Cyber Security

Search for question

Questions & Answers

Certificate in Cyber Security Module 4: Introduction to Malicious Software and Ethical Hacking (ISTMSE4)


Cracking Flash Drive Crypto Crypto cracking today usually requires a lot of dedicated custom computers and the continual work of a cryptoanalyst (a branch of what is called "pure mathematics" in the university system). As a result, most hackers today focus their energies on getting the information that can quickly decrypt something - for example, the encryption used to store information in most simple databases (e.g. the Ashley Madison database that was recently hacked) uses simple XOR obfuscation. Simple USB drive encryption also used simple XOR obfuscation too! Other systems still rely on substitution ciphers (which can be cracked with frequency analysis). Two examples that you explore to demonstrate how easy it is to crack simple crypto (XOR obfuscation and substitution ciphers) is in the "Crypto Extras.zip" file that your instructor will provide. Read the Crypto Extras.doc file within that zip with directions and supporting theory.


Topic 1: "Cyber Security Awareness: Protecting Citizens from Cyber Attack" In writing this assignment, the following aspects will have to be taken into account: 1. What is Cyber Security Awareness?


3. What Governments could be doing to support Cyber Security Awareness.


4. Social Networking and the risks associated with Social Media.


You will write a 750 words report summarising your analysis of foundational cyber security principles and the relationship between them as well as regulatory and compliance requirements related to cyber security incidents for a corporate organisation. This is an individual assessment task. You are required to submit your solution for givn problems along with the exhibits to support findings, and a bibliography Q1.2: Analyse and interpret information in the table Provide a brief critical analysis, interpretation and discussion of the data in the table. Support your analysis with good evidence and examples. Question 2: Carole left her company-issued laptop in a locked car while running an errand. The car was broken into, and the laptop stolen. Analyse and reflect on the laptop incident under appropriate privacy legislation by considering the following questions: • _Why should XYZRG consider the incident may have violated privacy legislation? • _What obligations does XYZRG have under privacy legislation, if any, what those obligations are, and why XYZRG need to comply to those obligations?


Write a case study paper that provides the following: • Background of the company and business objectives. • The architecture of the data warehouse. • The source input systems and the scale at which data is generated. • Data model: a diagram of the star schema with dimensions and fact tables describing how attributes of all tables would meet the requirement of generating actionable business intelligence data. • The ETL processing that is required. • The types of output reporting. • Identify various stakeholders and how they will use the reports. • Are there any data mining techniques being used? How is ad-hoc reporting supported? • Identify any opportunities to apply big data technologies on the data warehouse and discuss how it could be beneficial. This is also a good place to discuss the pros and cons of building a data lake. • Discuss any unique challenges that were encountered during the development of the data warehouse project and how they overcame them. • Submissions should be between 1,750 words and 2,500 words in length.


How does a brute force password attack differ from a dictionary password attack?


Go to https://cve.mitre.org. What type of site is this, and what information can it provide? Now, paste in the URL then click Search CVE List, and enter "Ransomware" https://cve.mitre.org/cve, in the search field. Click Search again. What information is provided? How would this be useful? Click on one of the named results. What additional information is provided? How could this be useful?


You have been hired as a security engineer at a small company, and your first task is to analyze and evaluate their architecture for their website. Your new boss Taylor hands you an architecture diagram and gives you a quick overview of the setup: • Our service lets customers upload files of 3D models to our web server, which then arranges for the 3D model to be printed in the manufacturing lab. Users must have an account to use our service. • We have two web servers behind a load balancer. The web server traffic then passes through a traditional firewall to the application servers. • Two application servers run on virtual machines with Ubuntu as their operating system, and the firewall handles load balancing between the application servers. The application servers send files to the Design Server that uses Windows 10 as its operating system. The Design Server sends the printing jobs to the 3D printer. Given the following architecture diagram, write a report that: 1. Gives a summary of the architecture as presented. 2. Identifies potential security risks of the architecture. 3. Proposes modifications or mitigations to the architecture to reduce the security risks you listed in #2, including any downsides to the changes. 4. Explains how you would perform a vulnerability assessment for the company's systems. Please address the entire architecture, specifying which aspects of security you would assess, which tools you would use for the assessment, and how each of those tools would be useful for this assessment.


Please read the below the paper, "Chapter 16 - Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities, and address the 2 questions: 1) What are five methods for providing security and privacy in the vehicle to vehicle communications. 2) Please provide five future research directions in the vehicle to vehicle communications.


No Question Found forCyber Security

we will make sure available to you as soon as possible.