Entries by Daphne Hanson

Cybersecurity and cryptography

Cybersecurity and cryptography are separate entities but are still connected. Cybersecurity refers to keeping data secure, while cryptography is one method used to protect sensitive information. These two are similar in that aspect of data security. Cybersecurity refers to procedures implemented to secure networks, programs, and devices from unauthorized users. In contrast, cryptography refers to […]

Impact of Spyware and Adware

Impact of Spyware and Adware Using the web or other resources, find out the following facts: How common are spyware and adware?, What effects do these have on businesses?  What steps do you recommend to help reduce the threat of spyware and adware?

Cryptography Reflection Assignment

Cryptography Reflection Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could […]

Data Security Standard compliance

Payment Card Industry Data Security Model (PCI DSS) is not a law, but rather a set of industry standards that are mandated for any organization processing online payments. What are the benefits of The Payment Card Industry Data Security Standard compliance as promoted by the PCI security standards council? Explain how PCI standards can protect cardholders’ […]

Using encryption and trustworthy cryptographic algorithms

How would I prepare a short management brief for technical and non-technical staff members on the subject of protecting information using encryption and trustworthy cryptographic algorithms?  I want to address non-repudiation and how the sources and contents of important documents can and should be authenticated using digital signatures and hashing.

Cloud computing

How has cloud computing influenced the IT field? How will the cloud computing concepts you learned in this course influence your future? What will you do with the information and skills you learned in this course, especially as you start or advance in your career as an IT professional? Based on what you know today, […]

The snort lab activity and the detection of EternalBlue

This task is related to the snort lab activity and the detection of EternalBlue using eternalblue-success-unpatched-win7.pcap. A) Briefly describe how you installed the rules from https://asecuritysite.com/forensics/snort and how you ran snort (no more B) Describe the detection outcome in one sentence. Copy the first 3 lines of relevant snort events into the answer

Define and explain digital forensics

Define and explain digital forensics Explain the difference(s) between data and metadata. Explain the necessity for duplicates of evidence. Describe how the hash value produced by EnCase Imager compares to the value produced by FTK Imager. Describe how the hash value produced by E3 Commander compares to the value produced by FTK Imager.

Evidence of normal and abnormal system activity

Log files can help provide evidence of normal and abnormal system activity, as well as valuable information on how well security controls are doing their jobs. Regulation, policy, or log volume might dictate how much log information to keep. If a log file is subject to litigation, how long must a company keep it? O […]

General Data Protection Regulation (GDPR)

Compare and contrast the EU General Data Protection Regulation (GDPR), the U.S. CLOUD Act, and the California Consumer Privacy Act. Explain what digital privacy laws are doing to stop the collection of personal information in relation to the above question Detail how laws could be strengthened, changed, or lessened to allow individuals the choice of […]