Discipline: Cyber security

Cyber Warfare and National Security: Understanding the Threats, Implications, and Strategic ResponsesCyber Warfare and National Security: Understanding the Threats, Implications, and Strategic Responses

Primary Research Question:“How does cyber warfare impact national security, and what strategies should nations adopt to mitigate its risks while maintaining global stability?” Sub-questions: What are the primary tactics and tools used in cyber warfare, and how do they differ from traditional military methods? How can nations develop effective cyber defense strategies to protect critical […]

What are the major advanced sandbox interpretation techniques that can be used to detect and analyze sophisticated malware?What are the major advanced sandbox interpretation techniques that can be used to detect and analyze sophisticated malware?

Research question: “What are the major advanced sandbox interpretation techniques that can be used to detect and analyze sophisticated malware?”These are two suggested sources (PDF files attached): Mohanta, A., & Saldanha, A. (2020). Malware Sandbox Internals. In: Malware Analysis and Detection Engineering. Apress, Berkeley, CA. https://doi-org.pxz.iubh.de:8443/10.1007/978-1-4842-6193-4_24. Jamalpur, S., Navya, Y. S., Raja, P., G. Tagore […]

Week 1 Assignment: “CISO Incident Response Case Study: Managing a Ransomware Attack at TechSecure Solutions”Week 1 Assignment: “CISO Incident Response Case Study: Managing a Ransomware Attack at TechSecure Solutions”

You are the Chief Information Security Officer (CISO) at TechSecure Solutions, a mid-sized managed IT services company that provides cloud storage, IT infrastructure management, and cybersecurity services for clients in finance and healthcare. Recently, TechSecure experienced a ransomware attack that encrypted critical systems, disrupting services for multiple clients. Your CEO has tasked you with creating […]

Protection of Personal Data and Information in the Era of Artificial Intelligence: Legal and Ethical ChallengesProtection of Personal Data and Information in the Era of Artificial Intelligence: Legal and Ethical Challenges

The rapid development of artificial intelligence (AI) within the European Union (EU) and worldwide presents significant challenges in the protection of personal data and information. This thesis focuses on the legal and ethical implications of AI technologies in the EU context, emphasizing compliance with regulations such as the General Data Protection Regulation (GDPR). It addresses […]

Week 10 Assignment: Creating a CSIRT Response Plan for an IT Infrastructure [u10a1] Week 10 Assignment: Creating a CSIRT Response Plan for an IT InfrastructureWeek 10 Assignment: Creating a CSIRT Response Plan for an IT Infrastructure [u10a1] Week 10 Assignment: Creating a CSIRT Response Plan for an IT Infrastructure

Overview A computer security incident response team (CSIRT) determines if a breach has occurred and how it must be handled. The CSIRT team functions according to predefined actions described in a CSIRT plan. When a security breach happens, the CSIRT team will identify, analyze, and contain the security breach, and finally remove the cause of […]

Week 8 Assignment: Course Project: Final IT Risk Management Plan [u08a1] Week 8 Assignment: Course Project: Final IT Risk Management Plan Due: Sun Mar 2, 2025 11:59pmWeek 8 Assignment: Course Project: Final IT Risk Management Plan [u08a1] Week 8 Assignment: Course Project: Final IT Risk Management Plan Due: Sun Mar 2, 2025 11:59pm

Assignment Overview As you progressed through the course, you used the IT Risk Management Plan Template [cf_IT_risk_management_plan_template.docx] that includes an outline for a risk mitigation plan. You have chosen an organization for your plan, and in Week 2 you wrote the plan objectives, plan scope, and roles and responsibilities for your IT Risk Management Plan. […]

[u06a1] Week 6 Assignment: Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Nmap and Nessus Reports[u06a1] Week 6 Assignment: Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Nmap and Nessus Reports

Overview Vulnerability scanners test vulnerabilities to see if they exist but also to see if they have been properly closed after a patch or control has been put in place. There are two widely used vulnerability scanners, Nmap and Nessus, which produce scan reports. By using these reports, you can identify operating systems, services, hosts, […]

Enhanced Security against APTs:Blockchain-Enabled Intrusion Detection and Prevention in Zero Trust ArchitectureEnhanced Security against APTs:Blockchain-Enabled Intrusion Detection and Prevention in Zero Trust Architecture

In today’s dynamic cybersecurity landscape, enter- prises face constant and evolving threats from Advanced Per- sistent Threats (APTs). Protecting crucial assets and data from these sophisticated attackers requires robust security solutions. Blockchain technology has emerged as a promising avenue due to its immutable ledger and decentralized nature. However, scaling a blockchain-based Intrusion Detection and Prevention […]

How can United States policy makers create, implement, and mitigate legislation to secure cyberspace from threats foreign and domestic without infringing upon United States citizen’s rights?How can United States policy makers create, implement, and mitigate legislation to secure cyberspace from threats foreign and domestic without infringing upon United States citizen’s rights?

Based on the research question assignment in Week 2, write a research paper on your approved topic. The paper should be between 10-12 pages, not including the cover page, reference list, and any appendices. Technical Requirements Your paper should be 10-12 pages double spaced (the Title and Reference pages do not count towards the minimum […]

current incident from the public record and analyze the case to identify the issues that led to the incident.current incident from the public record and analyze the case to identify the issues that led to the incident.

Incident from the public record: select a recent or current incident from the public record and analyze the case to identify the issues that led to the incident. What recommendations can you make to ensure the incident will not occur again? What were the results of the incident? And, finally, what were the cultural, societal, […]