Reflections on Cybersecurity: Vulnerable Vectors to Cyberattacks

Promoting cyber security helps secure data systems.

In your journal, you will reflect on cyberattacks. Specifically, you will discuss attack vectors, risk management, network security risks, and attack prevention and detection.

Your journal entry should be three or more sentences per prompt and address the following questions:

What vectors might be most vulnerable to cyberattacks?
What can you do to help promote user awareness of security?
What is network reconnaissance, and why is it important to understand?
What are the main types of malware?

Building a Security-Aware Culture within the Organization

You have learned that an employee has missed the last two security awareness training sessions. The employee perceived this training as having a low priority compared to their other responsibilities and thought there would be no new or relevant information relative to their role in the organization.

For your initial post, select one of the following and respond to it:

What changes could be made that would help build a more security-aware culture within the security organization? Justify your response.
What tactics or strategies could you employ to help shift people’s perspectives from reactive to proactive when it comes to security? Justify your response.
In your responses to your peers, address the following:

What would you do differently?
What additional recommendations would you have for the solution they provided?

 

 

Analysis of the Celebrities in Frontal-Profile Wild (CPFW) Dataset

Celebrities in Frontal-Profile Wild (CPFW) dataset contains images of 500 subjects (with 10 frontal images and 4 profile images for each subject). 5000 frontal images were pre-processed using D-lib to crop and align the faces. 37 images had a failure to detect (FTD) case. The final gallery had the following distribution of # the number of images /subject.

# of Subjects # of Images
6 8
25 9
469 10

total images= 4963
total subjects= 500

You should assume the system is symmetric. You may use the programming language/tool of your choice (R, Python, Matlab, etc) in the analysis of the data. Please indicate which tool/language is being used, and include a text file of code with your submission.

Files needed for this assignment (see Module 2):

Answer the following Question:

Genuine and Impostor Score Distributions:
a. Extract genuine and impostor scores from the similarity matrix.
b. Generate and plot the score distribution histograms for genuine and impostor scores on the same graph.
c. Additionally, plot the relative score distribution for genuine and impostor scores.
D-prime Calculation: Compute the d-prime (d’) value to assess the separation between genuine and impostor score distributions.
Receiver Operating Characteristic (ROC) Curve:
a. Calculate the True Positive Rate (TPR) and False Positive Rate (FPR) for varying thresholds. (a minimum of 10 thresholds.)
b. Plot the ROC curve and compute the Area Under the Curve (AUC).
Cumulative Match Characteristic (CMC) Curve: Generate a CMC curve to evaluate the rank-based identification performance of the biometric system.
False Match Rate (FMR) and False Non-Match Rate (FNMR) Curves:
a. Plot the FMR and FNMR curves on the same graph relative to the threshold.
b. Identify and mark the operating threshold that minimizes the difference between FMR and FNMR.

 

 

Enhancing User Experience Through Effective Validation and Error Handling

Error messages should be like a good friendhonest, helpful, and never telling you your password is ‘incorrect’ without also suggesting it might just be your memory!

Discuss Enhancing User Experience Through Effective Validation and Error Handling: Best Practices for Real-Time Feedback and Cross-Device Form Optimization. This discussion should delve into the importance of real-time validation and effective error handling in form design. Explore how these elements can be integrated to improve user experience, reduce frustration, and ensure consistency across devices, ultimately leading to higher form completion rates.

 

Influence of Current Cultural Environment on Corporate Standards: A Case Study of Netflix

 

How has the current cultural environment of our country shaped the way that companies are looking at their own corporate cultural standards?
What are the potential downfalls and positive influences of the Netflix way?
How does Netflixs internal culture negatively or positively affect its ability to stay competitive and deliver cutting-edge content?

 

Building an Internal Network for a Retail Business: Recommendations

Prompt: A local entrepreneur plans to open a retail business. The business owner needs to develop the right network to conduct a number of business functions including implementing email marketing and e-commerce, processing credit card transactions, ordering from and communicating with various supply chain vendors, and providing a variety of telecommunications functions to compete with similar businesses. The business owner is unsure about the network architecture needed to perform these functions and does not have an unlimited budget like the larger retailers do.

For this discussion, assume the role of a network architect and develop three suggestions for building an internal network capable of performing these functions. In your main post, list the suggestions and rationale that supports your recommendations. Be sure you address which network capability or capabilities your recommendation will fulfill.

Access Controls: A Critical Component of Defense-in-Depth Strategy

 

Access Controls
Using the Internet and/or the Library, research and complete the following:
In a minimum of 1,000 words, answer the following:
Evaluate the different types of access controls and the roles they play in a defense in-depth strategy.
Directions for Submitting Your Assessment
Compose your assessment in a Microsoft Word document. Save the document as IT484_YourName_Assessment_1 and submit it to the Dropbox for this assessment.

 

 

Challenges of Management in Organizational Policy Compliance

 

Cybersecurity Policy Foundation-Overview
Using the Internet and/or the Library, research and complete the following:
In a minimum of 1,000 words, answer the following question:
Why does an organizations management present special challenges when it comes to policy compliance? Provide examples.

 

 

The Role of Analytics in Managerial Activities: Dehumanization or Enhancement?

 

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.
2. What are some of the major privacy concerns in employing intelligent systems on mobile data?
3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.