U CS Week 2

1)  

2) Week Two Assignment

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

3) Week Four Discussion

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

4) Week Four Discussion

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

5) Week Five Assignment

Learn About Defending Against DDoS

 

Using WORD, write an ORIGINAL brief essay of 300 words or more:

Find a DoS attack that has occurred in the last six months

You might find some resources at www.f-secure.com.

Note how that attack was conducted.

Write a brief explanation of how you might have defended against that specific attack.

6) Week Six Assignment

Use a search engine to find the names of five different cyber viruses.

Using WORD, write a short paragraph on each.

Use your own words and do not copy  the work of another student.

7) Week Seven Discussion

Use the Web to search for examples of hacks that made the news.

Write a brief description of the attack indicating what type of hack was involved. 

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 words.

8) Week Eight Assignment

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after Davids departure, it is discovered that a good deal of the ABC Companys research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect Davids alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

9) Week Nine Assignment

1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

2). Send a brief message (ten words minimum) using the Caesar Cypher

10) Week Ten Assignment

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.

 

Write between 200 and 300 words.

11) Week Eleven Assignment

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

12) Week Eleven Submit Final Project Topic

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

Possible Computer Security Research Project Topics

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

13) Week Twelve Assignment

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

14) Week Thirteen Project Abstract

Your final project material is due this week.

Submit your project abstract here.

13.1) Week Thirteen Discussion

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Read and respond to at least two other students Discussions.

Post your initial response by the end of the day on Thursday and reply to at least two other students by the end of the day on Sunday.

Post between 200 and 300 words.

15) Week Fourteen Final Project Detail

Gather all final project material:

final paper

PowerPoint

Editing

Please post your discussion essay and comments as REPLIES (below) rather than starting a new discussion thread or posting an attachment. 

(I suggest composing your essay in a word-processing program first and then cutting and pasting the text box below.)

Its a good idea to remember that in an online course, discussion essays and written work are your chance to show off what you’re learning. Since I don’t see you in a classroom taking notes and asking questions, these are your primary ways to demonstrate your hard work and to earn the grade you want in the class.

DISCUSSION POST:

Preparation:

1) Click on Every Cut a Weapon: Martin Scorcese on the Editing of PSYCHO. (Links to an external site.) (https://nofilmschool.com/2016/02/every-cut-weapon-martin-scorsese-editing-psycho)Read the page, and watch and study the videos it contains.

2) Then watch the famous shower scene from PSYCHO. 

Assignment prompt:  In a brief 750-word essay (minimumit may need to be longer to  cover the topic in sufficient detail), summarize the main focus of the web page as a whole, Scorceses points about Hitchcocks editing, and Hitchcocks own comments about the editing in PSYCHO. To what extent do you feel the shower sequence in particular participates in and departs from the specific techniques and transitions of  continuity editing, as defined in your textbook? How and why?

Remember that you should write formally. Include a thesis at the beginning of your essay, define terms very specifically, defining and referring to the language of the textbook and course videos before you start applying them to the film, and support your observations with specific examples from the film and the textbook. The more specific you can be, the better. Give page numbers if you cite or quote the textbook.

COMMENT POSTS: In another message, comment on what another classmate posted, referring to the student by name. (Each comment should be at least 75 words.) Reply to a different student than those you responded to in Discussions 1 – 3. Your comment will be assessed according to the quality of its interaction with others; thoughtfulness; being informed; respectfulwhile still being rigorous and analytical.

Task: Watch the film “Seeds of Revolution: The Arab Awakening (Links to an external site.)” and comment on the key moments in the narrative that help you understand the following:

– April 6th movement
– The role of technology
– The cracks in and the backlash to the movement

Word length: Around 100 words per point

Submission: There is no submission button in this assignment. Please submit your responses in vialogues. 

https://www.vialogues.com/vialogues/play/54149

 Discuss the issues of corruption and ethics in corrections. Review and discuss the various issues related to corruption and misconduct that are reported to occur in jails and correctional institutions, such as promoting contraband, sexual relations with inmates, excessive use of force, etc., and pay specific attention to the issues identified and any recommendations for change.  

 

Respond to the following in a minimum of 175 words: 

Your company has a downtown campus that contains its main corporate offices, but also two other company buildings onsite.

Management tasked you to set up a Local Area Network to Local Area Network (LAN-2-LAN) network between the main corporate offices and remote buildings on the campus. 

Discuss considerations organizations take into account when generally planning for wireless network capacity and growth for future buildings, including the importance of “Line of Sight” technical requirements for network implementation across multiple buildings.

In at least 1,000 words (excluding title page, abstract (optional) and reference page), research retirement in the United States. In your paper discuss the retirement age of 65. Where did this age come from? Does this age still work? Are more people working past the age of 65? Is retirement as stress free as it is portrayed in the media or is it dependent on other factors such as financial security, capacity, etc.? 

 

Remember to avoid the use of first person. Paper must be in IWG formatting and have at least three references. You must use SHARC (ProQuest, PubMed, Google Scholar) for your research. Cite and reference both sources of information.  

To access ProQuest through SHARC:

           username: 0W3THVQJGM
           password: welcome

In at least 600 words, discuss the following questions: What is Medicare and how does one qualify? What other insurances or plans do you need for a Long-Term Care plan?

Please submit as an IWG-formatted Microsoft Word attachment. Paper must have at least two references.

Please use ProQuest or other SHARC databases for your reseach

To access ProQuest through SHARC:

           username: 0W3THVQJGM
           password: welcome

300 words; two paragraphs; Each paragraph should have one clear point or question, and all the sentences within the paragraph should be supportive of the main point. Primary information on the writer or the text, such as a plot summary, should not be included. Instead, the response papers should be venues for the expression of original and creative ideas and readings.

Students are free to write about what they liked or disliked in the text, what they think the main point of the text is, and if they agree or disagree with the approaches of the text.

Students also should demonstrate that they have read ALL of the required readings for the week. When citing a passage from a text, indicate the page number in parentheses at the end of the sentence.

Rubric:

How have your personal, academic and professional experiences led you to pursue the MSF degree at this time? Please discuss both your short- and long-term career goals, including your vision of your post-graduation employment, and describe how the Texas MSF will help you meet those goals.