Computer Science
Data Science
Computer Science|Data Science|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Creating a Subnetting Table
Computer Science|Creating a Subnetting Table|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Comparison between MS Access and MS Excel
Computer Science|Comparison between MS Access and MS Excel|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Object Oriented Programming
Computer Science|Object Oriented Programming|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Firefox and Chrome Journal Article
Computer Science|Firefox and Chrome Journal Article|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Access Controls and Cryptography Fundamentals
Computer Science|Access Controls and Cryptography Fundamentals|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
History of Cyber Security
Computer Science|History of Cyber Security|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
Cloud Computing
Computer Science|Cloud Computing|Get custom homework help from vetted experts in 100+ courses and programs. 24/7
How we Communicate on the Internet
This assignment designed to assess your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Your essay should be 4-6 pages in length, not counting the cover page and bibliography. Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers. General Requirements 1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s citations. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.
The Ransomware Incidents
pRansomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund. Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimores systems, as well as two smaller cities in Florida. Read these brief articles from the UMGC library to learn about the ransomware incidents: Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L). Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L). If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions. Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount. What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities? Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom. If you agree to pay the ransom, what are you going to tell the CEO if the hackers dont end up providing the decryption key to unlock the files or come back and ask for even more money? If you dont agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom? Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems? Would you have a different decision if you were working for a small organization like Mercury USA?p
Use Promo Code: FIRST15