Topic: Tech companies prepare for cyber-attacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption
Read and respond to two students discussions. (100 words on each response)
#1.Posted by Ashok
As the cyber-attacks are growing in number, it is the responsibility of the organization to take the necessary steps to counter-act the attacks. One of the best ways to protect the data of an organization is to encrypt the data. The first thing that companies ought to do is to identify the vulnerabilities present in their network and systems. The staff should be well aware of the attacks and their implications. The ways that a hacker tries to get access should be known.
For those companies, which possess secure data, measures have to be taken to protect its data through encryption. We should keep our information safe by using full disk encryption tools which are default to some operating systems. These tools take a very less time to encrypt the data and they do not cause any effect on the drives. The hackers tries to attack a system if there is no log in and log off option or if the user forgot to log off the system. So your system should be such that it logs off in 5 minutes if not in use.
So encryption is a compulsory thing to do because even if the hackers get the data, they will not be in a position to alter it.
#2. Posted by Bhavya
Encryption is the method in which information is converted into secret code which hides the true meaning of the information and the science of encrypting and decrypting the information is called cryptography. When information is not encrypted then it called as plaintext and when data is encrypted it is known as cypertext, and to encrypt and decrypt the information algorithms are used these algorithms are called ciphers or encryption algorithms. When someone unauthorized tries to intercept a encrypted message then the person should guess the cipher sender used to encrypt the message and has to guess the keys which are used as variables. The time which takes to guess this information is what makes encryption a secured tool.
There are two types of Ciphers which are symmetric and Asymmetric ciphers, Symmetric ciphers which is secret key encryption uses a single key which is sometimes used as a shared secret because the entities which do the encryption should share the secret key information with all the entities that decrypt the message. Symmetric key encryption is much faster than the Asymmetric encryption, Asymmetric ciphers which is also known as public encryption used two different but linked keys. This often uses prime numbers which is difficult to factor large prime numbers and reverse engineer encryption.
Business 130: Introduction to Business
CRN #25037: MTWR 08:00 – 10:10 ...
Topic Tech companies prepare for cyber-attacks using common cyber.docx
1. Topic: Tech companies prepare for cyber-attacks using common
cybersecurity resources. Select one of the resources listed and
explain how you could implement that particular policy to
prevent an attack: 1. monitoring and assessment, 2. policies and
controls, 3. hiring, 4. software, 5. firewalls, 6. authentication
and access, 7. encryption
Read and respond to two students discussions. (100 words on
each response)
#1.Posted by Ashok
As the cyber-attacks are growing in number, it is the
responsibility of the organization to take the necessary steps to
counter-act the attacks. One of the best ways to protect the data
of an organization is to encrypt the data. The first thing that
companies ought to do is to identify the vulnerabilities present
in their network and systems. The staff should be well aware of
the attacks and their implications. The ways that a hacker tries
to get access should be known.
For those companies, which possess secure data, measures have
to be taken to protect its data through encryption. We should
keep our information safe by using full disk encryption tools
which are default to some operating systems. These tools take a
very less time to encrypt the data and they do not cause any
effect on the drives. The hackers tries to attack a system if there
is no log in and log off option or if the user forgot to log off the
system. So your system should be such that it logs off in 5
minutes if not in use.
So encryption is a compulsory thing to do because even if the
hackers get the data, they will not be in a position to alter it.
#2. Posted by Bhavya
Encryption is the method in which information is converted into
secret code which hides the true meaning of the information and
2. the science of encrypting and decrypting the information is
called cryptography. When information is not encrypted then it
called as plaintext and when data is encrypted it is known
as cypertext, and to encrypt and decrypt the information
algorithms are used these algorithms are called ciphers or
encryption algorithms. When someone unauthorized tries to
intercept a encrypted message then the person should guess the
cipher sender used to encrypt the message and has to guess the
keys which are used as variables. The time which takes to guess
this information is what makes encryption a secured tool.
There are two types of Ciphers which are symmetric and
Asymmetric ciphers, Symmetric ciphers which is secret key
encryption uses a single key which is sometimes used as a
shared secret because the entities which do the encryption
should share the secret key information with all the entities that
decrypt the message. Symmetric key encryption is much faster
than the Asymmetric encryption, Asymmetric ciphers which is
also known as public encryption used two different but linked
keys. This often uses prime numbers which is difficult to factor
large prime numbers and reverse engineer encryption.
Business 130: Introduction to Business
CRN #25037: MTWR 08:00 – 10:10
Winter 2020
Introduction to Business: Winter 2020
INSTRUCTOR:Levi Richard, DBACLASSROOM:LB 207
CLASS HOURS:3 Lecture HoursOFFICE LOCATION:LB 205
OFFICE PHONE:626-857-4054
EMAIL ADDRESS:[email protected]
OFFICE HOURS:Monday – Thursday: 07:00am until 08:00am
DESCRIPTION:
3. This is a foundation course in business administration that
includes such topics as finance and accounting, personnel,
production, distribution, marketing and management.
OBJECTIVES/STUDENT LEARNING OUTCOMES
Upon successful completion of this course, the student should
be able to:
Critical and Analytical Thinking
Analyze the legal forms of business ownership in the United
States and compare their respective characteristics through
readings, lectures, discussions, exams, case studies, projects
(group and individual) to identify the advantages and
disadvantages of each form of ownership.
Discipline/Subject Area Specific Content Material
Understand the basic “4 Ps” (product, price, place, promotion)
model for marketing products and services through readings,
lectures, discussions, exams, case studies, projects (group and
individual) to be able to recognize the components of marketing
strategies and thus better understand how organizations market
their products, services and ideas.
Understand the functions of management (including leadership,
human resources, production) through readings, lectures,
discussions, role playing, exams, case studies, projects (group
and individual) to appreciate the structures of management and
the day-to-day operations that confront organizations.
Community/Global Consciousness and Responsibility
Identify and understand the need for ethical behavior and social
responsibility in the business arena through study of current
events, case studies, videos, class discussions, and role playing
to better appreciate the importance of ethical behavior in
organizations and its impact on society.
4. Demonstrate understanding of the forces affecting trading in
global markets and strategies for reaching the international
marketplace through readings, lectures, discussions, exams,
case studies, projects (group and individual) to better compete
in the global marketplace.
Computation
Understand basic investment principals, financial
institutions/markets, and financial management concepts,
through readings, lectures, discussions, role problem solving,
exams, case studies, and projects (group and individual) to
prepare the student to make sound financial decisions in both
their personal lives and in their businesses.
REQUIRED MATERIALS:
Business: Understanding Business, 12th Edition, Nickels,
McGraw Hill
Publishing.
GRADING POLICY:
Participation115 points09%
Learn Smart Exercises190 points15%
Interactive Exercises314 points24%
Case Study050 points04%
Research Paper300 points24%
Exams300 points24%
1,269 total points
Final grade will be based on the number of points earned:
90 - 100% of total points = A 1,142 points
80 - 90%= B 1,015 points
70 - 80%= C 0,888 points
60 - 70%= D 0,761 points
Below 60%= F
5. Extra credit opportunity(s) may be made available.
In order to successfully pass this course students must complete
all of the course requirements. It is the student’s responsibility
to make sure that he/she completes and submits the assigned
work by their deadline.
In the event that it becomes necessary for the student to
withdraw from the course, they must withdraw by the drop
deadline date (Check with the Admissions Office for this date).
In order to drop the course, the student must submit the
appropriate withdrawal form to Admissions. Any student
enrolled in the course after that date will receive a letter grade
for the course. The professor reserves the right to drop any
student from the course at any time prior to the deadline. He
will drop any student who has missed an excessive number of
classes without sufficient justification or notice.
Please contact the professor if you have any special needs.
Participation (115 points: 23 x 5 points per session)
Students can earn up to 5 points for attending each class session
and fully participating in the class activities. Students must
arrive on time and stay for the duration of the session. All
absences, for any reason, will count against you. The professor
will not judge a legitimate absence from an illegitimate one.
Students cannot use their phones, tablets, or computers during
class unless they are taking notes. Students who don’t comply
with the rules will lose some or all of their participation points.
6. Learn Smart Exercises (190 points: 19 exercises):
McGraw-Hill Learn Smart adaptively assesses students' skill
levels to determine which topics students have mastered and
which require further practice. Then it delivers customized
learning content based on their strengths and weakness. The
result: students learn faster and more efficiently because they
get the help they need, right when they need it - instead of
getting stuck on lessons, or being continually frustrated with
stalled progress.
Interactive Exercises (314 points: 19 exercises):
Students are required to complete interactive exercises that are
within CONNECT. These exercises are of several varieties, such
as drag “n” drop, time line, and strategy formation. There are at
least three interactive exercises assigned each week.
Exams (3 exams totaling 300 points):
Exam 1Chapters 01-06100 points
Exam 2Chapters 07-12100 points
Exam 3Chapters 13-16 & 18-20100 points
Students are prohibited from using their cell phones during an
exam. Students that leave the classroom during the exam must
leave their cell phones in their backpack. There will not be any
make-up exams.
Research Paper (300 points):
Students are required to write a six-page paper on one of the
topics listed below. It must be double-spaced and APA
formatted.
It is STRONGLY suggested that students attempt to submit their
paper no later than the morning of the assignment due date
(February 7, 2020). The professor has noticed that students who
attempt to upload their paper between 9:30pm and 10:00pm that
7. day increasingly experience a “technological reason” that
causes them to miss the deadline. DON’T LET THIS HAPPEN
TO YOU!
The paper must meet college standards for grammar & content
and be typed in Microsoft Word using 12-point font. It should
include a discussion of the related concepts and its impact on
individuals, managers, and organizations. In addition, it should
mention the advantages and disadvantages of the concept/topic
and apply them to any experiences that you have had.
The paper must be an original work that was written by the
student. Students are prohibited from submitting a paper that
was written for any other course. This rule applies to
Introduction to Business, Introduction to Management, and the
Elements of Marketing. It also applies to students who are
repeating this class. They must select another topic.
In the planning and writing phase of the project, I recommend
that students utilize the services of the “Writing Center.” The
writing center is a place where students can get help with any
phase of the writing project. It will provide help with the
planning and organizing of the paper, creating and editing a
draft, using APA formatting, citing sources, and completing the
final draft. The center is located in PS 109. Contact them for
their WINTER 2020 hours of operation. The paper must not
contain plagiarized material. Anyone who plagiarizes material
will receive a zero for the assignment.
According to the Merriam-Webster Online Dictionary, to
“plagiarize” means:
8. 1) To steal and pass off (the ideas or words of another) as one's
own.
2) To use (another's production) without crediting the source.
3) To commit literary theft.
4) To present as new and original an idea or product derived
from an existing source.
The Research Paper must be written in the following format:
Title Page (1 page)
Body of Text(6 pages)
References (1 page)
REFERENCES: Students must have at least four sourcesand
each source must be cited in the paper. One of the sources must
be from peer-reviewed journal articles; one source can be your
textbook (or any book);and the fourth source can be a non-peer
reviewed magazine article from a magazine such as Time,
Business Week, Forbes, etc. Students CANNOT use any
websites, including www.wikipedia.com.
Video Case Assignment (50 points: 1 @ 50 points):
Students are required to watch the video and answer the
questions posed. Analyze and address all of the relevant issues.
Students that click into the case assignment will see a grading
rubric that explains how the assignment will be evaluated. It
will be evaluated on APA formatting, reflection, grammar, and
spelling.
It is STRONGLY recommended that students attempt to upload
their assignment one day prior to its due date. Sometimes there
are technological glitches and this way you will have time to
figure out what went wrong. Don’t email the case to the
9. professor. And donot contact him right before the 10:00pm
deadline and claim that “something is wrong with Canvas I
can’t turn in my assignment”.
Extra Credit Case Assignments: (50 points: 2 @ 25 points
each):
Students are required to watch the video and answer the
questions posed. Analyze and address all of the relevant issues.
Students that click into the case assignment will see a grading
rubric that explains how the assignment will be evaluated. It
will be evaluated on APA formatting, reflection, grammar, and
spelling.
It is STRONGLY recommended that students attempt to upload
their assignment one day prior to its due date. Sometimes there
are technological glitches and this way you will have time to
figure out what went wrong. Don’t email the case to the
professor. And donot contact him right before the 10:00pm
deadline and claim that “something is wrong with Canvas I
can’t turn in my assignment”.
Miscellaneous Important Stuff:
All assignments are due by Friday at 10:00 pm and no late work
will be accepted!
It is STRONGLY suggested that students attempt to submit their
paper no later than the morning of the assignment due date
(February 7, 2020). The professor has noticed that students who
attempt to upload their paper between 9:30pm and 10:00pm that
day increasingly experience a “technological reason” that
causes them to miss the deadline. DON’T LET THIS HAPPEN
TO YOU!
Do notcreate documents inPages (MAC Program) or Google
docs. The instructor can only open documents that have been
created in “Microsoft Word”. Microsoft Word file extensions
10. are one of two types: videocase.doc or videocase.docx.
It is expected that a work submitted for grading is original and
not copied. Anyone caught cheating or plagiarizing material
will receive a failing grade for that assignment and may be
expelled from the course.
In-class rules:
Do not engage in private conversations in class. This practice is
both distracting and unprofessional. Do not use your computer
or cell phone in class unless you are using the device to take
notes, and make sure that your cell phone is on vibrate. Also, do
not sleep. Most students work, attend school, and have family
responsibilities and it is understandable that they might be tired.
The best solution is to stay home and rest.
Special Accommodations:
“If you have a disability documented by a physician or other
appropriate professional and wish to discuss academic
accommodations, please contact the DPSS office at (626) 914-
8675.
Please discuss your accommodations with me during office
hours or, after class and be sure to allow at least one week in
order for the instructor to arrange appropriate classroom testing
accommodations”.
Weekly Assignment Schedule
Week 1a Homework
Due on 1/12/20
Learnsmart Chapter 1
Due on 1/12/20
Learnsmart Chapter 2
11. Due on 1/12/20
Learnsmart Chapter 3
Week 1b Homework: Due 1/09/20
Interactive Exercise #1
Interactive Exercise #2
Interactive Exercise #3
Week 2a Homework
Due on 1/13/20
Learnsmart Chapter 4
Due on 1/14/20
Learnsmart Chapter 5
Due on 1/15/20
Learnsmart Chapter 6
Week 2b Homework: Due 1/17/20
Interactive Exercise #4
Interactive Exercise #5
Interactive Exercise #6
Case Study: Dominos
Exam #1: Chapters 1-6
Week 3a Homework
Due on 1/21/20
Learnsmart Chapter 7
Due on 1/22/20
Learnsmart Chapter 8
Due on 1/23/20
Learnsmart Chapter 9
Week 3b Homework: Due 1/24/20
12. Interactive Exercise #7
Interactive Exercise #8
Interactive Exercise #9
Extra Credit Case #1
Week 4a Homework
Due on 1/27/20
Learnsmart Chapter 10
Due on 1/28/20
Learnsmart Chapter 11
Due on 1/29/20
Learnsmart Chapter 12
Week 4b Homework: Due 1/31/20
Interactive Exercise #10
Interactive Exercise #11
Interactive Exercise #12
Exam #2: Chapters 7-12
Extra Credit Case #2
Week 5a Homework
Due on 2/03/20
Learnsmart Chapter 13
Due on 2/04/20
Learnsmart Chapter 14
Due on 2/05/20
Learnsmart Chapter 15
Due on 2/06/20
Learnsmart Chapter 16
13. Week 5b Homework: Due 2/07/20
Interactive Exercise #13
Interactive Exercise #14
Interactive Exercise #15
Interactive Exercise #16
Research Paper
Week 6a Homework
Due on 2/10/20
Learnsmart Chapter 18
Due on 2/11/20
Learnsmart Chapter 19
Due on 2/12/20
Learnsmart Chapter 20
Week 6b Homework: Due 2/13/20
Interactive Exercise #18
Interactive Exercise #19
Interactive Exercise #20
Exam #3: Chapters 13-20
Skip Chapter 17
2
15. Highest: Assignment_Week3.docx
%47Attachment 1
Institutional database (2)
My paper Student paper
Top sources (2)
Excluded sources (0)
Source Matches (3)
View Originality Report - Old Design
Word Count: 396
Assignment_Week3.docx
1 2
1 My paper 2 Student paper
Hacking is basically an illegal act through which unauthorized
persons access the systems of any user, individual or
organization around the globe, whether it is a
common person, organization or renowned. They have the
ability to hack personal and confidential information. For this
purpose, we have considered an article
regarding hacking written by Stan Horaczek. The article has
explained the tactics which are being used by hackers along
with hacked system statistics done in the last
few years. In 2018, total of 144.5 million security numbers had
been hacked, 1.8 million e-mail addresses, 97,500 Tax ID
numbers and much more confidential
information have been tracked and hacked by the hackers
16. (Huraczek, 2018). The whole hacking is ironically used to
blackmail the respective person for money. Most
of the time, the organization’s entire information systems are
hacked in order to leak their private data into the public. This is
all that hackers do but they have
basically used the illegal means in order to destroy others by
using their very own personal information. On the other hand,
the author also represented an ethical
hacking system in which organizations hire hackers who do
hacking on behalf of the organizations. These are basically
under the law because they do not hack or use
illegal information. Ethical Hacking is basically referring to
‘White Hat’ in the Internet world. It is an internet slang used
for the ethical computer hackers or acts as
a computer security system which has expertise in penetration
testing along with other testing methodologies in order to
ensure the security of the organizational
information system. Learning moral hacking consolidates
concentrating the attitude, contraptions and methods of
engineers and entry analyzers to comprehend how
to perceive, triage and right vulnerabilities in programming and
PC structures (Patra, 2015). Based on this article, we have
extracted certain benefits of ethical hacking
which helps the organization in order to improve the IT
environment of the organization in a more effective and
appropriate way. Overall, it’s an immoral act because
due to which a person or an organization lose their data and
most importantly, the hard work of employees shall have no use
at all. References
Huraczek, Stan. (2018). Your Social Security Number Got
Leaked, That's very, very bad. Management
17. Solution
: Equifax. Patra, Dr. Rasmi Ranjan. (2015). Ethical
Hacking. International Journal of Scientific and Research
Publications. 250-315
1
2
1
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=09fc7026-1495-
408d-bfe3-
95c3589e4322&course_id=_45717_1&download=true&includeD
eleted=true&print=true&force=true
2/2/2020 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
18. BB5b75a0e7334a9/originalityReport/ultra?attemptId=09fc7026-
1495-408d-bfe3-95c3589e4322&course_i… 2/2
My paper 100%
Student paper 94%
My paper 100%1
Student paper
Ethical Hacking is basically referring to
‘White Hat’ in the Internet world. It is an
internet slang used for the ethical
computer hackers or acts as a computer
security system which has expertise in
penetration testing along with other
testing methodologies in order to ensure
the security of the organizational
information system. Learning moral
hacking consolidates concentrating the
attitude, contraptions and methods of
engineers and entry analyzers to
comprehend how to perceive, triage and
right vulnerabilities in programming and
19. PC structures (Patra, 2015). Based on this
article, we have extracted certain
benefits of ethical hacking which helps
the organization in order to improve the
IT environment of the organization in a
more effective and appropriate way.
Original source
Ethical Hacking is basically referring to
‘White Hat’ in the Internet world It is an
internet slang used for the ethical
computer hackers or acts as a computer
security system which has expertise in
penetration testing along with other
testing methodologies in order to ensure
the security of the organizational
information system Learning moral
hacking consolidates concentrating the
attitude, contraptions and methods of
engineers and entry analyzers to
comprehend how to perceive, triage and
right vulnerabilities in programming and
PC structures (Patra, 2015) Based on this
article we have extracted certain benefits
20. of ethical hacking which helps the
organization in order to improve the IT
environment of the organization in a
more effective and appropriate way
2
Student paper
Your Social Security Number Got Leaked,
That's very, very bad.
Original source
Your social security number probably got
leaked and that’s very, very bad
1
Student paper
International Journal of Scientific and
Research Publications.
Original source
21. International Journal of Scientific and
Research Publications
Week 3
Search the Internet and locate an article that relates to the topic
of HACKING and summarize the reading in your own words.
Your assignment should be 3-4(250-300 words) paragraphs in
length with appropriate references.
Note:-Safe Assign is software that verifies the originality of
your work against on-line sources and other students. Please
make sure safe assign score is less than 25%