Presentation and a paper Of two Projects

Need your ASSIGNMENT done? Use our essay writing service to score better and meet your deadline.

Order a Similar Paper Order a Different Paper

project 1 

Computer Security 

 Each student will prepare a final project on Following computer security topic. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period. Additional details on project deliverables will be presented Include a short paragraph describing your project and how you intend to research it. Here is a list of your upcoming project deliverables: • Week 11. Submit final project. • Week 13. Submit a brief abstract describing your final project. • Week 14. Residency. Prepare and deliver a 20 minute presentation on your topic. • Week 15. Submit final project materials. o A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography o Presentation materials (PPT, handouts, etc)   Anonymous Citizen Rights vs Security Cloud Computing Computer Forensics Data Center Security Disaster Recovery Edward Snowden – Traitor or Hero Encryption Hardware and Software Security I Love You virus Keyloggers Mobile Malware Mobile Security Pharming Phishing Presidential Election 2016 Quantum Computers – Impact on Encryption Ransomware, malware, business security Security and the Cloud Smart Grid SOFTWARE CRACKERS Stuxnet Virus Undersea Cable United State Cyber Command Web War I – Estonia Attack White Hat Hacking Wi-Fi Security: Wireless Network Encryption Creating Exploits Home Automation Security and Vulnerabilities Car Hacking

 Project 2

 Database Security

 It is time to start thinking about your final project which will consist of a 20 minute presentation and a paper about a database security topic of your choice. . Each presentation must be unique. The final project must include 20 slides, a one page single spaced abstract, and a reference list.  The proposal is a one page single space plan for your project and a separate five source annotated reference list.  The annotations include two paragraphs for each source. One paragraph is a summary of the source and the second paragraph is your reflection (Iwhat you thought about it as a source).   Topics:  Database security compliance with anti-money laundering statutes Risks of overly privileged users Auditing v. monitoring Maintaining data integrity with hash functions Security risks in database migration Quantitative risk assessment methodologies Qualitative risk assessment methodologies Reducing costs with tiered storage Physical protections for your database IOT threats to database security TDE Tokenization Global data Integrity violation examples Efficient disaster recovery How to effect litigation holds Data as evidence: what is chain of custody? Data as evidence: The Federal Rules of Civil Procedure GDPR Compliance HIPAA Compliance SOX Compliance Database STIGs ISO Database Security Framework NIST Database Security Framework Patch management and the medical device Strict Liability v. Ordinary Negligence for the DBA How Oracle 12c advances the security discussion How Stuxnet exposed the exceptional importance of data integrity Are Data integrity violations worse than confidentiality breaches? How the tsunami of data expansion increases security concerns Mobile users and data security Why is vulnerability assessment critical for data security? Legitimate privilege abuse ad how to prevent it Monitoring your most highly privileged users – what the regulations say. Creating a database security culture Vulnerable storage media? Patching – To automate or not? What do you have – inventorying your legacy data. The human factor – how to keep your DBA up-to-date Monitoring database use patterns to detect anomalies Quantitative v. Qualitative security risk assessment