network security

network security
Part 2 – For the first discussion, find a recent (less than one month old) online journal or news article about a network attack or crime that you personally find interesting. Give the title of the article, the URL for where you found the article, and a brief summary of what the article was about. Tell us what was it about the crime that you found interesting and what you made you select this particular crime. Then identify the perpetrator, the victims, and the crime scene or scenes for this crime.

• For this discussion, find a recent (less than one month old) online journal or news article about a network attack or crime. Give the title of the article, the URL for where you found the article, and a brief summary of what the article was about. Then answer the following questions:
How was Confidentiality affected in this attack (low, moderate, high) Defend your decision.
How was Integrity affected in the attack (low, moderate, high) Defend your decision.
How was Availability affected in this attack (low, moderate, high) Defend your decision.
• For this discussion, you care free of time constraints and can use an article or story from any time as long as the article involves cryptography. Give the title of the article, the URL for where you found the article, and a brief summary of what the article was about. Then answer the following questions:
Did this article involve symmetric or asymmetric cryptography
Was cryptography used in a positive or negative manner Explain you answer.
What role did law enforcement or government agencies play in the article Again, explain your answer.
• For this discussion, find a recent (less than one month old) online journal or news article that involves malware. Give the title of the article, the URL for where you found the article, and a brief summary of what the article was about. Then answer the following questions:
What category of propagation was used by the malware
What payload did the malware deliver
Who or what did the malware target
Was the attacker found if so, what happened to the attacker What was the motive of the attacker

• For this discussion, find a recent online journal or news article that involves an underground economy used by digital criminals. Give the title of the article, the URL for where you found the article, and a brief summary of what the article was about. Then answer the following questions:
What type product was being offered for sale
What role did individual(s) in the article play in the underground economy
If an arrest was made, what were the suspects charge with Or, if no arrest was made, why do you hypothesis the suspects could be charged with

each point in a page with one source. keep it organized and simple.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"