1 / 5

SEC 435 COMPLETE WEEK DISCUSSIONS PACK-STRAYER

Visit Below Link, To Download This Course:<br><br>https://www.tutorialsservice.net/product/sec-435-complete-week-discussions-pack-strayer/<br><br>Or <br>Email us on<br>SUPPORT@TUTORIALSSERVICE.NET<br><br>SEC 435 Complete Week Discussions Pack-Strayer<br>SEC435<br>SEC 435 Week 1 DQ Latest-Strayer<br>You will need to create your own original thread.<br>The create thread button is in the upper left corner once you click on the link above.<br>“Session Hijacking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:<br>

Download Presentation

SEC 435 COMPLETE WEEK DISCUSSIONS PACK-STRAYER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEC 435 COMPLETE WEEK DISCUSSIONS PACK- STRAYER Visit Below Link, To Download This Course: https://www.tutorialsservice.net/product/sec-435-complete-week-discussions-pack-strayer/ Or Email us on SUPPORT@TUTORIALSSERVICE.NET SEC 435 Complete Week Discussions Pack-Strayer SEC435 SEC 435 Week 1 DQ Latest-Strayer You will need to create your own original thread. The create thread button is in the upper left corner once you click on the link above. “Session Hijacking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Consider the “What if” case in Chapter 1 from the Book:Web Applications and Data Servers and respond to one or more of the questions asked. Research the web, and discuss any recent story concerning session hijacking. Provide summary and discussion on what might have been done to prevent such hijacking, or how such hijacking can be recognized. Any current topic or article related to penetration techniques. The instructor insight.    While the minimum requirement is an original and single response, one can get much more from the class by going beyond minimums and engaging in conversation with your professor or other students. I encourage one to go beyond the minimum and those that can engage in four or more posts will truly learn much more than what is just in the physical classroom or text books. I do give bonus points for extra work assuming quality, and good writing. I take the rubric seriously so I grade 20 percent of the post on style, format, and writing. So please use good paragraphs, don’t write in mounds of text, and bury ideas. Use salutations in both the subject line and the message. Use proper citations for any sources one uses. Never cut and paste from the web or other source and use it by itself as an original post, or response. Use direct quotes properly tied

  2. to your words, or if you want to share an article or other material, do so as an additional post, with proper citation. SEC 435 Week 2 DQ Latest-Strayer “Web Application Threats” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), and provide a rationale for your rankings. Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer. Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), discuss the appropriate countermeasures that security personnel could utilize in order to minimize the damage of such threats. Determine whether or not the countermeasures that you have ranked are reactive or proactive in nature, and suggest the primary ways in which each countermeasure could assist in preventing further damage from the threats in question. Explain whether or not honeypots would assist in protecting and evaluating the three threats selected. Provide a rationale for your response. Any current topic or article related to penetration techniques. The instructor insight.    Note: Reminder that you need to create your own original thread, use a proper subject, and have salutations for all posts in the subject line and message, use proper paragraphs and citations if you have sources, and that you are sharing your thoughts, not regurgitating the text or outside sources. I encourage you to do more than just the minimum, and fully engage in conversations. SEC 435 Week 3 DQ Latest-Strayer “Cracking” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Based on the “What if” case in Chapter 4 from the Book:Web Applications and Data Servers discuss the ethical aspects of what Regi did, and the possible ramifications of his actions. Based on the “What if” case in Chapter 5 from the Book:Web Applications and Data Servers discuss the ethics of whether the company had an obligation to report or not, and why? What would you have done and why? Any current topic or article related to penetration techniques. The instructor insight.    SEC 435 Week 4 DQ Latest-Strayer

  3. “SQL Injection Attacks and Preventions” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Read Sammut, T., & Schiffman, M. (2013, April 5). Understanding SQL Injection. Retrieved from http://www.cisco.com/web/about/security/intelligence/sql_injection.html. Read Wichers, D., Manico, J., & Seil, M. (2014, April 12). SQL Injection Prevention Cheat Sheet. Retrieved from https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet. Describe the major concerns that information security professionals and SQL database administrators should have with SQL injection attacks. Additionally, provide the key reasons why you believe such attacks are popular among hackers, both malicious and ethical. Justify your response. Suggest what you believe to be the two most critical best practices for protecting against SQL injection attacks, and establish whether or not you believe that there are significant efforts for security professionals who implement these best practices. Provide a rationale for your response. Any current topic or article related to penetration techniques. The instructor insight.    SEC 435 Week 5 DQ Latest-Strayer Case Study” Have an original post of no less than three or four paragraphs, and offer advice of a paragraph or two to at least one other student. This is the proposal for your term paper due in week 9. Papers should not be written in a one week or weekend, but should take some time to research, consider, and then draft. Once drafted, ideally, one sleeps on the paper, so one can proof and revise one last time before submitting the final draft. I expect a 400 level paper, so give some thought to your case study and provide me a short synopsis of what you hope to look at, why, and what you hope to learn or accomplish.  Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility. For the discussion lay out the basic details of the case, why you chose this case, and speculate on what specific lessons you learned from the case, as well as possible recommendations for future situations. This proposal should be no less than three or four paragraphs. SEC 435 Week 6 DQ Latest-Strayer “Macs and Viruses” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  A common misconception with Mac OS X systems is that they are not as susceptible to viruses and malware as PCs and therefore do not require users to apply additional security measures. Discuss whether or not you believe this is true. Provide a rationale for your response. Review current Mac security features from Apple’s website located at http://www.apple.com/macos/security, and read the article 10 Best Antivirus for the Mac at http://techtop100.com/9-best-antivirus-for-mac-do-macs-need-antivirus-best-free-mac-antivirus. Select two tools, and research their features, functionality, provided protections, mitigated risks, 

  4. costs, and any other pertinent information. Evaluate the quality of at least two of the selected Mac security tools, based on their available features, functionality, provided protections, mitigated risks, costs, and any other pertinent information discovered in your research. Decide whether or not you would recommend either of the tools for a Mac user. Justify your response. Any current topic or article related to penetration techniques. The instructor insight.   SEC 435 Week 7 DQ Latest-Strayer “Mobile Malware” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Determine whether or not you believe both that mobile malware is the new frontier for virus makers and hackers and whether or not mobile device security concerns will surpass those of standard computing devices over the next five years (e.g., desktops, servers, etc.). Justify your response. Analyze the mobile device OS that you believe is the easiest to hack. Additionally, explain the ineffective security features that are utilized by this specific mobile device OS, and indicate the key reasons why you believe the security feature is failing to provide better protection. Provide a rationale for your response. Any current topic or article related to penetration techniques. The instructor insight.    SEC 435 Week 8 DQ Latest-Strayer “What If?” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Read the “What if” case in Chapter 3 from the Book:Secure Network Operating Systems and Infrastructures provide a brief summary and respond to the two questions that are asked. Discuss any aspect of “honeypots” and share your views on the value of such honeypots for ethical hackers, or how as a security professional you can protect yourself against providing such honeypots for exploitation. Any current topic or article related to penetration techniques. The instructor insight    SEC 435 Week 9 DQ Latest-Strayer Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Imagine that a systems administrator for a midsized company has recently noticed numerous odd characters in the log servers. Specifically, http “GET” and “POST” log entries within their externally facing IIS version 5 web server. Discuss the use of the “GET” and “POST” commands and decide whether or not there are concerns with their presence on the externally facing web server. Next, provide your analysis of the most damaging attack (i.e. XSS, SQL Injection, CSS, and Race conditions) against Internet Information Services (IIS). Support your rationale.

  5. Describe the most prominent signs that a database attack has occurred. Suggest the main steps that one would take to recover from such an attack. Next, propose one strategy you would use to prevent such attacks. Any current topic or article related to penetration techniques. The instructor insight   SEC 435 Week 10 DQ Latest-Strayer “Encryption in Organizations” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:  Suppose an executive-level manager asked you to explain the importance of encryption. Detail the key points that you would use to justify the importance of using encryption during the overall security posture analysis of the executive-level manager’s organization. Research the web for examples of the manner in which security professionals could use encryption in organizations today (e.g., database encryption), describe at least two uses of encryption within organizations today that you found in your research. From the uses identified, indicate the information resource the encryption is designed to protect. Assess the importance of protecting such an information resource from a security perspective. Any current topic or article related to penetration techniques. The instructor insight.    SEC 435 Week 11 DQ Latest-Strayer Share your thoughts in the class, and consider:   What you thought of the class; Identify two new insights about network penetration testing you have discovered from this course, and/or Discuss the manner in which you can apply the learning outcomes of this course to your professional and personal life. And/or anything else you wish to comment on. Download Now   

More Related