Category: Cybersecurity
-
CYBERCRIME PAPER Technical, Social, and Legal
Paper Structure Introduction (1/2 – 3/4 page) Hook the reader with a real-world example or statistic about your chosen cybercrime Clearly define the specific form of cybercrime you will analyze Preview the three analytical dimensions (technical, social, legal) that structure the paper End with a thesis statement that frames your argument (e.g., “While [crime] may…
-
Policy
Policies provide the foundational requisites of a cybersecurity program. Policies are pivotal in protecting assets and shaping the procedures ultimately intended to reduce organizational risk. In your journal, describe the purpose of an acceptable use policy, an incident response policy, and a password management policy. Explain why each is important to an organization. Your journal…
-
Research Assignment: Does children’s interaction with AI-bas…
Final Paper (30%) Students are expected to develop a research question (Does children’s interaction with AI-based platforms influence their online and offline social behavior?) that falls within one of the themes discussed in class. They will select an artifical intelligence chatbot (e.g., ChatGPT, Gemini, Claude, Copilot, DeepSeek) and ask it to generate a three page…
-
Cyber-Attacks Against IoT Devices
In this discussion forum, identify three types of cyber-attacks that could be launched against IoT devices in the aviation ecosystem. In your discussion of each attack (3 total), describe the IoT system and how it is used in the aviation ecosystem. Explain the system’s vulnerabilities that open it to an attack, and then identify and…
-
Cyber-Attacks Against OT/IoT Systems
In this assignment, you will build on your knowledge from Modules 6 and 7 where we discussed cyber-attacks against OT and IoT systems. Acting as an aviation consultant to the director of a large international airport, you have been asked to identify OT and IoT technologies used in airport and aircraft operations. Provide the director…
-
Incident Response Checklist
For this assignment, you will prepare a short paper that details the phases and steps of incident response using three example cyber-attacks. You will provide an incident response checklist for each of the anticipated cyber-attacks and detail the specific elements that would prepare an organization to prevent or respond to the example cyber-attacks. Your paper…
-
Incident Response and Cyber Resilience
In this activity, you will participate in a discussion of how incident response supports the goals and objectives of cyber resilience: prepare, prevent, respond, and recover. You will discuss how incident response in aviation cybersecurity can prevent or mitigate cyber-attacks by providing examples and supporting discussion.
-
Part 2 Assignment: Written Portion Requirements
lab details Unit 4 Lab: Static and Dynamic Malware Analysis Outcomes addressed in this activity: Unit Outcomes: Obtain any publicly available information on a specific malware form. Review the contents of unpacked and unencrypted malware. Review some of the capabilities of malware. Use several malware analysis tools. Course Outcome: IT411-2: Plan appropriate methods to secure…
-
Scripting Data Capture
Unit 5 Discussion Scripting Data Capture In the lab, you will issue commands to identify system characteristics. Using commands, you will capture the results to a file. Discuss the possibilities of putting those Linux and Windows commands in a script. What are the advantages of scripting the data capture? What are the disadvantages of scripting…
-
Encryption failures in organizations involving at-rest and i…
Your assignment this week will require researching two organizational failures involving encryption and discussing ways you might work to reduce these types of failures. First, find an organization that suffered a breach as a result of a failure to implement encryption at-rest. This should be easy, look for an organization that suffered a breach as…
