Category: Cybersecurity

  • Group project

    Prepare a PowerPoint presentation which summarizes your team’s project Ensure that any graphics or screen shots used in the slides are large enough to be easily readable (refer to the “NU-CSIA Examples of Good and Poor Use of Graphics.pdf” under Course Resources | Course Docs) Limit the number of slides with actual content to 7;…

  • Progress report

    Based on the Technical Communication textbook, under “Projects” (p. 491) at the end of Chapter 20, Item #1 under the ‘General’ category: Each student will separately write a progress report to the instructor, describing the progress your team has made through the end of Week Three on your Course Team Project. Use the guidelines suggested…

  • Design Network for k-12

    instructions are listed in the file below. Attached Files (PDF/DOCX): Project Instructions (1).pdf Note: Content extraction from these files is restricted, please review them manually.

  • Design Network for k-12

    instructions are listed in the file below. Attached Files (PDF/DOCX): Project Instructions (1).pdf Note: Content extraction from these files is restricted, please review them manually.

  • Unit 7, Assignment 1: Cryptography and Cybersecurity Policie…

    Assignment Details NOTE: Unit 7 has two assignments: Assignment 1 and Assignment 2. Each will be submitted to its individual Dropbox. Unit 7, Assignment 1: Cryptography and Cybersecurity Policies Outcomes addressed in this activity: Unit Outcomes: Apply cybersecurity policies related to cryptography. Analyze cybersecurity policies pertaining to data encryption. Analyze cybersecurity policies regarding key management…

  • Assignment 4

    Please include a screenshot of the assignment showing it is green. Write a single report (Word or pdf) that includes the solutions. For each activity, you should provide a detailed description of the steps (e.g., input used for the attack, examining HTTP requests, etc.) you took to solve the activity, along with a screenshot of…

  • assigenment 2

    This assignment has three parts: Part One: ** Analyze, compare the performance implications between Linux vs Windows Operating Systems or MacOS – depending which OS you have (some points to describe, explain, compare and analyze) security, encryption, file structure, access controls, applications use for, efficiencies, vulnerabilities. Part Two: ** Drawn a diagram for Linux OS…

  • 8-2 Cyber Playbook Submission

    CYB 230 Playbook Submission Guidelines and Rubric Prompt Using this course’s cyber playbook, submit a screenshot of the item that you feel is the most valuable to you (now or in the future) and explain your reasoning. What to Submit Submit a screenshot from your current playbook and two to three sentences in a Microsoft…

  • Business Security

    Write a two-page, single-spaced summary of what you learned from the reading assignment. Use one inch margins and 12 point Times New Roman font in your document. Upload your document here. You should use relevant figures, tables, screen shots, or other supplemental items to enhance your submission. These are in addition to the two full…

  • Anything

    Instructions in picture below