Mobile Application Threat Modeling

          You are a cyber threat analyst at a mobile applications company. One morning, your supervisor, Dan, tells you about a mobile application security project that is already under way, but needs more guidance. Because of your success on...

Backup strategies

        Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster: Daily full server backups with hourly...

Assessing actual security breaches

        Students will assess actual security breaches and think critically about the cause, impact, continuity, and prevention of these malicious attacks. In Target’s 2013 holiday data breach and cyber-attack, data belonging to millions of...

The bitcoin.

          A common tool that is now used to buy and sell goods/services is the bitcoin. Research the bitcoin. What is a bitcoin? Is it considered money (as defined by the terms of economics)? Find an article that expounds on the popularity of...

Trusting a cloud providers hypervisor

    There are many cloud providers that claim their infrastructure is secure. How can you trust a cloud providers hypervisor? Discuss the security features of a hypervisor. Discuss some of the advantages and disadvantages of hypervisors....