In this assignment, you will build on your knowledge from Modules 6 and 7 where we discussed cyber-attacks against OT and IoT systems. Acting as an aviation consultant to the director of a large international airport, you have been asked to identify OT and IoT technologies used in airport and aircraft operations. Provide the director with a detailed report on six OT/IoT technologies used in the airport and their associated vulnerabilities and attack vectors in which you describe the types of damage and consequences that could occur from a cyber-attack. Discuss the controls and countermeasures that you would recommend to prevent these systems from being exploited. Your assignment should be 4 to 5 pages in length, in current APA format, and reference a minimum of three external resources.
Category: Cybersecurity
-
Incident Response Checklist
For this assignment, you will prepare a short paper that details the phases and steps of incident response using three example cyber-attacks. You will provide an incident response checklist for each of the anticipated cyber-attacks and detail the specific elements that would prepare an organization to prevent or respond to the example cyber-attacks.
Your paper should be three (3) pages and include at least three (3) sources. A title page is not required, however, the paper, references, and citations should use current APA format.
-
Incident Response and Cyber Resilience
In this activity, you will participate in a discussion of how incident response supports the goals and objectives of cyber resilience: prepare, prevent, respond, and recover. You will discuss how incident response in aviation cybersecurity can prevent or mitigate cyber-attacks by providing examples and supporting discussion.
-
Part 2 Assignment: Written Portion Requirements
lab details
Unit 4 Lab: Static and Dynamic Malware Analysis
Outcomes addressed in this activity:
Unit Outcomes:
- Obtain any publicly available information on a specific malware form.
- Review the contents of unpacked and unencrypted malware.
- Review some of the capabilities of malware.
- Use several malware analysis tools.
Course Outcome:
IT411-2: Plan appropriate methods to secure digital evidence.
In this lab, you will perform static and dynamic malware analysis. Analyzing malware is important because an analyst will want to know what actions the malware is performing on the system as well as on the network. The hash value of the malware can tell you if the malware has been widely used before. Dynamic analysis involves executing the malware and seeing how it behaves, whereas static analysis just involves examining the information contained within the file. Figure 1 shows the lab topology for this lab.
Part 1 Lab: Static and Dynamic Malware Analysis
Complete the lab “Static and Dynamic Malware Analysis” in the InfoSec Learning (ISL) environment located in Unit 4. Completion is automatically graded and posted to the Gradebook entry for the lab.
Part 2 Assignment: Written Portion Requirements
There are two types of malware analysis, static and dynamic.
In 300 words or more, answer the following:
- What is static malware analysis? When is it appropriate to use this type of analysis?
- What is dynamic malware analysis? When is it appropriate to use this type of analysis?
The written portion must contain sufficient information to adequately address the questions and be free from grammar and spelling errors. The paper should be provided in APA format. You may use AI as part of your research but ensure you cross-reference your research to prevent misinformation. Refining your prompts can help you generate precise and relevant responses. Refer to your syllabus for more information on Purdue University Global’s artificial intelligence (AI) policy and resources.
For assistance with APA requirements, please use the resources provided in the Academic Tools section of the course. Points deducted from grade for each writing, spelling, or grammar error are at your instructors discretion.
Review the policy on plagiarism. This policy will be strictly enforced on all applicable labs and discussion posts. If you have any questions, please contact your professor.
Directions for Submitting Your Lab
The lab you take on InfoSec Learning will be graded automatically and reported to your instructor, but you must submit the written portion of the lab to assignment Dropbox. Compose the written portion of your lab in a Microsoft Word document, save it as a file entitled IT411_Unit4Lab_yourname.docx, and submit it to the designated assignment Dropbox for this activity.
Attached Files (PDF/DOCX): Unit 4 Lab.docx
Note: Content extraction from these files is restricted, please review them manually.
-
Scripting Data Capture
Unit 5 Discussion
Scripting Data Capture
In the lab, you will issue commands to identify system characteristics. Using commands, you will capture the results to a file. Discuss the possibilities of putting those Linux and Windows commands in a script.
- What are the advantages of scripting the data capture?
- What are the disadvantages of scripting the data capture?
Attached Files (PDF/DOCX): Unit 5 Discussion.docx
Note: Content extraction from these files is restricted, please review them manually.
-
Encryption failures in organizations involving at-rest and i…
Your assignment this week will require researching two organizational failures involving encryption and discussing ways you might work to reduce these types of failures. First, find an organization that suffered a breach as a result of a failure to implement encryption at-rest. This should be easy, look for an organization that suffered a breach as a result of theft and chances are youll find what you need (HINT: Remember, HHS says a theft of PHI that is encrypted is not a breach, so if they reported a breach due to theft, it most likely wasn’t encrypted). This happens A LOT too, so while youre researching, think about how your own organization implements this security (or if it doesnt). This is applicable even if you don’t currently work for a healthcare organization – if your organization deals with customer data, credit cards, educational records, or any type of sensitive records, are they protected? Second, find an organization that suffered a breach as a result of failure to implement encryption in-transit. This one might be harder to research, so some simple things you can look for to help narrow down the search are organizations that suffered breaches as a result of emailing patient files, or failing to use a VPN or other encryption mechanism while accessing charts remotely. While researching, again, think about how your own organization implements this type of security to protect patient information or other sensitive records (or if it doesnt). For both types of breaches, come up with at least one simple way that they could have been prevented. For the next and last component, you might not have intimate knowledge of what your organization has in place, currently work for a healthcare provider, or be comfortable discussing your organizations implementation thats fine, adjust as needed and dont answer any question that you are uncomfortable answering. This assignment is not about spilling company secrets or worrying about who works where… Last assignment component: Think about this topic and the way your organization currently operates. How does your organization currently handle both types of encryption? Do you think its adequate? If you were in charge, would you do it differently? If so, how? Think about the two breaches that you researched for this assignment – if it were your organization in the place of either breach you researched, in your opinion, would the results be the same? You’ve been researching the failures of others this entire quarter and how it happened – with what you’ve read and seen and learned so far, is your own organization primed to be on a breach list? We’re in Week 9 of this course, apply what you have learned to this assignment. Again, I’m not interested in naming names – if you are uncomfortable with writing about your own organization or do not currently work, keep it generic. I am more interested in you applying what you have learned about compliance requirements to what you know about your own potential workplace. Assignment Number: WK9A7 Assignment Requirements: 700 words, Times New Roman font, size 12, double-spaced. A template for this assignment in Word has been provided previously with formatting set up. APA6 style format – paper must include a Works Cited page at the end and in-text citations for any research incorporated into your work. Direct quotes are limited to 10 words total per quote. You are expected to analyze, evaluate, and paraphrase content into your work, not copy it directly from the source. -
Encryption failures in organizations involving at-rest and i…
Your assignment this week will require researching two organizational failures involving encryption and discussing ways you might work to reduce these types of failures. First, find an organization that suffered a breach as a result of a failure to implement encryption at-rest. This should be easy, look for an organization that suffered a breach as a result of theft and chances are youll find what you need (HINT: Remember, HHS says a theft of PHI that is encrypted is not a breach, so if they reported a breach due to theft, it most likely wasn’t encrypted). This happens A LOT too, so while youre researching, think about how your own organization implements this security (or if it doesnt). This is applicable even if you don’t currently work for a healthcare organization – if your organization deals with customer data, credit cards, educational records, or any type of sensitive records, are they protected? Second, find an organization that suffered a breach as a result of failure to implement encryption in-transit. This one might be harder to research, so some simple things you can look for to help narrow down the search are organizations that suffered breaches as a result of emailing patient files, or failing to use a VPN or other encryption mechanism while accessing charts remotely. While researching, again, think about how your own organization implements this type of security to protect patient information or other sensitive records (or if it doesnt). For both types of breaches, come up with at least one simple way that they could have been prevented. For the next and last component, you might not have intimate knowledge of what your organization has in place, currently work for a healthcare provider, or be comfortable discussing your organizations implementation thats fine, adjust as needed and dont answer any question that you are uncomfortable answering. This assignment is not about spilling company secrets or worrying about who works where… Last assignment component: Think about this topic and the way your organization currently operates. How does your organization currently handle both types of encryption? Do you think its adequate? If you were in charge, would you do it differently? If so, how? Think about the two breaches that you researched for this assignment – if it were your organization in the place of either breach you researched, in your opinion, would the results be the same? You’ve been researching the failures of others this entire quarter and how it happened – with what you’ve read and seen and learned so far, is your own organization primed to be on a breach list? We’re in Week 9 of this course, apply what you have learned to this assignment. Again, I’m not interested in naming names – if you are uncomfortable with writing about your own organization or do not currently work, keep it generic. I am more interested in you applying what you have learned about compliance requirements to what you know about your own potential workplace. Assignment Number: WK9A7 Assignment Requirements: 700 words, Times New Roman font, size 12, double-spaced. A template for this assignment in Word has been provided previously with formatting set up. APA6 style format – paper must include a Works Cited page at the end and in-text citations for any research incorporated into your work. Direct quotes are limited to 10 words total per quote. You are expected to analyze, evaluate, and paraphrase content into your work, not copy it directly from the source. -
Comprehensive Cloud Solution Design
Attached Files (PDF/DOCX): Comprehensive Cloud Solution.docx
Note: Content extraction from these files is restricted, please review them manually.
-
Week 3
As a team using the provided APA template, based on your prioritized top 10 InfoSec policies, create a full draft version of the highest priority policy (Deliverable #3). Use the samples and example policies provided below as guides for formatting your policy. The heading must contain at least the following information: Policy Number, Policy Title, Version Number, Effective Date, Approving Authority (executive); and you can optionally include in the heading: Category and/or Previous Version(s). Additionally, you can include a Revision History either near the beginning or the end of the policy. Using the example format, preceding the policy, you must provide 2-4 paragraphs as an explanation of how you propose to start implementing the policy in the company from your selected Project Option. The policy itself must start at the top of a new page.
Assignment outcomes: (1) Full draft version of the highest priority InfoSec policy; preceded by (2) an explanation of how you would start implementing it.
-
Week 3
As a team using the provided APA template, based on your prioritized top 10 InfoSec policies, create a full draft version of the highest priority policy (Deliverable #3). Use the samples and example policies provided below as guides for formatting your policy. The heading must contain at least the following information: Policy Number, Policy Title, Version Number, Effective Date, Approving Authority (executive); and you can optionally include in the heading: Category and/or Previous Version(s). Additionally, you can include a Revision History either near the beginning or the end of the policy. Using the example format, preceding the policy, you must provide 2-4 paragraphs as an explanation of how you propose to start implementing the policy in the company from your selected Project Option. The policy itself must start at the top of a new page.
Assignment outcomes: (1) Full draft version of the highest priority InfoSec policy; preceded by (2) an explanation of how you would start implementing it.