Compliance with PCI DSS is a contractual obligation. · Explain how this differs from a regulatory obligation. · Which takes precedence a regulatory requirement or […]
Computer science
Cryptographic algorithms
Analyze the role cryptographic algorithms play; you will use this knowledge throughout the course. Next, explain how these algorithms could be utilized in a way […]
Access Controls
Physical security, biometric technology, and societal acceptance Discuss the strengths/weaknesses of the topic and possible improvements. Use at least one NIST resource as a reference. […]
Educating users
Educating users can be a formal or informal process. Formal methods are those that communicate policies in a formal training environment, such as a classroom or […]
Organization’s security posture
Define the following terms risk, threat, vulnerability, asset, and impact of loss. After you define each term identify their role within an organization’s security posture. You must use at […]
How embedded computers and the IoT impacted your daily life
How have embedded computers and the IoT impacted your daily life? What additional uses can you see yourself using? What security or other risks might you encounter with […]
The structure of an ACL (Access Control List)
Access control lists are ordered sets of rules that control the traffic that is permitted or denied the use of a path through the […]
Moving to the cloud
Take on the role of a Cloud Consultant explaining to a client why they should or should not consider moving to the cloud. You can choose the type of business […]
Securing the data of your workplace.
Consider yourself responsible for securing the data of your workplace. You must already be aware that this is not as simple as backing up to […]
Cloud storage
Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.