Cybersecurity and Digital Forensics 2025

Author jcran011

Use Electric Grid Security and Resilience as well any other source to assist in answering (be sure to cite your source).

The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Pick one or several of these areas of cyber threats and discuss. Intellectual property threat can be a type of malicious attack in many… Continue Reading →

Use Bourgeois: Chapter 6, Information Systems Security to assist in answering.

Just what is a framework and why can it be useful?  Briefly describe the 5 core activities of NIST’s Cybersecurity framework.

A framework is a structure you can build upon whether actual or conceptual. A framework is a starting point to assist in development to guide and make the process speed up to best reach the goals. It is also a… Continue Reading →

Discussion Board 5

Review the article below by Orin Kerr, an important, scholarly voice in so many Fourth Amendment debates, and preferably other sources to help form your opinions about the legal, policy and technical challenges posed by encryption. The impact of encryption… Continue Reading →

Describe some actions or techniques that can be used to mitigate or stop the impacts of malicious applications.  Are some of these methods more effective than others?  Provide an example of a cyber attack that resulted from the execution of malicious code.  There are plenty of examples that can be queried from the Internet.

There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at… Continue Reading →

How do engineers make cyber networks safer?

There are 3 main engineering focuses that work to protect cybersecurity functions. These jobstypically work together to bring the highest protection against cyber threats. The goals for all 3are aligned in completing the security triad of confidentiality, integrity, and availability.Achieving… Continue Reading →

Describe three ways that computers have made the world safer and less safe.

Technology has changed throughout the years which has helped change many aspects of the way people live their daily lives. Examples of this can be shown through healthcare keeping charts on the computer along with vitals everyone can view. This… Continue Reading →

Writing Assignment 1 for CYSE 406

Discussion 4

https://www.lawfareblog.com/lawfare-podcast-episode-96-james-comey-going-dark Then use what you’ve learned to: 1. Identify in your initial post a point(s) or general assertion(s) by former FBI Director Comey that surprised you, challenged you or led you to agree or disagree with him, and explain why…. Continue Reading →

Suppose you are an entrepreneur, and you want to sell a product and/or service using online/digital resources. You also want to protect it from copycats or those who want to exploit your business name, reputation and hard work. Name the business and propose a product or service it provides, and explain how you would use intellectual property (IP) protections, such as patents, trademarks and trade secrets to ensure you and your business reap the rewards. Consider state protections too.

If I could create my own business I would name it Book Genie. This website would collect the names of all books and upcoming releases. The purpose of the service would be to help others find accurate books based on… Continue Reading →

Discussion 2

Question 1: What are some important reasons to a) support or b) oppose his Julian Assange’s position in defending the work and mission of Wikileaks?  Question 2: In your opinion, is Assange a hero, a criminal or both, or neither?… Continue Reading →

Short Research Papers for CYSE 300

Internet Protocol Version 6 (IPv6) was designed to address the limitations of Version 4 (IPv4).  What cybersecurity-related enhancements have been incorporated into IPv6?  The adoption of IPv6 has been pretty slow across both the public and private sectors.  What reasons can you attribute to this?  Cite resources and references that support your assertions.

The most noticeable difference between IPv4 and IPv6 is that IPv4 uses a 32-bit address and IPv6 uses a 128-bit address. While there may not be a speed-related difference IPv6 has more qualities such as a built-in network security layer…. Continue Reading →

PKI is used extensively in the U.S. federal government. However, it has not caught on in the business and commercial sectors.  Why is this the case?  In your opinion, what is the future of PKI?  Do alternate methods such as those proposed by the FIDO Alliance (URL: https://fidoalliance.orgLinks to an external site.) offer a viable alternative to PKI?

PKI or Public Key Infrastructure is one of the most common forms of encryption and manages public key encryptions. PKI is used in the government, but not in business sectors due to the requirements to manage the certificates. Without proper… Continue Reading →

What is the best value that should be assessed when evaluating the worth of an information asset to the organization – replacement cost or lost income while repairing or replacing?  What is the likelihood value of a vulnerability that no longer requires consideration? Cite resources and references that can support your assertions.

The best value to a company can vary. I believe each product or system has its own set of benefits. One system is popular to buy and therefore lost income would hurt the company as the time to fix or… Continue Reading →

« Older posts Newer posts »

© 2025 Jasmyn Wilhelm — Powered by WordPress

Theme by Anders NorenUp ↑