Emerging Threats Discussion Questions
Given the vast amount of known threat indicators and level of network activity today, automation has become a necessity. It’s often difficult and time consuming for human analysts to efficiently manage large amounts of granular data and a wide range of cognitive biases. Therefore, manual threat correlation is often too slow to keep up with the amount of data generated, results include a high number of false negatives and positives, and outputs are not always reproducible.
However, performing manual threat correlation processes will remain crucial. The human brain’s ability to leverage well-formed biases and perform higher-order reasoning is essential for assessing the validity and value being provided by whatever solutions your organization uses as well as building your cyber threat management team’s knowledge base. Thus, even when automated methods are employed, the final tier of analysis typically uses these human abilities for sense-making before any actions are taken.
Conduct your own research and discuss with the group the following:
· Field Techniques of Comparison?
· Rules for Based Matching?
· What is Fuzzy Matching?
Bonus point
How threat actors can evade detection via threat correlation ?
References:
Reid, R.D., and Sanders, N. (2016). Operations management. 6th ed. Wiley. ISBN: 978-1118
Question2: Security-Cryptography (2 pages and 3 scholarly articles)
Textbook: Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history
Question 3: Cloud Computing
a. Assignment (1000 Words and textbook reference)
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
Jamsa (2013) specifies five advantages cloud-based providers may have with respect to security. Additionally, the author specifies five security disadvantages to hosting applications and their data within the cloud.
Using these 10 advantages and disadvantages as Level 1 headings in a paper, summarize each in your own words. Then, explain how you believe each of the five advantages could actually become risks if IT security personnel do not embrace them.
The following are required:
· Use Jamsa (2013) as your ONLY reference
· APA 7
. Headings
. Title page
. third-person
. in-text citation
. References List
b. Assignment (three unique references and Length: 4 paragraphs each question)
Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.
1. Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack. Use at least three unique references. Length: 4 paragraphs.
2. Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create. Use at least three unique references. Length: 4 paragraphs.
3. Define predictive analytics and discuss how an IT manager might use such analytics. Use at least three unique references. Length: 4 paragraphs.
4. Describe IT governance considerations one should evaluate before moving an application to the cloud. Use at least three unique references. Length: 4 paragraphs.
Question 4: ANTHRAPOLOGY
1. What is economic justice? Millions of people around the world live in poverty. Is this economic justice? How can the problem be solved? Should some people be required to give up the fruits of their own labors so that others can be lifted out of poverty? Think back over all you have learned about cultural diversity this semester and consider the problematic concept of economic justice.
After considering the problem of economic justice from an anthropological perspective, write an editorial about how we can best achieve economic justice for the world’s inhabitants. Share your ideas with your fellow students by posting your editorial to your class’s online forum. Read your fellow students’ posts. Does someone else have a better idea than yours? Can your idea be improved by making a compromise with the ideas of your fellow students? After reading at least five other editorials, revise your original editorial and, if you are confident about your work, submit it to your school paper for publication. (300 Words)
2. It’s time to make use of your anthropological research skills. Using the resources you have at hand, such as your library and the Internet (be sure to check with your instructor about appropriate web pages to use), find at least one culture that can be classified as a band, another that can be classified as a tribe, and one more that can be classified as a chiefdom. Consider carefully why you think the culture belongs in each type.
Post a summary description of each of the three cultures you found to your class’s online forum. Be sure to include why each culture deserves to be classified as a band, a tribe, or a chiefdom. (300 Words)