[SOLUTION] Cybersecurity Threats and the Future of Cybersecurity
This Competency Assessment assesses the following outcomes: IT104M5: Explain current cybersecurity threats and the future of cybersecurity. GEL-6.06: Apply research to create original insights and/or solve real-world problems. PC-2.2: Formulate innovative solutions for identified initiatives. Purpose To remain current in your discipline, you will have to continually review and learn about what might be taking place in the future that will impact the cybersecurity arena. This Assessment will allow you to research possible future cybersecurity considerations in several areas and to come up with solutions to challenges in the cybersecurity area. Assessment Instructions Part 1 Using the Reading, the library, and Internet research, answer or explain the following in a minimum 500-word paper that covers the following and includes three or more APA style references: Discuss security issues with ubiquitous data, mobile devices, and cybersecurity considerations. Explain the cybersecurity implications of cloud computing. What would be the cybersecurity implications of quantum computing? Note: Papers not meeting the minimum 500-word length requirement will not be accepted. Part 2 In a minimum 500-word paper, explain the steps you would take if one of your organization’s main servers was infected by malware. Use outside research to support your solution to this real-world problem. Your paper must demonstrate an assessment of the problem, your decision-making process, and a justification for your conclusion in relation to your research. You must provide at least three appropriate resources for your paper. Be sure to cite the resources you use in proper APA style formatting. Note: Papers not meeting the minimum 500-word length requirement will not be accepted. Part 3 (refer to Attacking a Virtual Private Network (Part 3 Lab)) Access the link entitled “Attacking a Virtual Private Network” in this Assessment section. There are also links for a Common Lab Tasks Manual and for J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference. Complete the assigned parts of the Lab. Provide the screenshots as specified below. Open the lab entitled Attacking a Virtual Private Network using the link in this Lab section. On the Intro tab read Introduction to the Deliverable section. Select Section 1: Hands-On Demonstration, select Part 1: Follow a Social Engineering/Reverse Social Engineering Attack. Complete Steps 1-17, in Part 1: Follow a Social Engineering/Reverse Social Engineering Attack. Take a screenshot of Step 14. Complete Steps 119 in Part 2: Spear Phishing Email attack. Take screenshots of Steps 4 and 16. Once you have completed the Lab and have your screenshots, write an introductory paragraph that introduces the Lab to the reader. The introduction will be a minimum of 250 words and summarize what you did in the Lab and its importance to cybersecurity or the module materials. Along with your introduction and screenshots, include two additional sections, answering the following in a minimum of 250 words for each response: 1. Explain how to steal a laptop or tablet at an airport. 2. Explain an effective phishing email. Note: Papers not meeting the minimum word requirements, providing all screenshots, and all questions answered will not be accepted. Minimum Submission Requirements This Assessment should be a Microsoft® Word® document of at least 1750 words plus screenshots, in addition to the title and reference pages. Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your paper should be highly organized, logical, and focused. Your paper must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics. Your paper should provide a clearly established and sustained viewpoint and purpose. Your writing should be well ordered, logical and unified, as well as original and insightful. A separate page at the end of your research paper should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research. Be sure to cite both in-text and reference list citations were appropriate and reference all sources. Your sources and content should follow proper APA citation style. For assistance with APA requirements, please go to APA Style Central. You will find the link in the Academic Tools section of the course. (It should include a cover sheet, paper is double spaced, in Times New Roman 12-point font, correct citations, Standard English with no spelling or punctuation errors, and correct references at the bottom of the last page.) If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored. Plagiarism Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism. Review the rubric before beginning this activity.
Order Solution Now at a 15% Discount!