Category: Engineering – Telecommunications Engineering

Week 8 Literature Review

Instructions Assignment Instructions: I posted the sample Thesis paper and the capstone manual.  Also, use the previous work for to continue the assignment. Review your articles/sources and continue writing your 25 -page literature review due this week. Submit your Draft Thesis Literature Review Thesis Literature Review (See Appendix 1: MA Theses and Appendix 2: MA […]

Read More

Regulation vs Innovation

Week 8 Discussion Regulation vs Innovation For your initial post, discuss the topics below. Respond to posts from other students. Law and Regulation vs Innovation Examine and describe in your own words at least 3 US government regulations that can compel business organization to manage their cybersecurity at a certain level.  Why are these regulations necessary? Examine and describe in your […]

Read More

Training

Week 6 Discussion — Training For your initial post, discuss the two topics below.  Training: Describe Cybersecurity Training programs at your own organization (frequency, use of automation, certification after finishing, etc).  How is cybersecurity training at your organization designed to successfully overcome resistance to changing users’ poor cybersecurity habits? (Just talk about Air Force Cyber Awareness Training.) […]

Read More

Advanced Techniques for Cybercrime Analysis: Identifying and Mitigating Emerging Threats

Instructions I attached the work done so far…Use the Sample thesis for formatting and the Capstone Manual to assist. Assignment Instructions: Submit your Thesis or Creative Project Introduction Review your articles/sources and continue writing your 25 -page literature review due week eight Thesis or Creative Project Introduction (See the Capstone Manual) An Introduction is due […]

Read More

Design for Resilience

Week 5 Discussion Design for Resilience For your initial post,  discuss the two topics below. Design for Resilience Appraise some approaches for managing the development of Software — is it mainly art or mainly science?  Describe some recent security failures experienced by Cloud Computing Service Providers, and describe resulting business experiences of various customers. Appraise some recommendations by authorities (such as NIST, […]

Read More

Formal Proposal

I included my outline previously written with the topic:  “Advanced Techniques for Cybercrime Analysis: Identifying and Mitigating Emerging Threats”  Assignment Instructions:By this time, you would have selected a topic and provided a proposal outline for your thesis or creative project of which must align with your core subject area. Please use the Capstone Manual.   The […]

Read More

Cybersecurity Policy Design Issues

Week 3 Discussion – Cybersecurity Policy Design Issues For your initial post, discuss the topics below.  Respond to posts by other students Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security […]

Read More

IT discussion 1

Consider jobs that require a solid understanding of basic computing, computer storage, and processing speeds as part of an information technology degree. Put yourself in the position of the hiring manager and think about what you would expect as competent responses from an applicant: Briefly explain the four main parts of a computer system information. […]

Read More

Week 6

Assume that you are the chief legal administrator for a hypothetical law firm that is considering accepting cryptocurrencies from its clients for the legal services that it renders.  The senior law firm partner has asked you to design and explain a proposed procedural checklist / outline that addresses how the law firm may be able […]

Read More