Wireless Security & Forensics

1) In your own words, describe the process of “validation” (per the text).

2) What are the concerns of evidence contamination? How can you protect against this issue?

3) What consent to search requirements would you have if you were asked to provide support in an investigation of a device? Please response with whatever would be necessary.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-1 to 4

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

diss8

 

This week’s discussion topic is Cybersecurity Policy Effectiveness

Instructions: Discuss how you would evaluate the effectiveness of the Social Engineering policy you addressed in Week #7 in terms of achieving its objectives.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wk8

 

You are tasked as the Cyber Security Director at your new organization with getting a new policy in place with your insurance company to cover any potential cybersecurity issues. In order to obtain this policy, you have to provide the insurance company with a thorough report covering the organization’s systems, and showcasing the work that you have done to bring the organization into shape. Your report should have a solid opening covering how your work has brought about a more solid approach to the principle of Confidentiality, Integrity, and Availability as well as providing a timeline for completion of the work recommended. Secondly, you will then provide summaries of each of the previous 7 assignments covering the key points that highlight the work done. Thirdly, you will create a wrap-up/conclusion explaining your organization’s commitment to solid Cybersecurity Principles as identified by NIST on their website. Finally, you will integrate the content from the previously submitted weekly assignments into the document as appendices for the summaries showing the work you completed in more depth. 

REQUIREMENTS:

  1. 30 – 40 Pages in length in APA format (not including a cover page and reference section) covering all eight course objectives listed below.
  2. Papers need to be double-spaced and in 12-point times new roman font
  3. Cover Page
  4. Introduction/Opening
  5. Timeline
  6. Summaries
  7. Conclusion
  8. Appendices
  9. Reference Section (include all references from all assignments)

MISCELLANEOUS:

  1. Use current and real-world data to make your points, not just the textbook
  2. Your Capstone Project Paper is due by Sunday, not later than 11:59 p.m. Eastern time.

COURSE OBJECTIVES:
CO-1: Examine the various aspects of cybersecurity, including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, and Cyberlaw within Federal and State Laws

CO-2: Deconstruct the processes and goals of cyber forensics investigations, including the importance of search warrants and chain of custody in a forensic investigation of computer-related crimes

CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level, ensuring currency with changing risk and threat environments.

CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level.

CO-5: Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.

CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace.

CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

CO-8: Prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives.  

CATEGORY

4

3

2

1

Multiplier

Total

Introduction

The introduction clearly states the main topic and previews the structure of the paper.

The introduction clearly states the main topic but only partially previews the structure of the paper.

The introduction states the main topic, but does not preview the structure of the paper.

There is no clear introduction of the main topic or structure of the paper.

X 2.5

Paragraph Construction

All paragraphs include introductory sentence, explanations or details, and concluding sentence.

Most paragraphs include introductory sentence, explanations or details, and concluding sentence.

Paragraphs included related information but were typically not constructed well.

Paragraphing structure was not clear and sentences were not typically related within the paragraphs.

X 2.5

Sequencing

Details are placed in a logical order and correspond to the structure presented in the introduction.

Details are sometimes logically placed, but do not correspond to the structure presented in the introduction.

Some details are not in a logical or expected order, and this distracts the reader.

Many details are not in a logical or expected order. There is little sense that the writing is organized.

X 2.5

Transitions

A variety of thoughtful transitions are used. They clearly show how ideas are connected.

Transitions clearly show how ideas are connected, but there is little variety.

Some transitions work well; but connections between other ideas are fuzzy.

The transitions between ideas are unclear or nonexistent.

X 2.5

Supportive Research

Supporting research studies and/or reports are research-based and accurately reported.

Supporting research studies and/or reports are not accurately reported.

Research studies and/or reports do not support the discussion.

Research studies and/or reports are limited and/or inaccurately reported.

X 2.5

Quality of Information

Information clearly relates to the main topic. It includes several supporting details and/or examples. The paper is in APA format and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. It provides 1-2 supporting details and/or examples. The paper is not completely in APA format and the body of the paper is between 8 and 10 pages.

Information clearly relates to the main topic. No details and/or examples are given.The paper is not completely in APA format and the body of the paper is between 8 and 10 pages.

Information has little or nothing to do with the main topic. The paper is completely in APA format and the body of the paper is between 8 and 10 pages.

X 2.5

Conclusion/

Recommendations

The conclusion effectively summarizes the discussion and provides at least two recommendations for further research.

The conclusion summarizes the paper but provides only one recommendation for further research.

The conclusion partially summarizes the discussion, but provides no recommendations.

The conclusion is poorly constructed.

X 2.5

Sources

Citations

References

All sources (information and graphics) are accurately documented in APA. If you had a citation in the body of your work you must have the appropriate reference in the reference section. (Provided at least 10 references)

Two sources are not documented in APA format. If you had a citation in the body of your work you must have the appropriate reference in the reference section. (Provided at least 10 references)

Several sources are not documented in APA format. Not all citations match the reference in the reference section.(Provided less than 10 references)

Several sources are not documented in APA format.Not all citations match the reference in the reference section. Provided less than 5 references)

X 2.5

Mechanics

No grammatical, spelling or punctuation errors.

One grammatical, spelling or punctuation errors.

Two grammatical, spelling, or punctuation errors.

More than two grammatical, spelling, or punctuation errors.

X 2.5

Timeliness

All late submissions have a 10 point (10%) deduction.

10

Total:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 3 IP: Data Definition and Data Manipulation Language

 Description

The case study retail store has provided a list of reports and data manipulation tasks that are needed in the processing of orders for their customers. Answer the following:

  • What structured query language (SQL) statement scripts are needed to create the database schema for the relational database system and manipulate the data in the solution that you are proposing to the company?
  • How does each of these scripts specifically support the goals and objectives of the company?

Review these examples to help you with this assignment.

As indicated in Unit 1, it is assumed that Microsoft SQL Server Express Edition (with management tools) was chosen as the database platform. It can be downloaded for free at this Web site.

The project deliverables are as follows:

  • Data Manipulation Tasks
    • Insert 20 records into each table for testing purposes.
    • Delete an entire order by using the unique identifier for that order.
    • Update the price of a product by using the unique identifier for that product.
    • Add a minimum of 3 of your own data manipulation language (DML) scripts based on the needs and specifications of your retail store.
  • Report List
    • Total revenue (sales) per month, grouped by customer
    • Total revenue (sales) per month, grouped by product
    • Total count of products, grouped by category
    • Add minimum of 3 of your own report scripts based on the needs and specifications of your retail store (one must be a CROSSTAB)
  • SQL (4–5 pages)
    • Include the database definition language (DDL) scripts to CREATE to database schema as described in the entity–relationship (E–R) diagram (Unit 2).
    • Include the database manipulation scripts (DML) that will be used to INSERT, DELETE, and UPDATE data in the proposed database system.
    • Include the SELECT, CROSSTAB, and AGGREGATE FUNCTION statements that will be used to read data from the proposed database system.
    • Provide your analysis as to how this part of the project fulfills the mission and 1 or more goals of the case study organization.
    • Provide the following attachments (in addition to embedding in document):
      • DDL.sql (including CREATE and INSERT statements so that they execute in the correct order [top-down])
      • DML.sql (including DELETE and UPDATE statements so that they can be executed in any order as selected)
      • REPORT.sql (including SELECT, CROSSTAB, AGGREGATE FUNCTION statements so that they can be executed in any order as selected)
    • Note: You will embed each script in the Word document and also provide it as an attachment.
  • All sources should be cited both in-text and in References using APA format.
  • Name the document “yourname_CS660_IP3.doc.”

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 4 IP: Techniques Used in Database Administration

 Description

Key Assignment Draft

The case study retail store is concerned about the possibilities of losing data because of database system malfunctions or downtime. Security is also a major concern to the company because it is common knowledge that engaging in online business can be risky because of known vulnerabilities on the Internet. The company also realizes that its in-store database system is the top priority at this time. What solutions can you propose to effectively manage database transactions, maintain security, and recover the data that are lost from system failure or downtime?

Review these examples to help you with this assignment.

The assumptions are as follows:

  • A high volume of the orders often occurs during the daytime.
  • One person will serve the role of database administrator.
  • The database administrator account will serve as database owner.
  • The transaction log must be backed up.
  • Point-in-time recovery is required.
  • There is an always-on availability group.
  • The ability to purchase products online will be addressed in a future database project.

The project deliverables are as follows:

  • What solutions can you propose to effectively manage database transactions, maintain security, and recover the data that are lost from system failure or downtime?
  • What is your rationale for the transaction management plan, database security procedure, backup plan, and recovery model that you proposed for the case study organization?
  • Database Administration Plan (4–5 pages)
    • Create a database administration plan that is specific to the needs of your retail store.
    • Include a transaction management plan that includes a flowchart for how each transaction will be handled (including rollback and commit cases).
    • Include a database security procedure that includes provisions for access control, user authentication, and availability.
    • Include a backup plan and a recovery model
    • Provide your analysis as to how this part of the project fulfills the mission and 1 or more goals of the case study organization.
  • All sources should be cited both in-text and in References using APA format.
  • Name the document “yourname_CS660_IP4.doc.”

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Testimony

 

Introduction

You were the lead investigator on Operation Stop Hack and have now been subpoenaed as an expert witness in the case against the perpetrators. It is up to you to convey the complexities of the crime and evidence to the jury so they can understand the scientific procedures used in aiding the crime’s resolution.

Instructions

Write a 3–5 page paper in which you:

  1. Analyze the overall procedures for First Responder (cybersecurity) and Incident Handling and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.
  2. Explain the major steps involved in evidence acquisition and how to maintain the integrity of the evidence, outlining any and all repercussions if the evidence is improperly preserved.
  3. Consider the importance of the chain of custody and explain the main reasons why the documentation required to preserve the chain of custody is critical.
  4. Use at least three quality resources

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Web attacks

 

  • Review the Open Web Application Security Project (OWASP)Links to an external site. website. After reviewing the site, what are your thoughts about the OWASP project and why do you think this would be a useful resource? Be detailed in your response. What do you think is a useful purpose of WebGoat? Share a couple of tools from this site and provide a summary of how you think the tool could be useful to you in an investigation. Share the links.

  • What are the top 10 mistakes made in Web development that can be exploited? How might this knowledge help you as a network or security administrator?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risks and Recommendations

 

Your company is exploring the possibility of allowing employees to use their own mobile devices for their work and connect to the internal company network. In your role as the CSO, the CEO has asked you to brief her on what steps can be taken to implement a BYOD policy while reducing the overall risk to the organization as much as possible.

Write your talking points for the CEO, including the associated risks with BYOD, potential security countermeasures, and your initial thoughts on how you would test their implementation to assess the overall risk level. This can be in paragraph form or a bulleted list of your talking points.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Unit 8 Assignment IT 545

 

IT545-3: Analyze scenarios related to wireless, mobile, and cloud infrastructures, as well as disruptive technologies, to determine cybersecurity strategies.

Purpose

The purpose of this assignment is for you to engage in defining a mitigation strategy for a web server attack from within a cloud-based WAN. You will apply biometrics or cryptography as part of the solution.

Assignment Instructions

  1. You are a cybersecurity specialist working for an online retail organization that houses their network and all servers and data in the cloud. The CEO is concerned about the web servers being hacked since they are public facing, and if they are hacked, possible access gained to sensitive customer and employee data. Assume the attack to be similar to the one performed in your lab. For this assignment, make the following assumptions:
    • The organization has an outward facing website that allows customers to view and purchase their products. The web server housing this website is in the organization’s demilitarized zone (DMZ). The DMZ uses a single firewall system. Users place orders and pay using PayPal or a credit card. 
    • Other servers on the cloud-based network house several databases. One holds all customer personal and sensitive information. The second database holds employee personal and sensitive information. There is some encryption of these databases for data at rest, but not for data in transit and data in use (while data is being processed).
    • Also, on the internal network are an email server, print servers, and application servers.
  2. Discuss potential vulnerabilities in this system. 
  3. Discuss in more detail the following:
    • Biometric Authentication
      • Discuss biometric-based authentication types that are relevant in this cloud-based system
      • Select a type of biometric-based authentication you would recommend for this system and justify your recommendation
    • Addition of Encryption for data in transit and data in use (while processed)
      • Discuss why there is an emerging need for encrypting data in use in a cloud environment.
      • Provide a description of homomorphic encryption and provide a justification as to why it should be deployed in this scenario to protect data in use.
  4. Conclusion Paragraph

Assignment Requirements

The paper should be 2–3 pages, use 12 pt. Times New Roman, and be in APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 IP: Variations in Database Systems

 Description

Key Assignment

The case study retail store has expressed a desire to eventually be able to analyze the data that are collected from engaging in business, both in its brick-and-mortar store and in its online store. Because the system had to be redesigned from the ground up, the goal of taking the business online using a Web-based database was pushed back. Eventually, the company wants to be able to run statistical analyses against the data that it is collecting and to be able to drill down through the data to transform them into various desired formats. In addition, the company would like to acquire data sets from other providers to engage in decision-support initiatives. What recommendations can you propose to support these business intelligence goals?

Part 1

Future Database System Implementation Plan (4–5 pages)

  • What fundamental differences exist between object-oriented and object-relational database systems and Web-based database systems?
    • Would these differences impact your retail store?
  • Include details of what changes would need to be introduced to the database if it was used to build a data mart or a data warehouse.
  • Include details of what considerations would need to be made if the database were to become a distributed database.
  • What specific types of business intelligence could be gathered from the database?
    • How would this information assist in the decision-making process for your retail store?
  • How would your retail store benefit from data warehousing in the following areas?
    • Return on investment on business intelligence initiatives (Provide a 3-year estimate.)
    • Competitive advantage (based on local or target area)
    • Increased productivity of decision-makers (related to business process decision-making)
  • How would you address the following data warehousing problems if they occurred in your retail store?
    • Required data were never captured.
    • There is a high demand for disk space and other resources.
    • There are hidden problems with source systems.
  • Provide your analysis as to how this part of the project fulfills the mission and 1 or more goals of the case study organization.

All sources should be cited both in-text and in References using APA format.

Part 2

Argumentation PowerPoint (5-slide PowerPoint excluding title slide and References)

An argument in problem solving is used to permit the problem solver the opportunity to offer a set of reasons or evidence in support of his or her solution and related conclusions from the inquiry and research process. The argument is not an opinion and is not the conclusion restated, but rather a demonstration of the intellectual inquiry that you have made during the problem-solving process. Naturally, for the argument to gain credibility, it must be reinforced with scholarly references because the support of the conclusion comes from the quality of evidence that has been gathered.

There are some different forms of arguments that could be made, as follows:

  • Categorical Arguments: An assertion that there is 1 of 4 relationships between X and Y. You could show these 4 forms as follows:
    • All Xs are Ys.
      • Example: All mice are mammals.
    • No Xs are Ys.
      • Example: No mice are mammals.
    • Some Xs are Ys.
      • Example: Some mice are mammals.
    • Some Xs are not Ys.
      • Example: Some mice are not mammals.
  • Predictive Arguments: A case is made for anticipating or predicting events based on the characteristics of a category (X or Y) or based on the relationship between X and Y. Some sample arguments are below (the combination of X and Y is not represented).
    • All Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.
      • Example: All mice eat cheese. Therefore, the cheese on the table will be eaten by the mouse on the table.
    • All Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.
      • Example: All cheese will be eaten by mice. Therefore, the cheese on the table will be eaten by the mouse on the table.
    • Some Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.
      • Example: Some gray mice eat cheese. Therefore, the cheese on the table may be eaten by the gray mouse on the table.
    • Some Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.
      • Example: Some yellow cheeses are desired by mice. Therefore, the yellow cheese on the table may eaten by the mouse on the table.
    • No Xs have this characteristic, behave this way, or are in this state. Therefore, I predict __ about X.
      • Example: No mice have been found to have 2 tails in this region. Therefore, the mouse in this region will have 1 tail.
    • No Ys have this characteristic, behave this way, or are in this state. Therefore, I predict __ about Y.
      • Example: No ballots were left uncounted. Therefore, the voting system should be fair and equitable.
  • Change Arguments: A case can be made that something is different in the characteristics (or state) of X and/or Y between 2 or more observations made at different times. A change argument is simply a comparison of before and after and any differences that are noted from the first observation to the subsequent observations. When making a case for observed change, you would typically use a different form of argument (categorical or predictive) to explain why that change occurred.
    • Example:
      • At observation 1, all Xs had this characteristic (or were in this state).
      • At observation 2, all Xs do not have this characteristic (or were not in this state).
      • Therefore, X no longer possesses this characteristic (or is no longer in this state).

Envision that you now have to present your solution to your retail store client. You need to make a formal presentation to a group of stakeholders, and you need to be prepared to answer their questions. Create a PowerPoint presentation in which you provide the following:

  • In the Notes pages of each slide and based on the context of the information on that slide, provide a narrative of 2–3 paragraphs of your rationale for the solution to the problem described in the IP.
  • On each slide, identify the type(s) of argument(s) that you are making for the problem presented in the unit IP and the evidence that you have to support the argument(s)
  • All sources used to support your argument and solution should be cited both in-text (on slide or in Notes page) and on a References slide using APA format.
  • Name the documents “yourname_CS660_IP5.doc” and “yourname_CS660_IP5.ppt” respectively.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now