Describe how machine learning and data analytics could have detected and/or prevented APT32 you analyzed had the victim organization deployed these technologies at the time of the event.

Cyber Security

Paper is 2 parts, 2 pages each part.

Part 1:
o Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
o Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 2:
o Describe how machine learning and data analytics could have detected and/or prevented APT32 (cyber espionage actors) you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?

Chapter 2

Develop a draft of Chapter 2 where you clearly provide a well developed introduction and other sections relevant to your topic. This should be your first complete draft of Chapter Two.Before submitting, you should carefully review Chapter 2 and check the following:

  • Use Grammarly in Microsoft Word to review your assignment before submitting. Grammarly may show areas that you do not think need to be changed. If so, you should use the “trash” feature in Grammarly to remove each area that you do not think need to be addressed.
  • Review all of your references. Are all references in APA format? Do all in-text citations have an associated reference in the reference list? Do you have references in the reference list that are not cited in the chapters?
  • Did you follow the UC APA dissertation template?

 

Discuss an example from your own experience that illustrates how Privacy concerns are affecting us in the digital age.

 Digital age

This week we will discuss the issues occurring in the digital age with respect to Privacy. Your assignment is discuss an example from your own experience that illustrates how Privacy concerns are affecting us in the digital age. Specifically, find an example of a Privacy issue enabled by digital technology which you have experienced and which seems unusual or even outrageous, and discuss this in a 1-page paper.

Is what would be a crime if committed against a human still so when perpetrated upon an intelligent robot? Do intelligent robots have rights, and if so, how do they compare with those of humans or of lower animals? Can they be “enslaved”? Can one criminally assault or sexually molest a robot?

Artificial vs Biological Life

Write a short essay discussing the essential differences between artificial life and biological life, and the impact of approaching technology in this area.

(Note that by “artificial life” I am simply referring to the result of amalgamating artificial intelligence/machine learning with robotics, resulting in independently intelligent machines. I deliberately left these two words in lower case, as I am not referring any previously defined term, e.g., that discipline named by Christopher Langton.)

This topic has been debated for many years, with no definitive answers, yet a host of elaborate suggestions and hypotheses. We all seem to know innately the difference, or at least that there is a difference. Perhaps it is relegated to the paraphrased words of the late Supreme Court Justice Potter Stewart, “we know it when we see it”. But such is not an acceptable guideline upon which to base the future of humanity.

Technology, replete with robotics, artificial intelligence, virtual reality, real-time simulated experiences, and dare I say, artificial life, is rapidly dragging us into facing and even legislating the basic questions of human existence and what constitutes acceptable societal interactions.

For example: Is what would be a crime if committed against a human still so when perpetrated upon an intelligent robot? Do intelligent robots have rights, and if so, how do they compare with those of humans or of lower animals? Can they be “enslaved”? Can one criminally assault or sexually molest a robot? Can intelligent robots be held responsible for their self-generated actions? If not, why not; and if so, how?

These are just a few of the questions that humanity may soon be facing, and best start contemplating, as our “devices” start becoming ever more sophisticated androids, complete with unique personalities, simulated compassion, faked empathy, simulated pain reactions, simulated ambition, suffering, desires, goals, and dreams, and psychotic disorders — and what of negative personality traits, like being stubborn, short tempered, cruel, evil, selfish, bullying, all coupled with the ability to out think the best of us in both speed and quality.

Write a Processing program to calculate the pulling force of the Heisler locomotive in terms of oxen. The output of your program should be something like “The Heisler locomotive has the pulling force of X oxen!”.

Pulling force of the Heisler locomotive

INSTRUCTIONS BELOW AND USE THIS SITE TO COMPLETE ASSIGNMENT:

In this lab, we continue to practice with the different parts of a programming language. Specifically, we will look at variables, data types, and calculations. This lab will be done in two parts.

Objective

Create a single Processing program that fulfills the two requirements below. Here are some tips for you to remember.

  • The print( ) function will put text into Processing’s console (the dark part at the bottom of the program window)
  • The println( ) function (read: print line) does the same thing as print( ), but will put your text onto a new line. This is used solely for formatting – making things look nicer!
  • Round( ) can be used to round a number (e.g. 4.7 rounds up to 5)

For each part, you must use variables wherever possible, and format your console output so it is easy to read and understand. No draw( ) function will be required for this program, though you’re allowed to produce the results of your work however you want.

 

Part 1: Locomotives and Oxen

Using rough estimation, assume that a typical ox weighs around 2000 lbs and can produce a pulling force 2.5 to 3 times its weight. For the case of this lab, this gives us a figure of around 6000 lbs of pulling force per ox. In many cases, multiple oxen are used to pull a single wagon. Geared steam locomotives (such as the Heisler in Locomotive Park here in Lewiston) can pull up to the friction limit of their wheels. Geared steam locomotives have a drive shaft running the length of the machine, providing all-wheel drive. Because steel wheels have poor traction on steel rails, the maximum force of a geared steam locomotive is around only 30% of its weight. A Heisler locomotive would weigh approximately 90 tons.

 

Write a Processing program to calculate the pulling force of the Heisler locomotive in terms of oxen. The output of your program should be something like “The Heisler locomotive has the pulling force of X oxen!” Remember that you must use variables in your app. Something like this would be appropriate: int heisler_weight = 90; // weight in tons

 

Part 2: Bulldozers

Unlike locomotives, bulldozers have excellent traction! The exact amount of traction depends on the surface on which the bulldozer is sitting, so we’ll have to estimate. According to various non-authoritative sources on bulldozer forum posts, we will estimate that a bulldozer can pull approximately 175% of its weight. Add onto Part 1 of this lab and calculate the pulling force for three bulldozers in terms of oxen. Use the following three bulldozers:

  • Caterpillar D5
  • Caterpillar D11
  • Komatsu D575A (the world’s largest bulldozer)

Similar to Part 1, the output of your program should be something like “The Caterpillar D5 has the pulling force of X oxen!”

 

Convert the contents of the research topic you have selected for Project 4 into a 18-20 slide PowerPoint presentation.

Cloud Database Growth/Usage Over the past 10 years

PROJECT DESCRIPTION

The PowerPoint Project involves creating a NEW presentation in Microsoft PowerPoint. You must submit the completed PowerPoint presentation file to your Assignments Folder in our CMST 303 LEO Classroom, following the directions included below.

In this assignment, you are asked to convert the contents of the research topic you have selected for Project 4 into a 18-20 slide PowerPoint presentation (see Project 4 assignment for a list of suggested topics). For instance, if your topic for Project 4 is “History of Computers: Microsoft Windows”, then you would condense and summarize the key points of your research on the topic for the PowerPoint Presentation.

PROJECT REQUIREMENTS

FORMATTING REQUIREMENTS

1. Number of Slides: Minimum of 18 slides and a maximum of 20. Gradated penalty for too less or too many slides. This means that the more slides you are away from the 18-to-20 range, the more points will be deducted. The slide count does NOT include the title slides and reference slides.
2. Layout and Design: Slides must be easy to read and uncluttered. Keep in mind the 7 x 7 rule with presentation software, which effectively states no more than 7 words per bullet and 7 bullets per slide. This is something to keep in mind to assist in effectively communicating information and not a specific requirement of the project.

3. Font Size: Use a standard font like Times New Roman or Arial. Use 36-point font for the title, a 28-point font for main points, and 24-point font for secondary points.

4. Footer: Include the slide number, and title of your presentation in the footer (except on Title Slide).

5. Clip Art: Add no more than two Clip Art images appropriate for the presentation. You must also include one animated Clip (GIF) in addition to the two Clip Art images. The images must look professional (not cartoonish, pixilated, or poorly designed). Therefore you must have a total of three images in your presentation. No individual slide should contain more than one image.

6. Background/Theme: Appropriate for the presentation. Use creativity here, but your background color or design must not detract from the readability of the slides. A bad example would be using dark text against a dark background. Make sure the background and font colors are a good contrast.

Create a 1-page infographic or job aid of the cyber domain using the OSI model. Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

PowerPoint presentation

Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Refer to the LinkedIn course “PowerPoint: Creating an Infographic” by Heather Ackmann, located in this week’s Learning Activities folder, for guidance on creating infographics.

  • Create a 1-page infographic or job aid of the cyber domain using the OSI model.
  • Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation in which you:

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training.
Select 3 threats from your infographic or job aid.
Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Select a topic for your research paper from the following, Reliability, Safety, Security. Read the corresponding chapter in your Software Engineering textbook.

CS 633- Activity 2

Submit a research proposal by highlighting the following initial exploration of a topic. Do the following to develop your proposal:
• Select a topic for your research paper from the following, Reliability, Safety, Security.
• Read the corresponding chapter in your Software Engineering textbook.
• Propose an issue or issues you would like to research within the selected topic. What are the questions you would like to research/study. If you are having difficulties choosing your questions, you may consider the exercises at the end of the chapter of choice (based on your topic) to help you formulate the questions for your investigation.
• Compile a few references using LIU library resources (research articles, textbooks, publications, etc.

Use link to textbook

  • https://mycourses.aalto.fi/pluginfile.php/1177979/mod_resource/content/1/Sommerville-Software-Engineering-10ed.pdf

Design your network to be segmented with higher value equipment protected from high-risk equipment. Consider physical segments using separate media versus VLAN’s.

Network diagram

You will design a secure network. You will do this by drawing a logical network diagram using the tool of your choice (it cannot be hand drawn). You will need to show 2 separate gigabit WAN interfaces for redundancy and bandwidth aggregation purposes. You will need to show a dual wan router/firewall (no WiFi built in), 3 separate WAP’s, 8 IP cameras (default port 8000), 1 network video recorder (default port 80), 10 client PC’s, 10 IP phones, and 3 Windows servers (mail, NAS, web). Lookup the default ports for each device with ports not already specified and assume common ports. You will need to configure the router’s port forwarding. You will also need to use port translation to allow outside ports to be non-common non-default ports for security reasons (ports inside the network should be default). Design your network to be segmented with higher value equipment protected from high-risk equipment. Consider physical segments using separate media versus VLAN’s. While you do not need to specify manufacturer and model for the network devices, do specify what the logical attributes are for speed and ports.

An example of network diagram: https://www.conceptdraw.com/How-To-Guide/picture/cisco-lan/Cisco-network-diagrams-diagraming-tools-mac.png

Create a 1-page infographic or job aid of the cyber domain using the OSI model. Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Creating an Infographic

Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Refer to the LinkedIn course “PowerPoint: Creating an Infographic” by Heather Ackmann, located in this week’s Learning Activities folder, for guidance on creating infographics.

  • Create a 1-page infographic or job aid of the cyber domain using the OSI model.
  • Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation in which you:

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training.
Select 3 threats from your infographic or job aid.
Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.