Campbellsville University Cryptography and Symmetric Key Algorithms Discussion

Subject. : emerging threats and please check the syllabus to take information of the topics covered

in the last week of class, we are going to complete a reflection activity.

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in the initial thread:

“Interesting Assignments” – What were some of the more interesting assignments to you?

“Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”

“Perspective” – How has this course changed your perspective?

“Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?

*Short Week* This Activity is due Tuesday for Initial Post


Chapter 1: Security Governance Through Principles and Policies

Chapter 2: Personnel Security and Risk Management Concepts

Fisk, G., Ardi, C., Pickett, N., Heidemann, J., Fisk, M., & Papadopoulos, C. (2015, May). Privacy principles for sharing cyber security data. In 2015 IEEE Security and Privacy Workshops (pp. 193-197). IEEE.

N. Kamenskih, M. A. Filippov and A. A. Yuzhakov, “The Development of Method for Evaluation of Information Security Threats in Critical Systems,” 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, 333-336.

Petac Eugen, & Duma Petruţ. (2018). Exploring the New Era of Cybersecurity Governance. Ovidius University Annals: Economic Sciences Series, 1, 358.

Chapter 3: Business Continuity Planning Chapter 4: Laws, Regulations, & Compliance

Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089

Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks. IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. 535–543.

Chapter 6: Cryptography and Symmetric Key Algorithms

Chapter 7: PKI & Cryptographic Applications

Chapter 8: Principles of Security Models, Design, & Capabilities

Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. 10.1109/WCNCW.2018.8369033

Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103

Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.

Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices.

Chapter 5: Protecting Security of Assets

Chapter 9: Security Vulnerabilities, Threats, & Countermeasures

Chapter 10: Physical Security Requirements

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800- 122.

Chapter 11: Secure Network Architecture & Secure Network Components

Chapter 12: Secure Communications and Network Attacks

Chapter 13: Managing Identity & Authentication Chapter 14: Controlling & Monitoring Access

Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Inidan Journal of Science and Technology, 9(6). DOI: 10.17485/ijst/2016/v9i6/81980

D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55

J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.

T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.

Chapter 15: Security Assessment and Testing Chapter 16: Managing Security Operations

Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness. International Journal of Information Security, 17(6), 681–699.

Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.

Chapter 17: Preventing and Responding to Incidents

Chapter 18: Disaster Recovery Planning

M. Ioannou, E. Stavrou and M. Bada, “Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination,” 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.

J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, “Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments,” 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.

M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, “A Study on Security Awareness in Mobile Devices,” 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.

Don't hesitate - Save time and Excel

Are you overwhelmed by an intense schedule and facing difficulties completing this assignment? We at GrandHomework know how to assist students in the most effective and cheap way possible. To be sure of this, place an order and enjoy the best grades that you deserve!

Post Homework