Cybersecurity and cryptography

Cybersecurity and cryptography are separate entities but are still connected. Cybersecurity refers to keeping data secure, while cryptography is one method used to protect sensitive information. These two are similar in that aspect of data security. Cybersecurity refers to procedures implemented to secure networks, programs, and devices from unauthorized users. In contrast, cryptography refers to the encryption/decryption of coded language that only the sender and intended recipient can decipher. Both methods are vital to the safety of the users’ sensitive information. A common management requirement is that "all external web traffic must flow via the organisation’s web proxy. "However, that requirement is easier stated than implemented. Discuss the various problems and issues, possible solutions, and limitations with supporting this requirement. In particular, consider issues such as identifying exactly what constitutes "web traffic" and how it may be monitored, given the large range of ports and various protocols used by web browsers and servers. (12 marks) ji. The encryption scheme used for UNIX passwords is one way; it is not possible to reverse it. Therefore, would it be accurate to say this is, in fact, a hash code rather than encryption of the password? (8 marks)

Impact of Spyware and Adware

Impact of Spyware and Adware Using the web or other resources, find out the following facts: How common are spyware and adware?, What effects do these have on businesses?  What steps do you recommend to help reduce the threat of spyware and adware?

Cryptography Reflection Assignment

Cryptography Reflection Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Describe situations in your life when you might need to use encryption or secret codes. How important would it be to have enough understanding of the subject of cryptography to assess the strength of the code you used?

Data Security Standard compliance

Payment Card Industry Data Security Model (PCI DSS) is not a law, but rather a set of industry standards that are mandated for any organization processing online payments. What are the benefits of The Payment Card Industry Data Security Standard compliance as promoted by the PCI security standards council? Explain how PCI standards can protect cardholders’ data.

include citations.

Using encryption and trustworthy cryptographic algorithms

How would I prepare a short management brief for technical and non-technical staff members on the subject of protecting information using encryption and trustworthy cryptographic algorithms?  I want to address non-repudiation and how the sources and contents of important documents can and should be authenticated using digital signatures and hashing.

Cloud computing

  • How has cloud computing influenced the IT field?
  • How will the cloud computing concepts you learned in this course influence your future?
  • What will you do with the information and skills you learned in this course, especially as you start or advance in your career as an IT professional?
  • Based on what you know today, what kind of IT role do you envision yourself in, and why?
  • What business, personal, or social problems are you passionate about that can be solved or improved through cloud computing?

The snort lab activity and the detection of EternalBlue

This task is related to the snort lab activity and the detection of EternalBlue using eternalblue-success-unpatched-win7.pcap.

A) Briefly describe how you installed the rules from https://asecuritysite.com/forensics/snort and how you ran snort (no more

B) Describe the detection outcome in one sentence. Copy the first 3 lines of relevant snort events into the answer

Define and explain digital forensics

  • Define and explain digital forensics
  • Explain the difference(s) between data and metadata.
  • Explain the necessity for duplicates of evidence.
  • Describe how the hash value produced by EnCase Imager compares to the value produced by FTK Imager.
  • Describe how the hash value produced by E3 Commander compares to the value produced by FTK Imager.

Evidence of normal and abnormal system activity

Log files can help provide evidence of normal and abnormal system activity, as well as valuable information on how well security controls are doing their jobs. Regulation, policy, or log volume might dictate how much log information to keep. If a log file is subject to litigation, how long must a company keep it? O A) At least one year OB) Until litigation starts O C) A minimum of seven years OD) Until the case is over

General Data Protection Regulation (GDPR)

Compare and contrast the EU General Data Protection Regulation (GDPR), the U.S. CLOUD Act, and the California Consumer Privacy Act.

  1. Explain what digital privacy laws are doing to stop the collection of personal information in relation to the above question
  2. Detail how laws could be strengthened, changed, or lessened to allow individuals the choice of sharing personal data in relation to the above question
  3. Finally, Identify what information is being collected through the use of websites and suggest methods of protection methods of privacy one should use to protect themselves when on the internet in relation to the above question

Provide a comprehensive research paper that defines/explains, compares, contrasts, and analyzes the 3 privacy laws above. 2000 Words