Category: Cyber Security
-
M4.2 Bonus SQL problems
M4.2: Practice Problems Name: Instructions: These SQL practice problems are designed as a skill-building journey, progressing from foundational queries to more advanced problems that will help you prepare for the Final Exam. When using Generative AItools, you are required to follow this e on how to use GenAI tools to learn SQL coding responsibly. Each…
-
cyb 400 project 5-1
see rubric… Using your analysis from your Project One Milestone assignment, you will now make your remediation recommendations. Requirements: see rubric plz
-
CYB 310 LAB 5-1
(INFOSEC) Closing Ports and Unnecessary Services username: mhussaini password: Urbangray100$ Requirements: see rubric plz
-
cist1001 savannah tech evaluating hardware
Game Devices: Use the web to research three popular recent game consoles. Choose five characteristics to compare the game consoles, such as Internet capabilities, multiplayer game support, storage capacity, television connection, and game controllers. Write your report in paragraph form and do not copy charts or lists. Requirements: 1-2 pgs
-
IAS 5015 FUNDS AND CRYPTOGRAPGHY
This is week 4 Discussion post Research a recent (within the last two years) specific case, or speak from your own personal or professional experience, of a significant security breach that involved compromising a network or host firewall implementation in a computing environment. Discuss the following: Attack vectors and techniques used to carry out the…
-
CYBR 520 Human Aspects of Cybersecurity
Peer Review Template: REVIEWER NAME: [Your Name]REVIEWEE NAME: [Classmate’s Name] 1. STRENGTHS (Required – minimum 100 words) What aspects of this phishing campaign plan are most effective? Consider target audience selection, psychological principles applied, and potential effectiveness. 2. SUGGESTIONS (Required – minimum 100 words) What specific improvements would make this campaign more effective? Offer at…
-
Macintosh (Mac) Operating System Versions Report
Write a 1- to 2-page report comparing different versions of Macintosh operating systems that does the following: Compares at least three different versions of Macintosh operating systems Examines changes in major system functions Examines changes in management of volatile data Examines changes in security such as encryption and biometrics Discusses aspects of each version of…
