develop a mini-training course on your assigned topic and deliver that training to the class.

As an information security professional, you will often be called deal with security threats that impact the organization on an ongoing basis, and to provide guidance to multiple organizational units on ways to recognize, cope with, and avoid these threats.  In this assignment, you will research in detail an attack type or threat assigned by your instructor.  As a project group you will develop a mini-training course on your assigned topic and deliver that training to the class.

Deliverables for this assignment include (but aren’t limited to):

  • A white paper on your assigned threat/attack.  The paper will provide:
    1. A description of the threat/attack method, including the types of attacks performed (DoS, Access, etc).  There are multiple versions of many attacks, so you should go over the major forms/groupings.
    2. A description of how the attack is performed. (What elements in the network are being attacked, tools used, vulnerability being exploited)
    3. Attack signature for inclusion in an organizational Incident Response Plan (How would we recognize the attack on our systems?)
    4. Faulty practices (programming, design, training, etc.) that enable the threat/attack
    5. Industry Best Practices for avoiding or mitigating the risk of this threat or attack form
    6. References for further study (Technical and Cases)
  • 5 multiple choice and 1 essay question with grading rubric for use as part of the unit exam

Everyone must turn in a peer evaluation using the peer-evaluation form provided by the due date posted on Moodle.  Use form and link provided in this assignment cluster to turn in your evaluation.  Group peer evaluations will count 10% of the assignment.  Failure to turn in an evaluation will result in a grade of 0 for that component of the assignment.

The white paper must: use APA format, use 12 point Courier or New-Courier font, be a minimum of 15 double spaced pages (excluding bibliography and graphics).  Papers should use at least 10 references.


determine the context, order, and any linkages between the required elements listed below

 Demonstrate your understanding of Assembly in relation to other languages, your ability to apply existing ARM64 assembly mnemonics and techniques to a specific purpose, and to demonstrate the ability to….

Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).

Case Study: You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct….

Identify dependencies between various business areas and functions.

PROJECT TITLE Business Continuity Plan for Financial Institutions ABSTRACT Due to increase in customers’ demand, competition, 24hrs continuous service, frequent changes in regulatory policy requirements and changes in various threats….