Categories
ISSC

Title: The Future of Artificial Intelligence: Advancements, Implications, and Global Impact

Requirements:
Prepare a report on your approved topic Attached with a minimum of 2000 words, no less, but more is acceptable.
References (10 minimum). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted). 
The paper must have a title page, reference list and be in APA format. The information within your title page and reference list will not count towards the minimum word count.
The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).
Correct spelling and grammar.
APA formatting: Title page, in paragraph citations, and the Reference list.
At a minimum include the following:
· Detailed description of the area researched
· Technology involved 
· Future trends
· Global implications

Categories
ISSC

Title: Protecting Your Company: Steps to Take in a Computer Forensics Investigation

Instructions
In order to complete assignment you will need to answer the below questions. Please complete the questions in a Word document. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. 
COMPUTER FORENSICS
Jonathan Simpson owns a construction company. One day a subcontractor calls him saying that he needs a replacement check for the job he completed at 1437 Elm Street. Jonathan looks up the job on his accounting program and agrees to reissue the check for $12,750. The subcontractor says that the original check was for only $10,750. Jonathan looks around the office and cannot find the company checkbook or ledger. Only one other person has access to the accounting program. Jonathan calls you to investigate. How would you proceed? Write a one-page report detailing the steps Jonathan needs to take to obtain the necessary evidence to protect his company.

Categories
ISSC

Title: Protecting Against Common Cyber Attacks: Methods and Prevention Controls

Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source.
ATTACKS, EXPLOITS AND VULNERABILITIES
An attack is the act that takes advantage of a vulnerability to compromise an asset, thus resulting in a loss. It is accompanied by a threat-agent that denies, damages or steals an organization’s information or physical asset. A vulnerability is an identified weakness in a system, where controls are not present, or not effective or have become obsolete. Below you will find a list of attacks, threat agents and vulnerabilities. For this assignment you will need to pick five (5) of the below methods. Explain the method in detail and provide suggested prevention controls. For example, if malicious code were on the list below I would first explain the topic and then as suggested controls I would state: The obvious controls are good vulnerability management (e.g., installing patches on a regular basis), up-to-date antivirus, anti-spyware, etc., but there are also policy and awareness controls that guide users’ behavior (e.g., don’t click on links in email, etc). Please make sure that your answers are detailed and well supported. You must use a minimum of three outside sources. 
Hoaxes with an attached virus
Back doors
Password attacks
Denial-of-service (DoS) and distributed denial-of-service (DDos) attacks
Spoofing
Man-in-the-middle (MITM)
Spam
Sniffer
Timing attack