Discipline: Computer Science

national vulnerability databasenational vulnerability database

  Go to the national vulnerability database at http://nvd.nist.gov/ and make a list of the ten most current vulnerabilities and briefly describe the vulnerabilities and impacts. Writing Requirements: APA format 2 pages in length (excluding cover page, abstract, and reference list) 2 peer reviewed sources from the Learning Resource Center Use the APA template located […]

national vulnerability databasenational vulnerability database

  Go to the national vulnerability database at http://nvd.nist.gov/ and make a list of the ten most current vulnerabilities and briefly describe the vulnerabilities and impacts. Writing Requirements: APA format 2 pages in length (excluding cover page, abstract, and reference list) 2 peer reviewed sources from the Learning Resource Center Use the APA template located […]

Computer Science 3-1 Homework Activity: Module ThreeComputer Science 3-1 Homework Activity: Module Three

Before designing a system within Object Oriented Modeling, it helps to understand the user requirements before determining the appropriate system requirements to design a map to assist with creating your full system design. This will allow you to craft smaller pieces of the system independently before creating the full system architecture. To complete the assignment, […]

Computer Science 3-2 Scenario Assignment Module Three: Hashing and Authentication Threats AssignmentComputer Science 3-2 Scenario Assignment Module Three: Hashing and Authentication Threats Assignment

For the Module Three assignment, students will be provided multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols. Each of these situations will require the student to critically assess the situation and propose appropriate actions to be taken. This allows students to make practical application of the knowledge gained pertaining to authentication […]

Introducing to CybersecurtyIntroducing to Cybersecurty

During this quarter we will use a fictitious company called TechWorx.   Your boss is the CEO, Mr. Mike Scott.  He does not know a lot about IT or Cybersecurity so he will rely on your recommendations and expertise.   He recently was at a meeting where the McCumber Cube came up.  He is interested in your […]