support@qualityresearchpapers.com

+1(316)4441378

+44-141-628-6690

CS ALL 3

  

U CS Week 2

1)  

2) Week Two Assignment

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

3) Week Four Discussion

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

4) Week Four Discussion

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

5) Week Five Assignment

Learn About Defending Against DDoS

 

Using WORD, write an ORIGINAL brief essay of 300 words or more:

Find a DoS attack that has occurred in the last six months

You might find some resources at www.f-secure.com.

Note how that attack was conducted.

Write a brief explanation of how you might have defended against that specific attack.

6) Week Six Assignment

Use a search engine to find the names of five different cyber viruses.

Using WORD, write a short paragraph on each.

Use your own words and do not copy  the work of another student.

7) Week Seven Discussion

Use the Web to search for examples of hacks that made the news.

Write a brief description of the attack indicating what type of hack was involved. 

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

8) Week Eight Assignment

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after Davids departure, it is discovered that a good deal of the ABC Companys research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect Davids alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

9) Week Nine Assignment

1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

2). Send a brief message (ten words minimum) using the Caesar Cypher

10) Week Ten Assignment

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.

 

Write between 200 and 300 words.

11) Week Eleven Assignment

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

12) Week Eleven Submit Final Project Topic

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

Possible Computer Security Research Project Topics

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

13) Week Twelve Assignment

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

14) Week Thirteen Project Abstract

Your final project material is due this week.

Submit your project abstract here.

13.1) Week Thirteen Discussion

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Read and respond to at least two other students Discussions.

Post your initial response by the end of the day on Thursday and reply to at least two other students by the end of the day on Sunday.

Post between 200 and 300 words.

15) Week Fourteen Final Project Detail

Gather all final project material:

final paper

PowerPoint

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

Completed Orders
# Title Academic Level Subject Area # of Pages Paper Urgency
[order_calculator]