Category: Cybersecurity

  • Cyber-Attacks Against OT/IoT Systems

    In this assignment, you will build on your knowledge from Modules 6 and 7 where we discussed cyber-attacks against OT and IoT systems. Acting as an aviation consultant to the director of a large international airport, you have been asked to identify OT and IoT technologies used in airport and aircraft operations. Provide the director…

  • Incident Response Checklist

    For this assignment, you will prepare a short paper that details the phases and steps of incident response using three example cyber-attacks. You will provide an incident response checklist for each of the anticipated cyber-attacks and detail the specific elements that would prepare an organization to prevent or respond to the example cyber-attacks. Your paper…

  • Incident Response and Cyber Resilience

    In this activity, you will participate in a discussion of how incident response supports the goals and objectives of cyber resilience: prepare, prevent, respond, and recover. You will discuss how incident response in aviation cybersecurity can prevent or mitigate cyber-attacks by providing examples and supporting discussion.

  • Part 2 Assignment: Written Portion Requirements

    lab details Unit 4 Lab: Static and Dynamic Malware Analysis Outcomes addressed in this activity: Unit Outcomes: Obtain any publicly available information on a specific malware form. Review the contents of unpacked and unencrypted malware. Review some of the capabilities of malware. Use several malware analysis tools. Course Outcome: IT411-2: Plan appropriate methods to secure…

  • Scripting Data Capture

    Unit 5 Discussion Scripting Data Capture In the lab, you will issue commands to identify system characteristics. Using commands, you will capture the results to a file. Discuss the possibilities of putting those Linux and Windows commands in a script. What are the advantages of scripting the data capture? What are the disadvantages of scripting…

  • Encryption failures in organizations involving at-rest and i…

    Your assignment this week will require researching two organizational failures involving encryption and discussing ways you might work to reduce these types of failures. First, find an organization that suffered a breach as a result of a failure to implement encryption at-rest. This should be easy, look for an organization that suffered a breach as…

  • Encryption failures in organizations involving at-rest and i…

    Your assignment this week will require researching two organizational failures involving encryption and discussing ways you might work to reduce these types of failures. First, find an organization that suffered a breach as a result of a failure to implement encryption at-rest. This should be easy, look for an organization that suffered a breach as…

  • Comprehensive Cloud Solution Design

    Attached Files (PDF/DOCX): Comprehensive Cloud Solution.docx Note: Content extraction from these files is restricted, please review them manually.

  • Week 3

    As a team using the provided APA template, based on your prioritized top 10 InfoSec policies, create a full draft version of the highest priority policy (Deliverable #3). Use the samples and example policies provided below as guides for formatting your policy. The heading must contain at least the following information: Policy Number, Policy Title,…

  • Week 3

    As a team using the provided APA template, based on your prioritized top 10 InfoSec policies, create a full draft version of the highest priority policy (Deliverable #3). Use the samples and example policies provided below as guides for formatting your policy. The heading must contain at least the following information: Policy Number, Policy Title,…