Find Jobs
Hire Freelancers

Technological changes

$30-250 USD

Cancelled
Posted over 13 years ago

$30-250 USD

Paid on delivery
Projects I. Risk Assessment. Conduct a risk assessment of the information systems in your workplace (or other facility that you may access - i.e., a local library). You must describe the information system as well as providing the assessment. The student will use the NIST framework to perform the Risk Assessment. II. Security Issues with Emerging Technologies: Students will choose from a number of emerging technologies and prepare a paper that discusses security. I will offer several topics, but you are also free to chose your own (with instructors approval). 4 pages not including title and references. Suggestions: A Honeynet Project white papers. You can access the papers here [login to view URL] Select one of the papers and write about what you discovered from reading the paper. There are papers here that explain the concept of "Know Your Enemy." The "hacker" community operates a lot like warfare; defending against them requires an understanding of how they operate. This site is a great place to gather that type of information. B Cryptography. This paper can be on an algorithm, protocol or a white paper on Cryptography. At a minimum your paper should describe the following: history, security considerations (i.e.,: has it been hacked, cracked, or is it a concept), where is it being applied, or planned to be applied. C Digital Millenium Copyright Act (DMCA). The DMCA has made quite an impact on Internet Security. Your paper should at a minimum contain the following: Introduce the DMCA; When can a program be reverse engineered; IAW the DMCA security considerations with respect to the DMCA, ie: how does it affect an organization today? Comments: DMCA fair? Why or why not? How would you change it given the opportunity? D Mobile Code. Mobile Code is something that security professionals have to deal with on a daily basis. Your paper should address the following: Definition of Mobile Code; types of Mobile Code; security considerations with respect to allowing Mobile Code into your internal network; comments: Mobile Code friend or foe? E Intrusion-Detection Methods. Research the various types of intrusion-detection systems that are available to organizations. Discuss the various types and describe the circumstances in which each type should be used. Feel free to use specific examples and products to provide the reader with a complete understanding of the subject.
Project ID: 947213

About the project

2 proposals
Remote project
Active 13 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
2 freelancers are bidding on average $98 USD for this job
User Avatar
I am certain I can do this, lets start.
$75 USD in 5 days
4.7 (141 reviews)
6.6
6.6

About the client

Flag of UNITED STATES
Columbia, United States
3.9
3
Member since Apr 4, 2010

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.