Categories
Information Technology

Identify one cryptographic attack and how you can protect against it.

1)450 words
Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it.
2)450 words
before we execute a project, we must baseline our project. Search the Internet and ascertain what we mean by “Baselining” our project. And specifically, which items are baselined? Stated another way, what items are in the basline? Describe them.

Categories
Information Technology

Briefly explain the NIST Computer Security Incident Handling Guide.

Read the required readings and create a 1-3 page paper
explaining the process of incident response based on the readings. This needs
to be in your own words (not copied from any internet sources). This should
briefly explain the NIST Computer Security Incident Handling Guide.
and
Write a 1-3 page paper explaining one of the tactics below with examples. Research examples both on the MITRE website and on the internet in general.
The assignment is to research and analyze one of the tactics listed in the MITRE ATT&CK framework. Specifically, you should choose a tactic that interests you, and research the various techniques associated with that tactic. For example, if you choose the tactic of “Initial Access,” you would research techniques such as spearphishing, drive-by-compromise, and physical access.
This should be in your own words and please cite sources if you are using them.
MITER Att&ck Tactics

ID
Name
Description

TA0043Links to an external site.
ReconnaissanceLinks to an external site.
The adversary is trying to gather information they can use to plan future operations.

TA0042Links to an external site.
Resource DevelopmentLinks to an external site.
The adversary is trying to establish resources they can use to support operations.

TA0001Links to an external site.
Initial AccessLinks to an external site.
The adversary is trying to get into your network.

TA0002Links to an external site.
ExecutionLinks to an external site.
The adversary is trying to run malicious code.

TA0003Links to an external site.
PersistenceLinks to an external site.
The adversary is trying to maintain their foothold.

TA0004Links to an external site.
Privilege EscalationLinks to an external site.
The adversary is trying to gain higher-level permissions.

TA0005Links to an external site.
Defense EvasionLinks to an external site.
The adversary is trying to avoid being detected.

TA0006Links to an external site.
Credential AccessLinks to an external site.
The adversary is trying to steal account names and passwords.

TA0007Links to an external site.
DiscoveryLinks to an external site.
The adversary is trying to figure out your environment.

TA0008Links to an external site.
Lateral MovementLinks to an external site.
The adversary is trying to move through your environment.

TA0009Links to an external site.
CollectionLinks to an external site.
The adversary is trying to gather data of interest to their goal.

TA0011Links to an external site.
Command and ControlLinks to an external site.
The adversary is trying to communicate with compromised systems to control them.

TA0010Links to an external site.
ExfiltrationLinks to an external site.
The adversary is trying to steal data.

TA0040Links to an external site.
ImpactLinks to an external site.
The adversary is trying to manipulate, interrupt, or destroy your systems and data.

Categories
Information Technology

Discuss at least 4 of the following perceptions that physicians may have that could be causing them to hesitate in using this technology.

Create a PowerPoint presentation that reviews four peer-reviewed articles written in the last five years on the issues around the adoption of eHealth in the Kingdom. Your presentation should contain the following concepts. Discuss at least 4 of the following perceptions that physicians may have that could be causing them to hesitate in using this technology.
Usefulness
Technical support available
Increased workload
User-friendly technology
Staff attitudes
Cost
Patient privacy
Your presentation should meet the following structural requirements:
Be 15 slides in length, not including the title or reference slides.
Be formatted according to University and APA writing guidelines.
Provide support for your statements with citations from a minimum of 8 scholarly articles.
Each slide must provide detailed speaker’s notes to support the slide content. These should be a minimum of 150 words long (per slide) and must be a part of the presentation. The presentation cannot be submitted in PDF format, which does not make notes visible to the instructor. Notes must draw from and cite relevant reference materials.
Utilize the following headings to organize the content in your presentation:
Introduction 4 of the above topics as 4 slides
Cultural, Social, or Religious Barriers
Recommendations for KSA
Conclusion

Categories
Information Technology

Why is it so difficult to prosecute cybercriminals?

1)450 words
Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?
2)450 words
To have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.  Please discuss the value that metrics bring to the organization and identify critical measures of success that should be tracked.