Discipline: Cyber security

Assignment: Lab: Ethical Hacking: Performing passive reconnaissance on a target organizationAssignment: Lab: Ethical Hacking: Performing passive reconnaissance on a target organization

Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could passive reconnaissance be done in this type of environment? What security controls would you recommend implementing to avoid this type of passive reconnaissance? Competencies Measured By successfully completing this assignment, you will demonstrate […]

An essay outlining your educational and career goals, knowledge and interest in the cybersecurityAn essay outlining your educational and career goals, knowledge and interest in the cybersecurity

An essay outlining your educational and career goals, knowledge and interest in the cybersecurity discipline, your ability to identify and analyze problems to present appropriate solutions, and your ability to communicate and create a collaborative environment that supports the exchange of ideas (2 pages maximum). my name must show on every page   I have […]

securing students records and enhancing privacy for personal data in smart campus using a blockchain method.securing students records and enhancing privacy for personal data in smart campus using a blockchain method.

introduction about smart campus  (200) words , With at least five keywords mentioned at the end.  Introduction. Research Problem. research Objectives. research Question.  Literary survey. Research design and methodology.  Research Management Plan. Work Plan. References List.  Expected results and ways to benefit from them. use the referncing in EEE style

APA Paper when you are ready. Due: August 15, 2024 (8-15-24) Use Times New Roman Font, 12pt Copy Text from any Online Article Include a Cover Page Include a Citation Include a Footnote Include a Reference PageAPA Paper when you are ready. Due: August 15, 2024 (8-15-24) Use Times New Roman Font, 12pt Copy Text from any Online Article Include a Cover Page Include a Citation Include a Footnote Include a Reference Page

professor wants an apa  Use Times New Roman Font, 12pt Copy Text from any Online Article Include a Cover Page Include a Citation Include a Footnote Include a Reference Page    

The Need for Information Security Management for Small to Medium Size Enterprises (SMEs)The Need for Information Security Management for Small to Medium Size Enterprises (SMEs)

Research the topic of Information Security Management from quality sources and write a short essay on the topic of:   The Need for Information Security Management for Small to Medium Size Enterprises (SMEs)   The essay should not exceed 2500 words, excluding references.   Your essay should generally explore 2-3 topics among the ones listed […]

A structured risk assessment and management plan conforming to an appropriate recognised industry standard or methodology. You must state which standard or methodology you have applied and why, by giving examples of how you have applied it at each stage.A structured risk assessment and management plan conforming to an appropriate recognised industry standard or methodology. You must state which standard or methodology you have applied and why, by giving examples of how you have applied it at each stage.

SUMMATIVE ASSESSMENT BRIEF Author Duncan Greaves Assessment Type Summative assignment Weighting 100% Release Week 3 Deadline Monday following Week 8, 13:00 (UK time) * * If this date falls on a UK public holiday or a University of York closure day, the submission date will change. Please check the submission point in the ‘Assignments’ area […]

write a 2 paragraph (500 words) synopsis detailing an article you read from the “In the News”write a 2 paragraph (500 words) synopsis detailing an article you read from the “In the News”

For this module there are no “Labs” for you to work on. Instead please write a 2 paragraph (500 words) synopsis detailing an article you read from the “In the News” Section of this module. Please include your view and input into the topic of discussion. utilize other articles on the topic to gain a […]

1. What are some key areas of cybersecurity that have changed as a result of the terrorist attacks on September 11, 2001?1. What are some key areas of cybersecurity that have changed as a result of the terrorist attacks on September 11, 2001?

Using the Internet or the text to back up your opinions discuss the following questions. You should not answer all the questions in one post, but the class should work through them as a group. You should post at least three times per week on each graded discussion and your work will be graded for […]

Final Project Submission: Operating System Upgrade Implementation Report and PresentationFinal Project Submission: Operating System Upgrade Implementation Report and Presentation

Submit a comprehensive document incorporating all components of the milestones, supported by a brief presentation of the implementation process for the provided components of an operating system upgrade plan. The audience is your Help Desk staff and interns. Using the scenario given, describe the implementation tasks for the operating system upgrade and provide documentation of […]

3. How do organizations like Infrared help cybersecurity professional’s network work with law enforcement professionals?3. How do organizations like Infrared help cybersecurity professional’s network work with law enforcement professionals?

   Discussion Topic 2   Using the Internet or the text to back up your opinions discuss the following questions. You should not answer all the questions in one post, but the class should work through them as a group. You should post at least three times per week on each graded discussion and your […]