28 Jan Computer Forensics
COM520 Systems Security Management
Module 1 Discussion
Attacks on MS Windows
There were many published attacks on Microsoft Windows in the last two decades. Research online to find any one attack published after 2000 and explain it in detail. The example should not duplicate the ones given in the book.
COM520 Systems Security Management
Module 2 Discussion
Security Measures
Select one of the topics below, research it on the Internet (excluding Wikipedia, which is not considered a valid reference by any regional accrediting body), and write a report of at least two paragraphs on it to the class. Show your references for your classmates to use.
You may not duplicate someone else’s topic, so check before you research. Duplicate topics (determined by date/time posted) will be given a 0 grade. In addition, respond to at least two of your classmates’ postings.
If a topic is already chosen and you’d like to write about it, you need to find a sub-topic within it to work on.
• Access Control List
• Access Controls
• Microsoft Windows Security Features
• Vulnerabilities of Microsoft Windows Operating Systems
• Auditing and Security Policy
• Group Policy
• Microsoft Baseline Security Analyzer (MBSA)
• Security Audit
COM520 Systems Security Management
Module 3 Discussion
Cryptographic Protocols
Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When responding to someone’s post, please provide any missing details of the protocol that was explained, with particular emphasis on attacks/limitations of the protocol.
COM520 Systems Security Management
Module 4 Discussion
System Profiling
Assume you are all working as the security team in the IT department of a company. The upper-level management is considering the use of an effective approach to analyze and profile their systems. Possibly with the help of online research, post something about a strategy, tool, or issue related to this that can aid the company in making a decision.
COM520 Systems Security Management
Module 5 Discussion
Threats to Applications
As you may have realized from this module’s contents, almost every application is vulnerable to attacks. Pick an application (e.g., browser, email client), explain the strongest threat for it and any existing solutions to prevent it.
COM520 Systems Security Management
Module 6 Discussion
System Hardening
In this module, you have been exposed to hardening security in many aspects of Windows systems. Pick any one aspect (e.g., password policy) and explain why you consider it important to harden it. Please include any realistic threats in that aspect and also possible remedies.
COM520 Systems Security Management
Module 7 Discussion
Computer Forensics
Share with other students your experience or knowledge of a computer forensics case that you found interesting. Make sure to mention as to what constitutes an incident and the evidence in your selected case.
COM520 Systems Security Management
Module 8 Discussion
Protection Rules
You have learnt that there are many basic rules to follow in order to protect Microsoft Windows systems. Pick any one rule that you think is very important according to you and justify it in your own words.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.