Subject: ITS-834: Emerging Threats & Countermeasures
Reading Resources:
Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699. https://doi.org/10.1007/s10207-017-0382-0
Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605. https://ieeexplore.ieee.org/document/9036175
Click PDF, In Institution name box, enter: University of the Cumberlands, UC OneLogin will pop up and login with UC email address and Password.
G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482. https://ieeexplore.ieee.org/document/8992645
Click PDF, In Institution name box, enter: University of the Cumberlands, UC OneLogin will pop up and login with UC email address and Password.
Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10
Discussion: Pen Attack and Cyber Terrorism
Word count: 300+ words
Chapters 15, and 16 in the course textbook
There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?
Make sure to back up your statements with scholarly support.
· Please cite properly in APA 7
· At least one scholarly source should be used.
· Use proper citations and references in your post.
Research Paper:
Number of pages: 4+
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
Your paper should meet the following requirements:
· 4+ pages in length, not including the required cover page and reference page.
· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Reflection: Practical Connection Assignment
Number of pages: 2+ pages
This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment:
Provide a reflection of at least 2 pages of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
Requirements:
Note: plagiarism check required, APA7 format, include References, within 8hrs
This post has 3 individual assignments (discussion, research paper and reflection).
Please provide answers in separate documents.
Your payment is processed by a secure system. We accept Mastercard, Visa, Amex, and Discover. We don’t share any information with third parties.
You can communicate with your writer. Clarify or track order with our customer support team. Upload all the necessary files for the writer to use.
Check your paper in the preview mode (.jpg format). If it meets your requirements, approve and download. If any changes are needed, request a revision to be done.