Discipline: Computer Science

4-1 Discussion: Passwords4-1 Discussion: Passwords

Why does the use of passwords put the overall security of the network in jeopardy? First, explain the techniques and tactics that hackers commonly utilize in order to compromise passwords. Next, navigate to the following site: How Big Is Your Haystack? Once in the site, experiment with passwords of varying lengths and character types. Then, […]

Computer Science Practical Connection AssignmentComputer Science Practical Connection Assignment

 Assignment Topics to cover: Information Technology importance on Strategic Planning  Business Strategy  Virtualization  Physical Security  IT Governance Assignment: Provide a reflection of at least 700  words (or 2 pages double spaced) of how the knowledge, skills, or  theories of this course have been applied, or could be applied, in a  practical manner to your current […]

INTRODUCTION TO CYBERSECURTYINTRODUCTION TO CYBERSECURTY

Your new boss, Mr. Mike Scott, CEO of Techworx would like an analysis of the company’s current cyber security posture based on the operational report.  He wants to use the National Institute of Standards and Technology (NIST)  Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover).  Mr. Scott requests a supporting image and to write your observations […]

1.11.1

  Assignment Instructions: Review  http://www.cert.org/csirts/csirt_faq.html. Comment on the importance of incident response and why it is important to have a plan in place before an incident occurs. Writing Requirements: APA format 3 pages in length (excluding cover page, abstract, and reference list) Use the APA template located in the Course Information folder to complete the […]

security informationsecurity information

Find and research sources of up-to-date sources of security information, either on the Internet or through periodicals (some of which are listed in the book) and discuss current threats and vulnerabilities. Discuss how employee education can be used to reduce the discussed threats.   Writing Requirements: APA format 2 pages in length (excluding cover page, […]