Category: Cybersecurity

  • Intellectual Property Theft Case Study Analysis

    Theft of IP Case 1 The insider worked as a chemist and later a product development director at a paint manufacturing plant. He made a business trip abroad to work with one of his organizations subsidiaries, and a coworker noticed that he was unusually interested in a competitor based in another country. A few weeks…

  • Intellectual Property Theft Case Study Analysis

    Theft of IP Case 1 The insider worked as a chemist and later a product development director at a paint manufacturing plant. He made a business trip abroad to work with one of his organizations subsidiaries, and a coworker noticed that he was unusually interested in a competitor based in another country. A few weeks…

  • Incorporate and Justify Framework for Selected Interest Area

    Background Now that you have had an opportunity to explore and analyze theoretical frameworks and industry standards, it is time to Incorporate a framework that appropriately addresses your interest area from Lesson 2. Identify the selected IT governance framework that offers the best solution grounded in established ideas as your conceptual framework. For this assignment,…

  • Investigate Literature for Selected Interest Area

    Assignment : Investigate Literature for Selected Interest Area InstructionsBackground For this task, you will use the University library to perform research in your chosen problem domain of IT policy and strategy as part of IT Governance framework. Find 2 articles that involve some form of empirical research from the past 4 years. This could involve…

  • Discussions

    Two sperate discussions that must be 250+ words each , following instructions in the document that meet highest level in rubrics. Must be familiar and comfortable in Cyber security topics

  • vlans

    As a senior network administrator, you are tasked with training junior network admins on VLANs. Write a minimum 2-page APA formatted essay on how to configure VLAN including trunking. Your essay should be written like a training guide where you are training junior network administrators on how to properly configure VLAN including trunking. Make sure…

  • CYBERCRIME PAPER Technical, Social, and Legal

    Paper Structure Introduction (1/2 – 3/4 page) Hook the reader with a real-world example or statistic about your chosen cybercrime Clearly define the specific form of cybercrime you will analyze Preview the three analytical dimensions (technical, social, legal) that structure the paper End with a thesis statement that frames your argument (e.g., “While [crime] may…

  • Policy

    Policies provide the foundational requisites of a cybersecurity program. Policies are pivotal in protecting assets and shaping the procedures ultimately intended to reduce organizational risk. In your journal, describe the purpose of an acceptable use policy, an incident response policy, and a password management policy. Explain why each is important to an organization. Your journal…

  • Research Assignment: Does children’s interaction with AI-bas…

    Final Paper (30%) Students are expected to develop a research question (Does children’s interaction with AI-based platforms influence their online and offline social behavior?) that falls within one of the themes discussed in class. They will select an artifical intelligence chatbot (e.g., ChatGPT, Gemini, Claude, Copilot, DeepSeek) and ask it to generate a three page…

  • Cyber-Attacks Against IoT Devices

    In this discussion forum, identify three types of cyber-attacks that could be launched against IoT devices in the aviation ecosystem. In your discussion of each attack (3 total), describe the IoT system and how it is used in the aviation ecosystem. Explain the system’s vulnerabilities that open it to an attack, and then identify and…