Shared Flashcard Set

Details

CIS 552 Complete Class
CIS 552 WEEK 1 DISCUSSION,CIS 552 WEEK 2,CIS 552 WEEK 3,
14
Computer Science
Post-Graduate
04/10/2018

Additional Computer Science Flashcards

 


 

Cards

Term

CIS 552 WEEK 1 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-552-week-1-discussion/

 

 

Determine whether or not you believe penetration tests are necessary and an integral part of a security program and discuss why or why not. Imagine you are an information security manager. Explicate whether or not you would consider utilizing penetration testing in your environment, and, if so, in what capacity. In a few sentences, describe the most important business areas and or network infrastructure components that would be most beneficial to test. Can you recommend a website, as a potential useful resource that outlines best practices for conducting an internal penetration test?

 

 

Definition

CIS 552 WEEK 1 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-552-week-1-discussion/

 

 

Determine whether or not you believe penetration tests are necessary and an integral part of a security program and discuss why or why not. Imagine you are an information security manager. Explicate whether or not you would consider utilizing penetration testing in your environment, and, if so, in what capacity. In a few sentences, describe the most important business areas and or network infrastructure components that would be most beneficial to test. Can you recommend a website, as a potential useful resource that outlines best practices for conducting an internal penetration test?

 

Term

CIS 552 TERM PAPER REDESIGNING SECURITY OPERATIONS

 

 

https://hwacer.com/Tutorial/cis-552-term-paper-redesigning-security-operations/

 

 

CIS 552 Term Paper Redesigning Security Operations

 

Imagine you have recently been hired as the Information security director at a start-up health care research firm, where confidential client data is housed in its Data Center. Currently, the company has 100 employees and expects to expand its workforce to 300 in the next three (3) months and the company is moving to a new location in an urban office building across four (4) floors. The security operations and defensive mechanisms have been run in the past by the Networking Department and due to the move, you have a chance to start anew with the company’s security operations to improve its overall security posture.

Definition

CIS 552 TERM PAPER REDESIGNING SECURITY OPERATIONS

 

 

https://hwacer.com/Tutorial/cis-552-term-paper-redesigning-security-operations/

 

 

CIS 552 Term Paper Redesigning Security Operations

 

Imagine you have recently been hired as the Information security director at a start-up health care research firm, where confidential client data is housed in its Data Center. Currently, the company has 100 employees and expects to expand its workforce to 300 in the next three (3) months and the company is moving to a new location in an urban office building across four (4) floors. The security operations and defensive mechanisms have been run in the past by the Networking Department and due to the move, you have a chance to start anew with the company’s security operations to improve its overall security posture.

Term

CIS 552 WEEK 1 LAB ASSIGNMENT 1

 

 

 

https://hwacer.com/Tutorial/cis-552-week-1-lab-assignment-1/

 

 

 

 

 

 

  1. Complete the weekly labs according to the steps described below.
  2. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.

 

Lab Submission Breakdown
Lab

 

Assignment

Week

 

Due

Lab # & Title Deliverables for Submission
1 1 Lab 1: Assessing and Securing Systems on a Wide Area Network (WAN) 1.      Complete Section 1: Hands on Demonstration, Parts 1-4, and provide the appropriate screen captures in your lab report. Screen captures are specified in the directions of each lab.

 

2.      Complete Section 2: Applied Learning, Parts 1-4, and provide the appropriate screen captures in your lab report. Screen captures and file names are specified in the directions of each lab.

Definition

CIS 552 WEEK 1 LAB ASSIGNMENT 1

 

 

 

https://hwacer.com/Tutorial/cis-552-week-1-lab-assignment-1/

 

 

 

 

 

 

  1. Complete the weekly labs according to the steps described below.
  2. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.

 

Lab Submission Breakdown
Lab

 

Assignment

Week

 

Due

Lab # & Title Deliverables for Submission
1 1 Lab 1: Assessing and Securing Systems on a Wide Area Network (WAN) 1.      Complete Section 1: Hands on Demonstration, Parts 1-4, and provide the appropriate screen captures in your lab report. Screen captures are specified in the directions of each lab.

 

2.      Complete Section 2: Applied Learning, Parts 1-4, and provide the appropriate screen captures in your lab report. Screen captures and file names are specified in the directions of each lab.

Term

CIS 552 WEEK 2 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-552-week-2-discussion/

 

 

 

Your labs and readings this week focus on applying common cryptography and hashing techniques to important data to ensure confidentiality and integrity. These techniques are important, as they ensure safeguarding a company’s information and the accuracy of the data.

  • In a few sentences, describe the difference between an MD5 hashing algorithm and an SHA1 hashing algorithm, outlining the strengths and weaknesses of each hashing algorithm.  Describe a scenario or instance when MD5 and SHA1 would be best suitable to use to secure data. Researching your own PC’s operating system, are there any tools built in to verify MD5 or SHA1 checksums of downloaded software?  Can you recommend a website as a potential useful resource that show a user how to verify an MD5 checksum? Share with your classmates, and provide links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Additional post option: What would happen if you downloaded new software, and confirmed that the MD5 value does not match the site? What steps would you take to resolve this issue?

 

 

 

 

 

Definition

CIS 552 WEEK 2 DISCUSSION

 

 

https://hwacer.com/Tutorial/cis-552-week-2-discussion/

 

 

 

Your labs and readings this week focus on applying common cryptography and hashing techniques to important data to ensure confidentiality and integrity. These techniques are important, as they ensure safeguarding a company’s information and the accuracy of the data.

  • In a few sentences, describe the difference between an MD5 hashing algorithm and an SHA1 hashing algorithm, outlining the strengths and weaknesses of each hashing algorithm.  Describe a scenario or instance when MD5 and SHA1 would be best suitable to use to secure data. Researching your own PC’s operating system, are there any tools built in to verify MD5 or SHA1 checksums of downloaded software?  Can you recommend a website as a potential useful resource that show a user how to verify an MD5 checksum? Share with your classmates, and provide links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Additional post option: What would happen if you downloaded new software, and confirmed that the MD5 value does not match the site? What steps would you take to resolve this issue?

 

 

 

 

Term

CIS 552 WEEK 3 DISCUSSION WIRESHARK

 

 

 

 

https://hwacer.com/Tutorial/cis-552-week-3-discussion-wireshark/

 

 

 

Your labs this week focus on capturing network data by using tools such as TCPdump, Wireshark and NetWitness Investigator. The ability to analyze network data can be useful in determining possible network vulnerabilities.

  • In your labs, you performed a network capture using TCPdump and Wireshark. Compare and contrast these tools. In a few sentences, describe a scenario when you might find a use for each of these tools. Is one tool more efficient than the other in this industry? Using the Internet, recommend a website or video that provides a tutorial on how to best use one of these tools.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Definition

CIS 552 WEEK 3 DISCUSSION WIRESHARK

 

 

 

 

https://hwacer.com/Tutorial/cis-552-week-3-discussion-wireshark/

 

 

 

Your labs this week focus on capturing network data by using tools such as TCPdump, Wireshark and NetWitness Investigator. The ability to analyze network data can be useful in determining possible network vulnerabilities.

  • In your labs, you performed a network capture using TCPdump and Wireshark. Compare and contrast these tools. In a few sentences, describe a scenario when you might find a use for each of these tools. Is one tool more efficient than the other in this industry? Using the Internet, recommend a website or video that provides a tutorial on how to best use one of these tools.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Term

CIS 552 WEEK 3 ASSIGNMENT 1

 

 

 

https://hwacer.com/Tutorial/cis-552-week-3-assignment-1/

 

 

 

Assignment 1: Encryption and Hashing Algorithms: Tools and Commands

Due Week 3 and worth 100 points

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages.

Part 1:

Write a paper in which you answer the following:

Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Part 2:

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type, and rearrange the messages in logical order to assemble 

Definition

CIS 552 WEEK 3 ASSIGNMENT 1

 

 

 

https://hwacer.com/Tutorial/cis-552-week-3-assignment-1/

 

 

 

Assignment 1: Encryption and Hashing Algorithms: Tools and Commands

Due Week 3 and worth 100 points

The CIA and FBI have been working as a joint task force to unearth the meaning behind a vast amount of intercepted digital communiqué between two known operatives, believed to be spies. They have recruited your company to assist with the decryption of these messages.

Part 1:

Write a paper in which you answer the following:

Before starting on this mission, both national organizations want to verify your ability to identify hash and encryptions standards. Answer the following questions, providing specific details for each topic:

  1. Explain how to identify the type of hash, identifying a tool that can integrate with Linux and Windows so desktop users are able to verify hash values. Specify any online tools.
  2. Describe the difference between RSA and ECDSA encryption algorithms and name a well-known product that uses each type of encryption. Be sure to cite your references.
  3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Part 2:

Here is a useful online resource to help with your tasked assignment from the FBI. Using the following link, decrypt the random messages and put them together into a useful missive. Identify the hash type, and rearrange the messages in logical order to assemble 

Term

CIS 552 WEEK 4 DISCUSSION FOOTPRINTING AND PORT SCANNING

 

 

 

 

https://hwacer.com/Tutorial/cis-552-week-4-discussion-footprinting-port-scanning/

 

 

 

 

Footprinting is a passive scan performed to gather basic public information about a target company and is useful in determining if you have too much visibility on the Internet. Port scanning is done to scan a network for open ports. This week’s labs and reading focus on port scanning and footprinting.

  • Explain what you believe is the greatest source of information for hackers in the footprinting stage, including where this information is commonly found and how a hacker is able to obtain it. Compare and contrast footprinting and port scanning. Determine which you believe is the more important step in the hacking process and explain why. Using the Internet or the Strayer Library, research at least two commonly used port scanning tools. Provide a tutorial, website or video that provides a tutorial on how to use the tools. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Additional post option: What type of pertinent information can be found during a passive scan from social media sites such as LinkedIn or Facebook?

 

 

Definition

CIS 552 WEEK 4 DISCUSSION FOOTPRINTING AND PORT SCANNING

 

 

 

 

https://hwacer.com/Tutorial/cis-552-week-4-discussion-footprinting-port-scanning/

 

 

 

 

Footprinting is a passive scan performed to gather basic public information about a target company and is useful in determining if you have too much visibility on the Internet. Port scanning is done to scan a network for open ports. This week’s labs and reading focus on port scanning and footprinting.

  • Explain what you believe is the greatest source of information for hackers in the footprinting stage, including where this information is commonly found and how a hacker is able to obtain it. Compare and contrast footprinting and port scanning. Determine which you believe is the more important step in the hacking process and explain why. Using the Internet or the Strayer Library, research at least two commonly used port scanning tools. Provide a tutorial, website or video that provides a tutorial on how to use the tools. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Additional post option: What type of pertinent information can be found during a passive scan from social media sites such as LinkedIn or Facebook?

 

Term

CIS 552 WEEK 5 DISCUSSION STUXNET

 

 

 

https://hwacer.com/Tutorial/cis-552-week-5-discussion-stuxnet/

 

 

 

our readings this week emphasize enumeration and computer system hacking. One of the most sophisticated attacks found this decade is called Stuxnet, so it is worth reviewing this attack.

  • Explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time. In your opinion, explain what precautions could have prevented Stuxnet from occurring. Describe how Stuxnet changed the dynamics of defending threats. Are there any Internet resources you could recommend that would be useful in understanding these concepts? Share with your classmates and provide links to any useful resources you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

 

 

 

Definition

CIS 552 WEEK 5 DISCUSSION STUXNET

 

 

 

https://hwacer.com/Tutorial/cis-552-week-5-discussion-stuxnet/

 

 

 

our readings this week emphasize enumeration and computer system hacking. One of the most sophisticated attacks found this decade is called Stuxnet, so it is worth reviewing this attack.

  • Explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time. In your opinion, explain what precautions could have prevented Stuxnet from occurring. Describe how Stuxnet changed the dynamics of defending threats. Are there any Internet resources you could recommend that would be useful in understanding these concepts? Share with your classmates and provide links to any useful resources you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

 

 

Term

CIS 552 WEEK 6 DISCUSSION DATABASES AND A REAL-WORLD ATTACK

 

 

 

https://hwacer.com/Tutorial/cis-552-week-6-discussion-databases-real-world-attack/

 

 

 

“Risk Management” Please respond to the following:

  • History has shown that the chances of risk events occurring and their respective costs increasing can change over the project life cycle. As a project manager, select at least three (3) risk events as they apply to your selected project, and explain how you would address the risks you selected. Next, determine at least one (1) strategy to mitigate each risk occurrence.

 

 

 

Definition

CIS 552 WEEK 6 DISCUSSION DATABASES AND A REAL-WORLD ATTACK

 

 

 

https://hwacer.com/Tutorial/cis-552-week-6-discussion-databases-real-world-attack/

 

 

 

“Risk Management” Please respond to the following:

  • History has shown that the chances of risk events occurring and their respective costs increasing can change over the project life cycle. As a project manager, select at least three (3) risk events as they apply to your selected project, and explain how you would address the risks you selected. Next, determine at least one (1) strategy to mitigate each risk occurrence.

 

 

Term

CIS 552 WEEK 7 DISCUSSION RANSOMWARE

 

 

https://hwacer.com/Tutorial/cis-552-week-7-discussion-ransomware/

 

 

 

This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.

  • Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

 

Definition

CIS 552 WEEK 7 DISCUSSION RANSOMWARE

 

 

https://hwacer.com/Tutorial/cis-552-week-7-discussion-ransomware/

 

 

 

This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.

  • Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

 

Term

CIS 552 Week 7 Assignment 2

 

 

https://hwacer.com/Tutorial/cis-552-week-7-assignment-2/

 

 

 

 

Due Week 7 and worth 75 points

Since you did such a superb job deciphering the mysterious communiqué, the joint task force has asked for your assistance again with a new case. They have asked you to plan and conduct the preliminary passive scan. Using what you learned in class, conduct data gathering and footprinting on the www.issaseries.com website and prepare to provide your findings to the task force.

Write a paper in which you answer the following:

  1. Describe all preplanning activities prior to conducting the passive scan on the target site.
  2. Explain what tools are required to conduct a passive scan on a website or company.
  3. Outline the procedures and results of the data gathering, noting any flaws or weaknesses.
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

 

  • Identify common information-gathering tools and techniques.
  • Explain the process of network traffic analysis and sniffing and their appropriate tools.
  • Compare and contrast defensive technologies.
  • Use technology and information resources to research issues in cybercrime techniques and response.
  • Write clearly and concisely about topic related to cybercrime techniques and response using proper writing mechanic and technical style conventions.
Definition

CIS 552 Week 7 Assignment 2

 

 

https://hwacer.com/Tutorial/cis-552-week-7-assignment-2/

 

 

 

 

Due Week 7 and worth 75 points

Since you did such a superb job deciphering the mysterious communiqué, the joint task force has asked for your assistance again with a new case. They have asked you to plan and conduct the preliminary passive scan. Using what you learned in class, conduct data gathering and footprinting on the www.issaseries.com website and prepare to provide your findings to the task force.

Write a paper in which you answer the following:

  1. Describe all preplanning activities prior to conducting the passive scan on the target site.
  2. Explain what tools are required to conduct a passive scan on a website or company.
  3. Outline the procedures and results of the data gathering, noting any flaws or weaknesses.
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

 

  • Identify common information-gathering tools and techniques.
  • Explain the process of network traffic analysis and sniffing and their appropriate tools.
  • Compare and contrast defensive technologies.
  • Use technology and information resources to research issues in cybercrime techniques and response.
  • Write clearly and concisely about topic related to cybercrime techniques and response using proper writing mechanic and technical style conventions.
Term

CIS 552 WEEK 8 ASSIGNMENT 3 RANSOMWARE AND VIRUS PROTECTION

 

 

 

https://hwacer.com/Tutorial/cis-552-week-8-assignment-3-ransomware-virus-protection/

 

 

 

 

 

Due Week 8 and worth 100 points

You work as an information security specialist for a large financial company and your CISO has asked you to investigate the recent ransomware attacks. The CISO wants to ensure that the company is well protected against these types of attacks.

Write a paper in which you answer the following:

  1. Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.
  2. Determine the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.
  3. Propose what users and system administrators should do when a potential infection has been suspected.
  4. Compare and contrast viruses, worms, and Trojans, and indicate which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.
  5. Use the Internet to identify three commercially available antivirus software products for corporate use; compare the features of each and describe which one you would recommend, and why.
Definition

CIS 552 WEEK 8 ASSIGNMENT 3 RANSOMWARE AND VIRUS PROTECTION

 

 

 

https://hwacer.com/Tutorial/cis-552-week-8-assignment-3-ransomware-virus-protection/

 

 

 

 

 

Due Week 8 and worth 100 points

You work as an information security specialist for a large financial company and your CISO has asked you to investigate the recent ransomware attacks. The CISO wants to ensure that the company is well protected against these types of attacks.

Write a paper in which you answer the following:

  1. Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.
  2. Determine the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.
  3. Propose what users and system administrators should do when a potential infection has been suspected.
  4. Compare and contrast viruses, worms, and Trojans, and indicate which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.
  5. Use the Internet to identify three commercially available antivirus software products for corporate use; compare the features of each and describe which one you would recommend, and why.
Term

CIS 552 WEEK 8 DISCUSSION BOTNET DEFENSE

 

 

 

https://hwacer.com/Tutorial/cis-552-week-8-discussion-botnet-defense/

 

 

 

 

Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense.

  • As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Definition

CIS 552 WEEK 8 DISCUSSION BOTNET DEFENSE

 

 

 

https://hwacer.com/Tutorial/cis-552-week-8-discussion-botnet-defense/

 

 

 

 

Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense.

  • As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Term

CIS 552 WEEK 10 TERM PAPER

 

 

 

https://hwacer.com/Tutorial/cis-552-week-10-term-paper/

 

 

Due Week 10 and worth 125 points

 

You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate. You are required to answer the following questions prior to the interview as a test of your knowledge so CCL can determine the most qualified applicant. Each member of the CCL hiring team has created a short question. Answer each of these questions specifically, knowing that your answers may determine who will be hired.

Definition

CIS 552 WEEK 10 TERM PAPER

 

 

 

https://hwacer.com/Tutorial/cis-552-week-10-term-paper/

 

 

Due Week 10 and worth 125 points

 

You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate. You are required to answer the following questions prior to the interview as a test of your knowledge so CCL can determine the most qualified applicant. Each member of the CCL hiring team has created a short question. Answer each of these questions specifically, knowing that your answers may determine who will be hired.

Supporting users have an ad free experience!