Categories
Cyber Security

Download and install Wireshark from the Wireshark web page on your own PC 2) Sta

Download and install Wireshark from the Wireshark web page on your own PC 2) Start Wireshark and put it into capture mode on your Ethernet connection. 3) Access a single web site. 4) Stop the capture mode and analyze the captured data. What do you see? 5) Clear the capture and restart the capture process. 6) Logon onto a remote service or application via your network ISP or another Internet connection that requires authentication. What does that captured traffic show? 7) Repeat steps 5 & 6 until you have captured packets indicated below. You may have to access different sites or network devices, or generate unique connections to capture all the protocol types. [Hint: have you ever put your network connection in loopback mode?] If you cannot capture a protocol, explain why you cannot. a. ARP b. TCP c. UDP d. HTTP e. HTTPS (TLS) f. FTP g. ICMP h. DNS 8) Restart your network connection and the capture process and allow it to run for 1 hour. At the end of the hour display the network connection statistics and the network packet summary. Compare the collected data with what your firewall displays and the packet count shown under the network connections status found in your operating system. Then start a new capture overnight (at least 4 hours) on your home computer connection. What activity do you see overnight? Provide proof of your one-hour and four-hour Wireshark runs.
2 pages lab experiences and 2 pages researching about the Wireshark application and an analysis of how it can be used to support Information Assurance and Security professionals.

Categories
Cyber Security

There is a relationship between policy evaluation and production identification,

There is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation. Can you explain this relationship and why they are important?
References PERNICE, I., (2018). Global cybersecurity governance: A constitutionalist analysis. Global
Constitutionalism: Human Rights, Democracy and the Rule of Law, 7(1), 112–141. https://doi.org/10.1017/S2045381718000023
Kozlov, A., & Noga, N. (2019). The Method of Assessing the Level of Compliance of Divisions
of the Complex Network for the Corporate Information Security Policy Indicators. 2019 Twelfth International Conference “Management of Large-Scale System Development” (MLSD), 1–5. https://doi.org/10.1109/MLSD.2019.8911052
Add 2 more scholarly references (2018-2022) of your choice, in addition to the two above.

Categories
Cyber Security

step 1: Take a “Virtual” field trip to one of the following locations: FBI Acade

step 1: Take a “Virtual” field trip to one of the following locations:
FBI Academy and facilities at Quanticohttp://www.weta.org/tv/local/wetaallaccess/fbi (use other sites for more info)
Regional Computer Forensic Laboratoryhttp://www.rcfl.gov/ (use other sites for more info)
CIA Museumhttps://www.cia.gov/about-cia/cia-museum/
Step 2: Create your presentation
Create a PowerPoint presentationInclude information and pictures about what you did, what you saw, and what you learned.
Slides should be in your own words.
There is no minimum or maximum number of slides, just make sure you cover the information sufficiently
Note: I would expect your presentation to represent enough detail to show approximately 3 hours of research and development of your presentation.
Step 3: Write your speech
In your PowerPoint, include your speech in the NOTES SECTION (use complete sentences). This would be your presentation/speech if you were to present this to an audience.
Every slide should have talking points, even if it is an introduction or transition slide.
Talking points/speech should be in your OWN words.
Make sure you cite all sources you used for information or pictures either on the slide or in your notes.
Step 4: Submit your presentation
Compress your pictures before submitting (in PowerPoint, double click on a picture, go to “compress picture” tool, apply to all pictures)
Make sure your speech is visible in the notes section.
Make sure citations are visible in the notes section.

Categories
Cyber Security

Use the primary paper “A_Review_of_Security_Standards_and_Frameworks_for_IoT-Bas

Use the primary paper “A_Review_of_Security_Standards_and_Frameworks_for_IoT-Based_Smart_Environments” when completing this assignment. Hopefully that paper was a peer reviewed journal article, whitepaper or incident response report within the subject of course (i.e network security, penetration testing, incident evaluation, etc.). Depending on the thoroughness of the primary paper, you may also need supplemental papers in order to have enough information to fulfill all requirements. Mitigations are most likely to come from secondary sources.
The paper should include the following sections:
Explanation of the vulnerability, weaknesses and technologies involved
Implementation issues described as being relevant to an incident or penetration test
Examples & description of attack techniques/technology being implemented against specific targets
Alternate attack methods similar to methods described in primary paper
Explanation of mitigations – highlight those that are part of primary paper and those not included that are relevant and could have been included
Format
Papers should be 5 pages in length (excluding cover page and reference/bibliography page)Double-spaced
Size 12 font
Times New Roman
1-inch margins
MLA or APA format either are acceptable (but most importantly be consistent)t, including a separate page for references/bibliography

Categories
Cyber Security

For your final assignment, you are to create your own style guide for three type

For your final assignment, you are to create your own style guide for three types of documents:
PowerPoint Presentation.
Memo.
Formal Letter.
The style guide should incorporate similarities that make you or your brand stand out and recognizable to anyone across all business correspondence. Assignment Instructions
You have a new start-up company and want to create a style guide for business correspondence. In doing so, anyone in the Company can use the style guide for consistency.
Create a logo: Ensure you include dimensions for each type of correspondence.
Indicate the font type, size, and color that will be used for each type of correspondence.
Provide a sample of each type of correspondence for a visual representation:PowerPoint.
Memo.
Formal Letter.
Your submission should contain four files:
A write-up of the style guide: Write style instructions for creating PowerPoint presentations, memos, and formal letters.
An example of a PowerPoint presentation: It should contain at least three slides (Cover Page, Second Page, and Third Page) in which the content should be on the styles in useFor example, your cover page should have the logo and “Style Guide For “xxx” Company.
The second page should contain a header and three bullets indicating the font size, style, and colors that are being used.
The third page should contain a conclusion and at least three bullets indicating why using a style guide for PowerPoint presentation is important.
An example of a memo: It should contain the company logo, and the text in the memo should explain the styles used. For instance, indicate the position and size of the logo, clarify if the “To, From, Date, Subject” double spaced or single-spaced, and guide what font to apply.
An example of a formal letter: should contain the company logo, and the text in the letter should be an explanation of the styles that are being used. For example, indicate the position and size of the logo and the font that should be used for all formal letters.