SlideShare a Scribd company logo
1 of 3
project 1
Computer Security
Each student will prepare a final project on Following
computer security topic. The primary deliverables for the
project will be a paper and and also a presentation that will be
presented by the student during the residency period. Additional
details on project deliverables will be presented Include a short
paragraph describing your project and how you intend to
research it. Here is a list of your upcoming project deliverables:
• Week 11. Submit final project. • Week 13. Submit a
brief abstract describing your final project. • Week 14.
Residency. Prepare and deliver a 20 minute presentation on your
topic. • Week 15. Submit final project materials. o A 500-
700 word, double spaced paper, written in APA format, showing
sources and a bibliography o Presentation materials (PPT,
handouts, etc) Anonymous Citizen Rights vs Security Cloud
Computing Computer Forensics Data Center Security Disaster
Recovery Edward Snowden – Traitor or Hero Encryption
Hardware and Software Security I Love You virus Keyloggers
Mobile Malware Mobile Security Pharming Phishing
Presidential Election 2016 Quantum Computers - Impact on
Encryption Ransomware, malware, business security Security
and the Cloud Smart Grid SOFTWARE CRACKERS Stuxnet
Virus Undersea Cable United State Cyber Command Web War I
– Estonia Attack White Hat Hacking Wi-Fi Security: Wireless
Network Encryption Creating Exploits Home Automation
Security and Vulnerabilities Car Hacking
Project 2
Database Security
It is time to start thinking about your final project which will
consist of a 20 minute presentation and a paper about a database
security topic of your choice. . Each presentation must be
unique. The final project must include 20 slides, a one page
single spaced abstract, and a reference list. The proposal is a
one page single space plan for your project and a separate five
source annotated reference list. The annotations include two
paragraphs for each source. One paragraph is a summary of the
source and the second paragraph is your reflection (Iwhat you
thought about it as a source). Topics: Database security
compliance with anti-money laundering statutes Risks of overly
privileged users Auditing v. monitoring Maintaining data
integrity with hash functions Security risks in database
migration Quantitative risk assessment methodologies
Qualitative risk assessment methodologies Reducing costs with
tiered storage Physical protections for your database IOT
threats to database security TDE Tokenization Global data
Integrity violation examples Efficient disaster recovery How to
effect litigation holds Data as evidence: what is chain of
custody? Data as evidence: The Federal Rules of Civil
Procedure GDPR Compliance HIPAA Compliance SOX
Compliance Database STIGs ISO Database Security Framework
NIST Database Security Framework Patch management and the
medical device Strict Liability v. Ordinary Negligence for the
DBA How Oracle 12c advances the security discussion How
Stuxnet exposed the exceptional importance of data integrity
Are Data integrity violations worse than confidentiality
breaches? How the tsunami of data expansion increases security
concerns Mobile users and data security Why is vulnerability
assessment critical for data security? Legitimate privilege abuse
ad how to prevent it Monitoring your most highly privileged
users - what the regulations say. Creating a database security
culture Vulnerable storage media? Patching - To automate or
not? What do you have - inventorying your legacy data. The
human factor - how to keep your DBA up-to-date Monitoring
database use patterns to detect anomalies Quantitative v.
Qualitative security risk assessment
project 1 Computer Security  Each student will prepare a fin

More Related Content

More from davieec5f

Watch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docxWatch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docx
davieec5f
 
Watch the documentarieslectures and complete the readings. In your .docx
Watch the documentarieslectures and complete the readings. In your .docxWatch the documentarieslectures and complete the readings. In your .docx
Watch the documentarieslectures and complete the readings. In your .docx
davieec5f
 

More from davieec5f (20)

Watch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docxWatch video under web links Life After Suicide. and the vignette.docx
Watch video under web links Life After Suicide. and the vignette.docx
 
We have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docxWe have two readings on immigration, ch. 9 and the chapters from Kos.docx
We have two readings on immigration, ch. 9 and the chapters from Kos.docx
 
Watching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docxWatching the video please write a short reaction paper (1-2 page.docx
Watching the video please write a short reaction paper (1-2 page.docx
 
We have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docxWe have studied a wide variety of societies, cultures, etc. during.docx
We have studied a wide variety of societies, cultures, etc. during.docx
 
We have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docxWe have had failed attempts at a family viewing hour and the seven w.docx
We have had failed attempts at a family viewing hour and the seven w.docx
 
We have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docxWe have covered different modes of transportation in class. Think ab.docx
We have covered different modes of transportation in class. Think ab.docx
 
We had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docxWe had to make a presentation on expnasion of celbi- pulp and paper .docx
We had to make a presentation on expnasion of celbi- pulp and paper .docx
 
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docxWatch World is Flat video by Thomas Freedman (for first 40 minutes.docx
Watch World is Flat video by Thomas Freedman (for first 40 minutes.docx
 
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docxWatch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
Watch this video first httpswww.youtube.comwatchv=aaNnGs7MmUY.docx
 
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docxWatch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
Watch the video Van Eyck, Portrait of Giovanni Arnolfini and hist.docx
 
Watch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docxWatch The quiet american movie and answer 4 questions Questions.docx
Watch The quiet american movie and answer 4 questions Questions.docx
 
watched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docxwatched the flim ( Anvil ! The story of Anvil)then have the follow.docx
watched the flim ( Anvil ! The story of Anvil)then have the follow.docx
 
watch the movie called The AnthropologistFilm response direct.docx
watch the movie called The AnthropologistFilm response direct.docxwatch the movie called The AnthropologistFilm response direct.docx
watch the movie called The AnthropologistFilm response direct.docx
 
Watch the following Ted Talk Video titled Hackers The Internets I.docx
Watch the following Ted Talk Video titled Hackers The Internets I.docxWatch the following Ted Talk Video titled Hackers The Internets I.docx
Watch the following Ted Talk Video titled Hackers The Internets I.docx
 
Watch the documentary Bully. It is directed by Lee Hirsch. 
Write a .docx
Watch the documentary Bully. It is directed by Lee Hirsch. 
Write a .docxWatch the documentary Bully. It is directed by Lee Hirsch. 
Write a .docx
Watch the documentary Bully. It is directed by Lee Hirsch. 
Write a .docx
 
Watch the documentary Bully. It is directed by Lee Hirsch.Writ.docx
Watch the documentary Bully. It is directed by Lee Hirsch.Writ.docxWatch the documentary Bully. It is directed by Lee Hirsch.Writ.docx
Watch the documentary Bully. It is directed by Lee Hirsch.Writ.docx
 
Watch the documentarieslectures and complete the readings. In your .docx
Watch the documentarieslectures and complete the readings. In your .docxWatch the documentarieslectures and complete the readings. In your .docx
Watch the documentarieslectures and complete the readings. In your .docx
 
Watch Sidi Larbi Cherkaoui’s piece, Sutra”, and write a reflection .docx
Watch Sidi Larbi Cherkaoui’s piece, Sutra”, and write a reflection .docxWatch Sidi Larbi Cherkaoui’s piece, Sutra”, and write a reflection .docx
Watch Sidi Larbi Cherkaoui’s piece, Sutra”, and write a reflection .docx
 
Watch Hargreaves discuss how community effort and distributed leader.docx
Watch Hargreaves discuss how community effort and distributed leader.docxWatch Hargreaves discuss how community effort and distributed leader.docx
Watch Hargreaves discuss how community effort and distributed leader.docx
 
Watch Documentary Thesis PaperInstructor wants paper to be a que.docx
Watch Documentary Thesis PaperInstructor wants paper to be a que.docxWatch Documentary Thesis PaperInstructor wants paper to be a que.docx
Watch Documentary Thesis PaperInstructor wants paper to be a que.docx
 

project 1 Computer Security  Each student will prepare a fin

  • 1. project 1 Computer Security Each student will prepare a final project on Following computer security topic. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period. Additional details on project deliverables will be presented Include a short paragraph describing your project and how you intend to research it. Here is a list of your upcoming project deliverables: • Week 11. Submit final project. • Week 13. Submit a brief abstract describing your final project. • Week 14. Residency. Prepare and deliver a 20 minute presentation on your topic. • Week 15. Submit final project materials. o A 500- 700 word, double spaced paper, written in APA format, showing sources and a bibliography o Presentation materials (PPT, handouts, etc) Anonymous Citizen Rights vs Security Cloud Computing Computer Forensics Data Center Security Disaster Recovery Edward Snowden – Traitor or Hero Encryption Hardware and Software Security I Love You virus Keyloggers Mobile Malware Mobile Security Pharming Phishing Presidential Election 2016 Quantum Computers - Impact on Encryption Ransomware, malware, business security Security and the Cloud Smart Grid SOFTWARE CRACKERS Stuxnet Virus Undersea Cable United State Cyber Command Web War I – Estonia Attack White Hat Hacking Wi-Fi Security: Wireless Network Encryption Creating Exploits Home Automation Security and Vulnerabilities Car Hacking Project 2 Database Security It is time to start thinking about your final project which will
  • 2. consist of a 20 minute presentation and a paper about a database security topic of your choice. . Each presentation must be unique. The final project must include 20 slides, a one page single spaced abstract, and a reference list. The proposal is a one page single space plan for your project and a separate five source annotated reference list. The annotations include two paragraphs for each source. One paragraph is a summary of the source and the second paragraph is your reflection (Iwhat you thought about it as a source). Topics: Database security compliance with anti-money laundering statutes Risks of overly privileged users Auditing v. monitoring Maintaining data integrity with hash functions Security risks in database migration Quantitative risk assessment methodologies Qualitative risk assessment methodologies Reducing costs with tiered storage Physical protections for your database IOT threats to database security TDE Tokenization Global data Integrity violation examples Efficient disaster recovery How to effect litigation holds Data as evidence: what is chain of custody? Data as evidence: The Federal Rules of Civil Procedure GDPR Compliance HIPAA Compliance SOX Compliance Database STIGs ISO Database Security Framework NIST Database Security Framework Patch management and the medical device Strict Liability v. Ordinary Negligence for the DBA How Oracle 12c advances the security discussion How Stuxnet exposed the exceptional importance of data integrity Are Data integrity violations worse than confidentiality breaches? How the tsunami of data expansion increases security concerns Mobile users and data security Why is vulnerability assessment critical for data security? Legitimate privilege abuse ad how to prevent it Monitoring your most highly privileged users - what the regulations say. Creating a database security culture Vulnerable storage media? Patching - To automate or not? What do you have - inventorying your legacy data. The human factor - how to keep your DBA up-to-date Monitoring database use patterns to detect anomalies Quantitative v. Qualitative security risk assessment