Cybersecurity Awareness 2 Min Video Script

Topic: Cybersecurity Awareness 2 Min Video Script

 

Paper details:

Please refer to the attached pdf guidelines for the requirements. Please write a script for the 2 minute Unique and creative imaginary video where a story will enable employees to be aware of cybersecurity threats. Ensuring that users have a high level of security awareness is one of the core tenets of effective cybersecurity defensive activities. As individuals write a script for a 2 minute (approx.) security awareness training video suitable for all employees in a large organisation in Australia. Example scripts are attached herewith for the following- Cybersense Videos + Scripts Please note that I’ve videos for them as well, but couldn’t upload it. This idea and story has to be unique and creative. Please use these examples just to develop an overall idea. These are only examples, feel free to use a different style of script You are not required to produce a video, only the script Think about a (single) clear topic for the video. Your video should be aimed at general employees at large sized organisation in Australia. The goal of the video is to modify the behaviour of employees, by either highlighting risky behaviour, affirming good behaviour, or both. Include short “key takeaway” messages (no more than 3) to end the script with. Ensure that you think of an original idea, perhaps based on the topics we have discussed in the course or other materials and produce original dialog. Please don’t copy any existing videos, although you can cover the same topics provided you do so in a new manner. Please deliver the script in world file.

Security architecture developments

Note: This assignment will be checked for plagiarism by the professor and this assignment should be a minimum of 600 words without references and should be in APA format and have to include at least two references. Please find the below attachment and refer to it to prepare the answer. And I need the answer by Tuesday evening 06:00 pm EST. (04/21/2020).
Length:  Minimum of 600 words
Question:
 
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures.
  • The SANS Institute hosted three “What Works in Security Architecture” Summits.
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet.
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book.
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development.

Cybersecurity Investigator

M13 Career Paper 

Description/Requirements:
As a final project for the course, write a five page paper on any career in the computer networking field. Include in the paper the responsibilities of the job, the educational background and the day to day activities involved in the job. Discuss whom a person in this career works with. Discuss how the job has changed and what changes are expected for the future.
See your IS 231 Syllabus for detailed requirements… NO PLAGIARISM. Meanwhile the format to follow regarding this topic is in the attachment below (IS 231 as indicated in the Syllabus for detailed requirements). References to be included.

Cybersecurity Investigator

M13 Career Paper 

Description/Requirements:
As a final project for the course, write a five page paper on any career in the computer networking field. Include in the paper the responsibilities of the job, the educational background and the day to day activities involved in the job. Discuss whom a person in this career works with. Discuss how the job has changed and what changes are expected for the future.
See your IS 231 Syllabus for detailed requirements… NO PLAGIARISM. Meanwhile the format to follow regarding this topic is in the attachment below (IS 231 as indicated in the Syllabus for detailed requirements). References to be included.

Data Breach – Case study Ride Share company such as Lyft or Uber

You are the incident response team for a Ride Share company such as Lyft or Uber. There are reports and indications of a data breach in which customer data has been compromised.
You will need to complete the following:
· Summarize the issues that face Ride Share companies
· What types of policies are needed?
· What core principles apply here?
· What would be the best framework to use for a Ride Share companies?
· What User Domains should there be?

  • Be sure to define who the groups are
  • What files and folders containing what type of data should       they have access to?

· How would you go about implementing the changes?
· Summarize the policies that need to be in place and how they would address the issue
Prepare a report to address all aspects of the assignment.  This report should be no less than 10 pages of content.  You need to include outside sources and properly cite and reference your sources.  You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles.  In addition to the 10 pages of content, you will want a title page and a reference sheet.  This report needs to be in proper APA format.
Paper Sections
The following sections should be outlined as Headers in the paper.
Introduction, thesis statement, overview, purpose
Background, discuss history of topic
Discussion, identify benefits, obstacles, innovations
Conclusion, summarize the overall study, lessons learned
References, minimum three references with citations in the body
All written reports should be submitted in MS Word.  The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper.
Must submit both written assignment and presentation slides.

Data Breach – Case study Ride Share company such as Lyft or Uber

You are the incident response team for a Ride Share company such as Lyft or Uber. There are reports and indications of a data breach in which customer data has been compromised.
You will need to complete the following:
· Summarize the issues that face Ride Share companies
· What types of policies are needed?
· What core principles apply here?
· What would be the best framework to use for a Ride Share companies?
· What User Domains should there be?

  • Be sure to define who the groups are
  • What files and folders containing what type of data should       they have access to?

· How would you go about implementing the changes?
· Summarize the policies that need to be in place and how they would address the issue
Prepare a report to address all aspects of the assignment.  This report should be no less than 10 pages of content.  You need to include outside sources and properly cite and reference your sources.  You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles.  In addition to the 10 pages of content, you will want a title page and a reference sheet.  This report needs to be in proper APA format.
Paper Sections
The following sections should be outlined as Headers in the paper.
Introduction, thesis statement, overview, purpose
Background, discuss history of topic
Discussion, identify benefits, obstacles, innovations
Conclusion, summarize the overall study, lessons learned
References, minimum three references with citations in the body
All written reports should be submitted in MS Word.  The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper.
Must submit both written assignment and presentation slides.

Final Research Paper – emerging threats and strengthen countermeasures

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complementary techniques to detect emerging threats and strengthen countermeasures.
Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/
This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. (Originality report should be at least 35% or less.)
Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.
You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.)
So in summary, here are the research paper requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)
  • Originality report should be at least 35% or less.

Admin Notes:
APA Paper Formatting guidelines
1.Title page
2.Abstract
3.Body
4.Text citation and references
Additionally
-As usual, the text is typed on standard white paper that has familiar parameters of 8.5″ x 11″.
-The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font.
-Double spacing is required on both the title page and throughout the paper.
-Margins should be 1″ concerning all sides of the page.
-Paragraph indentation should be set to one half inch from the left side of the page.
-The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.
For more information on APA format consult APA, 6th Edition American Psychological Association, also  The OWL at Purdue is a good resource (see related link) on APA format.
https://owl.english.purdue.edu/owl/resource/560/01/
Help with peer reviewed papers or articles
If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:
http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Final Research Paper – emerging threats and strengthen countermeasures

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complementary techniques to detect emerging threats and strengthen countermeasures.
Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/
This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. (Originality report should be at least 35% or less.)
Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.
You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.)
So in summary, here are the research paper requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)
  • Originality report should be at least 35% or less.

Admin Notes:
APA Paper Formatting guidelines
1.Title page
2.Abstract
3.Body
4.Text citation and references
Additionally
-As usual, the text is typed on standard white paper that has familiar parameters of 8.5″ x 11″.
-The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font.
-Double spacing is required on both the title page and throughout the paper.
-Margins should be 1″ concerning all sides of the page.
-Paragraph indentation should be set to one half inch from the left side of the page.
-The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.
For more information on APA format consult APA, 6th Edition American Psychological Association, also  The OWL at Purdue is a good resource (see related link) on APA format.
https://owl.english.purdue.edu/owl/resource/560/01/
Help with peer reviewed papers or articles
If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:
http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles

Privacy of your email

People email on a daily basis. There are policies at work places regarding privacy of your email. Look into a few items

  • Email privacy in the EU
  • What happens during a digital forensics investigation?
  • How does it apply to social media, Instant Messenger, etc

Blog Post On Internet And Security Related To All The Bullets Below.

Blog Post On Internet And Security Related To All The Bullets Below.
To complete this Assignment:

  1. Use the search engine of your choice, search for “free blog tool.”
  2. Select the tool that you feel is most appropriate for the task.
  3. Sign up for a free account. (Note: if you already have a blog account, you may use that.)
  4. Choose an appropriate background or theme.
  5. Give your blog an appropriate name.
  6. Create a post that contains a short paragraph on each of the following topics:
  7. Brief history of the Internet and security issues.
  8. Methods of communication
    1. Social networking
    2. Email
    3. Wikis and blogs
    4. Podcasts and webcasts
    5. Streaming media
  9. E-commerce and m-commerce
  10. Include a relevant image in each of your blog posts. Make sure that the pictures are free to use and share. (Hint: Use Google Advanced Image Search. Under “License,” choose “Free to use and share.”)
  11.  Provide a direct link for each image you use.