Computer Science

The Ransomware Incidents

pRansomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund. Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida. Read these brief articles from the UMGC library to learn about the ransomware incidents: Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L). Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L). If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions. Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount. What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities? Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom. If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money? If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom? Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems? Would you have a different decision if you were working for a small organization like Mercury USA?p

Aug 14th, 2021

Computer Science

How a Cyber Warrior Can Use a Social Networking Site to Gain Information

1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s entries. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.

Aug 14th, 2021

Computer Science

How we Communicate on the Internet

This assignment designed to assess your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Your essay should be 4-6 pages in length, not counting the cover page and bibliography. Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers. General Requirements 1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s citations. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.

Aug 14th, 2021

Computer Science

The Ransomware Incidents | GET SOLUTION

pRansomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund. Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida. Read these brief articles from the UMGC library to learn about the ransomware incidents: Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L). Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L). If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions. Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount. What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities? Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom. If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money? If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom? Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems? Would you have a different decision if you were working for a small organization like Mercury USA?p

Aug 14th, 2021

Computer Science

How a Cyber Warrior Can Use a Social Networking Site to Gain Information | GET SOLUTION

1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s entries. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.

Aug 14th, 2021

Computer Science

How we Communicate on the Internet | GET SOLUTION

This assignment designed to assess your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Your essay should be 4-6 pages in length, not counting the cover page and bibliography. Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers. General Requirements 1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s citations. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM.

Aug 14th, 2021

Computer Science

Ethics of Autonomous Vehicles

I need certain autonomous vehicle components detailed out, and secondly I need in-text citations throughout the paper. Thank You!

Aug 14th, 2021

Computer Science

High Precision Numerical Computing in Science and Engineering

I already wrote my abstract: Mathematical principles and computations are used everyday in all aspects of life. Over the years and with major computational advancement, mathematicians have developed simple and easier methods for more challenging and advanced computations with double-precision floating-point accuracy. However, a higher level of numeric precision is required and is more beneficial in certain applications in the scientific and engineering field. This paper presents examples of these applications and analyzes the techniques used to provide high-precision arithmetic. We conclude that high-precision numerical computation softwares are necessary for the modern expansive and demanding problems.

Aug 14th, 2021

Computer Science

Ethics of Autonomous Vehicles | GET SOLUTION

I need certain autonomous vehicle components detailed out, and secondly I need in-text citations throughout the paper. Thank You!

Aug 14th, 2021

Computer Science

High Precision Numerical Computing in Science and Engineering | GET SOLUTION

I already wrote my abstract: Mathematical principles and computations are used everyday in all aspects of life. Over the years and with major computational advancement, mathematicians have developed simple and easier methods for more challenging and advanced computations with double-precision floating-point accuracy. However, a higher level of numeric precision is required and is more beneficial in certain applications in the scientific and engineering field. This paper presents examples of these applications and analyzes the techniques used to provide high-precision arithmetic. We conclude that high-precision numerical computation softwares are necessary for the modern expansive and demanding problems.

Aug 14th, 2021

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.