimes Act. Obiter, 45(2).

  • Policy

    Policies provide the foundational requisites of a cybersecurity program. Policies are pivotal in protecting assets and shaping the procedures ultimately intended to reduce organizational risk.

    In your journal, describe the purpose of an acceptable use policy, an incident response policy, and a password management policy. Explain why each is important to an organization.

    Your journal entry should be three paragraphs long, one paragraph per policy.

  • Research Assignment: Does children’s interaction with AI-bas…

    Final Paper (30%)

    Students are expected to develop a research question (Does children’s interaction with AI-based platforms influence their online and offline social behavior?) that falls within one of the themes discussed in class. They will select an artifical intelligence chatbot (e.g., ChatGPT, Gemini, Claude, Copilot, DeepSeek) and ask it to generate a three page academic response to their question. Students will then critically evaluate that answer in give to six pages. In doing so, they will be required to support their evaluation by citing at least give academic sources.

  • Cyber-Attacks Against IoT Devices

    In this discussion forum, identify three types of cyber-attacks that could be launched against IoT devices in the aviation ecosystem. In your discussion of each attack (3 total), describe the IoT system and how it is used in the aviation ecosystem. Explain the system’s vulnerabilities that open it to an attack, and then identify and describe the strategies used by cyber adversaries to attack the systems.