McCurley-Shimer_Assignment #1
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
440
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
7
Uploaded by DeanHippopotamus5891
Assignment 1
1
Assignment 1
Alexus McCurley-Shimer
American Military University
INTL440 Cyber Warfare
Professor Binversie
November 20, 2023
Assignment 1
2
Throughout time there has been many issues with cyber crime especially as technology
has progressed. Understanding the ins and outs of how cyber crime can be conducted is very
important for a user to be aware of the dangers that they can face. As well as understanding the
many different ways that the users are able to communicate with technology. With this paper we
will understand the building blocks that make communications via networking secure. As well as
the understanding of the software challenges that there are.
There are four different ways for communication on the internet. “It can be done through
various means, including email, instant messaging, social networking, and video conferencing.”
(Naha 2023) The first is instant messaging which is an online chat technology that allows people
to be able to communicate via messages in real-time on the internet. The second is VoIP and
Internet Phone System which has the internet route to telephone calls instead of the traditional
phone lines. Such as voice over internet protocol (VoIP) that sends voice packets by using IP
instead of PSTN which is Public Switched Telephone Network.
The third is email which is when an individual communicates via messages and files.
Email communications have become extremely fast and reliable when it comes to
communicating. The fourth is the social networking platforms. This is done over social media
such as Facebook, Twitter, Instagram, and more. Social media has become a popular way for
internet communication. This is due to the speed and simplicity of communicating with friends
or customers, being able to enhance businesses brand awareness, a good way to redirect traffic,
the ability to help businesses interact with their customers, and to help with advertising,
promotions, as well as market research.
There are many different aspects to network building blocks that we will be going over.
Assignment 1
3
Switches:
o
“A switch connects endpoints to the network so they can communicate with each
other.” (Cloud Academy n.d.)
o
Two primary benefits:
Provide each pair of communicating devices with a speedy connection
Ability to segregate communications to be able to ensure that it does not
enter other areas of the network.
o
The capability of momentarily connecting the receiving and sending of a device to
be able to use the bandwidth of a network without any interference.
Routers:
o
Are the devices that connect two or more different networks as well as filter the
network traffic to ensure that only the desired information is able to travel
between them.
o
Example:
Routers are able to be used as well as to regulate the flow of information
from internal networks and the internet.
o
Wide area network or WAN is the portion of the network that connects the
routers.
Proxy Servers:
o
These act as a web filter and firewall. These are able to provide a shared network
connection and is able to cache data to be able to speed up any requests.
o
Proxy servers are able to keep users and the internal network protects from any
bad things such as malicious attacks.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Answer ASAP
arrow_forward
Identity theft is one of the most widespread types of cybercrime, and it affects millions of people in different parts of the globe every single year. You should provide an explanation of how identity thieves gain your personal information by utilising the internet, as well as the preventive actions you should take to avoid having your identity stolen by criminals who engage in such activities.
arrow_forward
Objectives
Explore the career opportunities for cybersecurity professionals.
Explore the career requirements for cybersecurity professionals.
Part 1: Exploring Cybersecurity Jobs
Part 2: Cybersecurity Job Requirements
Background / Scenario
The cyber world is full of dangers and threats to individuals, organizations, and countries. These perils have resulted in a major demand for individuals with the knowledge, skills, credentials, and ethics to protect our people and systems. In this lab, you will explore the types of jobs available, job titles, job requirements, and credentials required by the cybersecurity industry. The Internet is full of job search websites that can provide you with information about careers in cybersecurity. Many of these websites are job search sites called job aggregators. This means that they collect job postings from many other sites and organizations. In part one, you will explore three of the world’s most popular job aggregator websites. In part two, you…
arrow_forward
There are various enacted statutes or laws that address different aspects of cybersecurity.
1.) What piece of legislation (law) do you think has been most impactful in this realm and why? Be sure to give the name of a state or federal statute (law), a brief description discussing its purpose, and how it has impacted cybersecurity from a legal perspective.
arrow_forward
For how long has the threat of cyberterrorism been considered serious by the U.S. government?
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
Word limit: 1000 words
arrow_forward
What are the most popular subjects and trends that are today associated with cybercrime, and how did they first come into existence? If you want an accurate answer from me, you will need to offer an explanation as to where you acquired the information.
arrow_forward
Identity theft is one of the most prevalent forms of cybercrime, affecting millions of people in various regions of the world each year. You should explain how identity thieves use the Internet to obtain your confidential information, as well as the precautions you should take to avoid having your identity taken by offenders who engage in such conduct.
arrow_forward
What are some of the many ideas that have been proposed on the occurrence of cybercrime? In response to your inquiry, I was wondering if you could kindly supply some references.
arrow_forward
Where have you seen vulnerabilities and exposures in cyberspace in the real world?
arrow_forward
1
arrow_forward
ESSAY
Non-technical cybersecurity attacks
Countermeasures to non-technical threats
arrow_forward
What are the many explanations for cybercrime? In answer to your enquiry, could you please provide some references?
arrow_forward
What are some of the roles and responsibilities that a person who works in the area of cyber security is expected to take on?
arrow_forward
what occurs when individuals engage in illicit activities online and how
such activities are carried out. What are some ways that you may
protect yourself from being a victim of a crime that takes place online?
In what ways are you able to put a stop to it?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Answer ASAParrow_forwardIdentity theft is one of the most widespread types of cybercrime, and it affects millions of people in different parts of the globe every single year. You should provide an explanation of how identity thieves gain your personal information by utilising the internet, as well as the preventive actions you should take to avoid having your identity stolen by criminals who engage in such activities.arrow_forwardObjectives Explore the career opportunities for cybersecurity professionals. Explore the career requirements for cybersecurity professionals. Part 1: Exploring Cybersecurity Jobs Part 2: Cybersecurity Job Requirements Background / Scenario The cyber world is full of dangers and threats to individuals, organizations, and countries. These perils have resulted in a major demand for individuals with the knowledge, skills, credentials, and ethics to protect our people and systems. In this lab, you will explore the types of jobs available, job titles, job requirements, and credentials required by the cybersecurity industry. The Internet is full of job search websites that can provide you with information about careers in cybersecurity. Many of these websites are job search sites called job aggregators. This means that they collect job postings from many other sites and organizations. In part one, you will explore three of the world’s most popular job aggregator websites. In part two, you…arrow_forward
- There are various enacted statutes or laws that address different aspects of cybersecurity. 1.) What piece of legislation (law) do you think has been most impactful in this realm and why? Be sure to give the name of a state or federal statute (law), a brief description discussing its purpose, and how it has impacted cybersecurity from a legal perspective.arrow_forwardFor how long has the threat of cyberterrorism been considered serious by the U.S. government?arrow_forwardHi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forward
- Word limit: 1000 wordsarrow_forwardWhat are the most popular subjects and trends that are today associated with cybercrime, and how did they first come into existence? If you want an accurate answer from me, you will need to offer an explanation as to where you acquired the information.arrow_forwardIdentity theft is one of the most prevalent forms of cybercrime, affecting millions of people in various regions of the world each year. You should explain how identity thieves use the Internet to obtain your confidential information, as well as the precautions you should take to avoid having your identity taken by offenders who engage in such conduct.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning