PART A Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class. Use GCU Virtualization Solutions or VirtualBox to create a new...

2 answer below »
PART A

Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.



  1. Use GCU Virtualization Solutions or VirtualBox to create a new Virtual Machine (VM).

  2. Install Kali Linux in the new Virtual Machine (use default settings).

  3. Refer to the Kali Linux website located within the required readings for additional resources.

  4. As you go, take instructional notes and screenshots that will help to reproduce your process.

  5. Document the installation process. Refer to the "Report Template," located within the course materials.


APA style is not required, but solid academic writing is expected.


PART B


Effective research is critical for success in the Cybersecurity field.



  1. Perform a data search of yourself or a family member. Use the PeekYou website located within the required readings or a similar free site.

  2. Become familiar with the current Cyber Security vocabulary utilized by Federal Agencies such as the NSA, CISA, NIST, NCSD, etc.


In 500‐7500 words, describe:



  1. The findings of your personal data search.

  2. The common security threats that affect your digital footprint.

  3. The following terms: cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery. Provide a brief definition.

  4. The legal or ethical issues concerning "Cyber Stalking."

  5. How an attacker can use this information in an attack.

  6. How to use the "defense against attacks" theory to protect your digital identity.

  7. PART 3


  8. In cyberspace, people can take on different identities and sometimes act in ways they normally would not if their physical presence were required. God created humans not just with souls but with bodies that were declared "good."



    1. Complete the Hands-On Project 1-1 from the text (Examine Data Breaches). Document how the loss of government computers and PDAs can have an effect on confidentiality, availability, and integrity of the data stored on these devices.

    2. In a 250- to 500-word essay, explain how you can utilize your digital privacy rights as intended to be used from Christian perspective. Consider the legal and ethical side of your digital privacy rights.


    Prepare this assignment according to the guidelines found in the APA Style Guide



Answered Same DayJun 22, 2021

Answer To: PART A Virtualization creates a safe sandbox for you to experiment with the various security tools...

Pranav answered on Jul 02 2021
153 Votes
Resource
    
ITT-307 Lab Assessment Report Template
Professor:            {Enter Professors Name}
Course:            {Enter Course Number, Title, and Section}
Student:            {Enter Your Name}
Date:            {Enter Date}
Title:        {Enter Title for this Assignment}
Directions:
Overview: Installation of Linux Kali vie VM ware and All the concept relat
ed to Cyber security.
PART A
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.
Choose Custom setting as we can make changes as we want.
Set User ID and Password
Kali Linux Ready to run and all the configurations and device information
PART B
Effective research is critical for success in the Cybersecurity field.
1. Perform a data search of yourself or a family member. Use the PeekYou website located within the required readings or a similar free site.
Output:
2.Become familiar with the current Cyber Security vocabulary utilized by Federal Agencies such as the NSA, CISA, NIST, NCSD, etc.
NSA – National Security Agency of US (United States) department of defense.
CISA-The Cybersecurity and Infrastructure Security Agency
NIST-National Institute of Standards and Technology
NCSD- National Cyber Security Division.
RAW- Research and Analysis Wing
In 500‐7500 words, describe:
1. The findings of your personal data search.
Answer: There are lot of ways to search personal information. If we use google.com to check personal data, it will display all the professional and your social data.
2. The common security threats that affect your digital footprint.
Answer:
· By sending photos and videos of themselves, they are at risk of embarrassment
· Hacker can steal your money by digital footprint.
· By posting picture various crimes are raising in countries
· By using web sites, they will silently put spyware in your laptop to steal your data and personal information.
· Cyber Espionage is type of hacking major institutional data base to collect the personal data.
· Active data trace by registering on different web sites such as your name email phone number and photos.
· Passive data trace is like taking your data without knowing you from your computer and browsing history, location specific data, search keywords and use of smart television.
3. The following terms: cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery. Provide a brief definition.
    Cyber Threat: Cyber treat is basically the malicious act which steels your data, seeks to damage your data, disrupt digital social life in general. Cyber-attacks are threats like computer viruses, data breaches, and Denial of Service (DoS) attacks.
In today life information security is most important aspect, Due to that cyber treats trigger cyber bulling and phishing like cyber-crime. many cyber-attacks are simply troubles, some are quite serious, at the same time some are potentially threatening human lives.
    Risk analysis: The risk analysis is used by information technology, projects, security issues and any other event where risks may be considered as based on a quantitative and qualitative basis.
· To look forward and reduce the effect of dangerous results occurred from adverse events.
· To plan for technology or equipment...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here