CS ALL 3
U CS Week 2
1)
2) Week Two Assignment
Learning About Cookies as Spyware.
Research what kind of information cookies store. You might find the following websites helpful:
www.allaboutcookies.org/
www.howstuffworks.com/cookie1.htm
Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.
3) Week Four Discussion
Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
4) Week Four Discussion
Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.
Write a brief essay describing those laws and what they mean.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
5) Week Five Assignment
Learn About Defending Against DDoS
Using WORD, write an ORIGINAL brief essay of 300 words or more:
Find a DoS attack that has occurred in the last six months
You might find some resources at www.f-secure.com.
Note how that attack was conducted.
Write a brief explanation of how you might have defended against that specific attack.
6) Week Six Assignment
Use a search engine to find the names of five different cyber viruses.
Using WORD, write a short paragraph on each.
Use your own words and do not copy the work of another student.
7) Week Seven Discussion
Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
8) Week Eight Assignment
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after Davids departure, it is discovered that a good deal of the ABC Companys research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect Davids alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
9) Week Nine Assignment
1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
2). Send a brief message (ten words minimum) using the Caesar Cypher
10) Week Ten Assignment
Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.
Write between 200 and 300 words.
11) Week Eleven Assignment
Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
12) Week Eleven Submit Final Project Topic
Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.
Possible Computer Security Research Project Topics
Anonymous
Citizen Rights vs Security
Cloud Computing
Computer Forensics
Data Center Security
Disaster Recovery
Edward Snowden Traitor or Hero
Encryption
Hardware and Software Security
I Love You virus
Keyloggers
13) Week Twelve Assignment
Do some basic research on security certifications.
See https://www.giac.org/.
Write a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.
14) Week Thirteen Project Abstract
Your final project material is due this week.
Submit your project abstract here.
13.1) Week Thirteen Discussion
Using the Web or other resources, research an example of Cyber Terrorism.
Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.
Read and respond to at least two other students Discussions.
Post your initial response by the end of the day on Thursday and reply to at least two other students by the end of the day on Sunday.
Post between 200 and 300 words.
15) Week Fourteen Final Project Detail
Gather all final project material:
final paper
PowerPoint
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|