Discipline: Cyber security

User Perception and Trust in Cloud Services with Encryption: Investigate on how users perceive and trust cloud services that implement data encryption, considering factors such as transparency, user control, and awareness of security measures.User Perception and Trust in Cloud Services with Encryption: Investigate on how users perceive and trust cloud services that implement data encryption, considering factors such as transparency, user control, and awareness of security measures.

Abstract : an outline and summary of your survey report. The Abstract is due on February 3, 2024, 11:59 PM  The research survey paper is Due on Apr 1, 2024, 11:59 PM

Strengthening Network Security by Applying an Advanced Threat Protection (ATP) SystemStrengthening Network Security by Applying an Advanced Threat Protection (ATP) System

In this task, you will design the capstone project approved by your instructor. You will write a report about the security problem you identified in Task 1 and compile the information for your solution to that security problem into a report. Your work for this task will not be evaluated until the appropriate forms from […]

Digital Ethics: Trademarks, Copyright, and Security Compliance in Online BusinessDigital Ethics: Trademarks, Copyright, and Security Compliance in Online Business

Instructions In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research […]

An informative speech about my dream job as a Ethical Hacker in the cybersecurity field.An informative speech about my dream job as a Ethical Hacker in the cybersecurity field.

I have to record myself reading this speech for 3-5 mins. It is an informative speech about my dream job. So I have to describe what an ethical hacker does in the cybersecurity field, how much they typically make, the differences between an ethical hacker and an analyst, the difference between different hackers (ex. ethical […]

LR2 – DDoS Detection and Protection – Extracting Key Information from Journal Articles into TablesLR2 – DDoS Detection and Protection – Extracting Key Information from Journal Articles into Tables

You are required to extract key information and fill out the provided Component, Classification, and Evaluation Tables.   Materials Provided: 1. 6 journal articles (to be provided by the instructor). 2. Template with Component Table, Classification Table, and Evaluation Table (01-Literature Review Tables). Deadline: The completed assignment must be submitted by January 20, 2024.   […]

How do different criminological theories lend themselves to understanding different aspects of cybercrime?How do different criminological theories lend themselves to understanding different aspects of cybercrime?

How do different criminological theories lend themselves to understanding different aspects of cybercrime? Based on what you know about police at this point, how helpful will these theories be for the enforcement agencies that are targeting cybercrime? Your posts should contain information from Chapters 1, 2, and 3 in the book, as well as Henson […]

Write a paper that addresses the societal effects of cybercrime on a population. You may choose the audience that you are addressing. How do you convince your audience of the societal impacts of cybercrime?Write a paper that addresses the societal effects of cybercrime on a population. You may choose the audience that you are addressing. How do you convince your audience of the societal impacts of cybercrime?

Please keep in mind the following points: 1. The papers are to be double-spaced with Times New Roman 12-point font and 1-inch margins. 2. Your essay should be no less than 3 full pages and no more than 4 full pages.    3. In addition to the quality of your response, your answers will be […]

Discuss the two key requirements for writing SQL Server audits to the windows Security log.Discuss the two key requirements for writing SQL Server audits to the windows Security log.

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to […]

Describe the steps involved in modifying the default password policy in Oracle? .Describe the steps involved in modifying the default password policy in Oracle? .

In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to […]

Literary reviews on explainable artificial intelligence (XAI)in intrusion detection systems(IDS)Literary reviews on explainable artificial intelligence (XAI)in intrusion detection systems(IDS)

I search for literature reviews that evaluate the quality of explainable artificial intelligence in intrusion detection systems specifically addressing aspects such as Correctness, Completeness, Consistency, Continuity, Contrastivity, Covariate Complexity, Compactness, Composition, Confidence, Context, Coherence.  The Proposed Metrics should answer the question: Did the paper address any of these problems?  1) I need the paper in […]