Technological changes


I. Risk Assessment. Conduct a risk assessment of the information systems in your workplace (or other facility that you may access - i.e., a local library). You must describe the information system as well as providing the assessment. The student will use the NIST framework to perform the Risk Assessment.

II. Security Issues with Emerging Technologies: Students will choose from a number of emerging technologies and prepare a paper that discusses security. I will offer several topics, but you are also free to chose your own (with instructors approval). 4 pages not including title and references.


A Honeynet Project white papers. You can access the papers here [url removed, login to view]

Select one of the papers and write about what you discovered from reading the paper. There are papers here that explain the concept of "Know Your Enemy." The "hacker" community operates a lot like warfare; defending against them requires an understanding of how they operate. This site is a great place to gather that type of information.

B Cryptography. This paper can be on an algorithm, protocol or a white paper on Cryptography. At a minimum your paper should describe the following: history, security considerations (i.e.,: has it been hacked, cracked, or is it a concept), where is it being applied, or planned to be applied.

C Digital Millenium Copyright Act (DMCA). The DMCA has made quite an impact on Internet Security. Your paper should at a minimum contain the following: Introduce the DMCA; When can a program be reverse engineered; IAW the DMCA security considerations with respect to the DMCA, ie: how does it affect an organization today? Comments: DMCA fair? Why or why not? How would you change it given the opportunity?

D Mobile Code. Mobile Code is something that security professionals have to deal with on a daily basis. Your paper should address the following: Definition of Mobile Code; types of Mobile Code; security considerations with respect to allowing Mobile Code into your internal network; comments: Mobile Code friend or foe?

E Intrusion-Detection Methods. Research the various types of intrusion-detection systems that are available to organizations. Discuss the various types and describe the circumstances in which each type should be used. Feel free to use specific examples and products to provide the reader with a complete understanding of the subject.

Evner: Artikel Omskrivning , Rapport Skrivning

Se mere: affect organization today, writing definition, write article to your friend, workplace writing, what is workplace writing, what is the definition of algorithm, what is an algorithm, what does algorithm, what an algorithm, types of report writing, types of article writing, types of algorithm, topics to write papers on, student article writing, report writing examples, methods of writing report, impact products, how to write security report, how to write comments to students, how to write article references, how to write an article of respect, how to use algorithm, how can i write an article on internet, how can an article writing be used, free writing program

Om arbejdsgiveren:
( 3 bedømmelser ) Columbia, United States

Projekt ID: #947213

2 freelancere byder i gennemsnit $98 på dette job


I am certain I can do this, lets start.

$75 USD in 5 dage
(141 bedømmelser)

I have written large number of papers on security. You can see review of my work at [login to view URL] where I have over 80 reviews. I assure you of high quality work with < 10% plagiarism.

$120 USD in 10 dage
(2 bedømmelser)