+1 914 979 2828
+1 914 979 2828
January 5, 2022

social networking site

Use the Internet to select a social networking site. Research the security settings available for the site. Write a 2-3 paragraph report describing the settings. Compare them to the defenses for social networking sites presented in […]
January 6, 2022

fundamental security design principles.

compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.
January 8, 2022

The threat posed by cyber actors

Question: The threat posed by cyber actors is significant and growing. Do you agree with the Director of National Intelligence that Cyber issues have become as important as terrorism as an intelligence priority?
January 11, 2022

Cyber security- Figuring out a hash value

  The hash value of a message is a one-way “unique value” that can be extracted from the message using algorithms like MD5 and SHA-x. In this paper, you are going to use a hash calculator […]
January 16, 2022

Using AI in Audit

https://uab.instructure.com/courses/1536302/modules/items/15339951 Using concepts from the video, explain how AI could assist the auditor with transforming the job of (1) the audit process (such as quality review and reporting); (2) risk assessment (including identification of risks using […]
January 25, 2022

Methods of routing

Discuss which method of routing you prefer, static routes or dynamic routes. Briefly justify your choice. Consider extremely large networks that have thousands of routes. Does your preference change based on the scale of the network? […]
January 26, 2022

Ethical Hacking

Conduct your own social engineering experiments.1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family […]
January 26, 2022

Advantages and Disadvantages of PGP

Imagine that you work for a federal law enforcement agency and your manager has tasked you with researching Pretty Good Privacy (PGP). Examine three advantages and three disadvantages of PGP, and recommend whether or not the […]
January 26, 2022


Hackers break into systems and disrupt web site services: Discuss are they criminals, or are they challenging computer specialists discover faults within computer networks and systems?
January 27, 2022

Network threats

List three network threats and list the IT infrastructure domain that the threat may harm. Why/How does those threats harm that particular domain?