Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Indian Journal of Science and Technology, 9(6). https://doi.org/10.17485/ijst/2016/v9i6/81980
D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55. https://ieeexplore.ieee.org/document/8875714
J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers an Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5. https://ieeexplore.ieee.org/document/9028369
T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184. https://ieeexplore.ieee.org/document/8685553
Chapters 11, 12, 13, and 14 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10

Discussion: Wireless Networking

Word count: 300+ words

Chapters 11, 12, 13, and 14 in the course textbook

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also, discuss methods used to secure 802.11 wireless networking in your initial thread.

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used.

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

Considering the importance of data in the organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents.

Published by
Essays
View all posts