Reference no: EM132110234
Cyber Security
1. What are the strategies to tackle issues in relation to cyberbullying?
2. How ethical hacking tools such as Metasploit are used to exploit vulnerabilities?
3. How would you educate organisations and individuals to protect themselves from cybercrime?
4. What are the risks of public WIFI and how to mitigate them?
Privacy
1. What strategies implemented to measure and illustrate compliance with privacy data regulations?
2. How essential is data retention schedule in line with legal and regulatory compliance?
3. What are the measures taken in order to mitigate privacy breaches and monitor applicable security controls for data security?
4. How is a Privacy Impact Assignment(PIA) conducted in an organisation?
Cybercrime
1. Which are the most concerning cyber threats for private businesses and government organizations?
2. Which are the industries most exposed to cyber attacks and why?
3. Which are the factors that most of all have influenced the design of malicious code in the last year
4. Which is the role of the intelligence in the fight to the cybercrime
5. What possibilities are there to occur a major cyber attack against a government network or a critical infrastructure
Information Security and Privacy
1. With reference to the information security what is known as social engineering attack and what are the major aspects of this concept?
2. How can the information can be distinguished in accordance with the risks, vulnerabilities and threats to the privacy of the information?
3. What is known as data leakage and what factors cause the data leakage in an information system
4. What are the classifications of the information security risks across an organisation and what are the types of information assets associated with these risks
5. How information privacy can be entitled in terms of Personally Identifying Information(PII) or non-Personally Identifying Information(non-PII)
Prove the inference rules for functional dependencies
: A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules.
|
Prove or disprove the following proposed inference rules
: A proof should be made by using the reflexive, augmentation, transitive, decomposition, union, and pseudotransitive rules.
|
Prove the following statement using hals theorem
: Prove the following statement using Hall's Theorem. For any bipartite graph G=(U, V, E), if every node (either a left node or a right node) has exactly.
|
Propose a relational database design
: Propose a relational database design (a set of relation schemata) for the online food ordering and delivery application illustrated in this UML class diagram.
|
Issues in relation to cyberbullying
: What are the strategies to tackle issues in relation to cyberbullying - How would you educate organisations and individuals to protect themselves
|
Provide an instance that comes close to your ideal balance
: Proposed solution to resource sharing and security against unathorized resource access that you view as the ideal balance between sharing, protection.
|
Prove that when a binary tree with n nodes is implemented
: Prove that, when a binary tree with n nodes is implemented by using links to the left and right child, then there will be a total of n+1 null links.
|
What is the pipeline clock cycle
: What is the pipeline clock cycle? How long it takes to perform n operations without pipelining using the clock cycle in (a)
|
What event triggers process and what are possible outcomes
: the worlds third-best social network for dog enthusiasts. She enters her email address and a password into the sign-up form
|