ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper:Cyber Security And The Internet Of Things essay

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. DOI: https://doi.org/10.13052/jcsm2245-1439.414

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf

Chapters 5, 9, and 10 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10

Discussion: Physical Security and Threats

Word count: 300+ words

Chapters 5, 9, and 10 in the course textbook

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used.

· Use proper citations and references in your post.

Research Paper:Cyber security and the internet of things

Number of pages: 3+

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3+ pages, using your own words, by addressing the following:

· What did the authors investigate, and in general how did they do so?

· Identify the hypothesis or question being tested

· Summarize the overall article.

· Identify the conclusions of the authors

· Indicate whether or not you think the data support their conclusions/hypothesis

· Consider alternative explanations for the results

· Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)

· The relevance or importance of the study

· The appropriateness of the experimental design

When you write your evaluation, be brief and concise. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

· 3+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents.

ITS-834: Emerging Threats and Countermeasures is a course on emerging threats and countermeasures.

Reading Materials:

M. Abomhara and G.M. Koien (2015). Vulnerabilities, dangers, invaders, and attacks in cyber security and the internet of things Journal of Cyber Security, vol. 4, no. 4, pp. 65-88. DOI: 10.13052/jcsm2245-1439.414 https://doi.org/10.13052/jcsm2245-1439.414

NIST is the National Institute of Standards and Technology (2019). The Confidentiality of Personally Identifiable Information: A Guide (PII). Department of Commerce of the United States of America Special Publication No. 800-122, National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf

The course textbook’s chapters 5, 9, and 10

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Date of Publication: 10 April 2018

Discussion: Physical Security and Threats

Word count: 300+ words

Chapters 5, 9, and 10 in the course textbook

Many business environments have both visible and invisible physical

ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper:Cyber Security And The Internet Of Things essay

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. DOI: https://doi.org/10.13052/jcsm2245-1439.414

NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. National Institute of Standards and Technology Special Publication No. 800-122. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf

Chapters 5, 9, and 10 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10

Discussion: Physical Security and Threats

Word count: 300+ words

Chapters 5, 9, and 10 in the course textbook

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used.

· Use proper citations and references in your post.

Research Paper:Cyber security and the internet of things

Number of pages: 3+

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3+ pages, using your own words, by addressing the following:

· What did the authors investigate, and in general how did they do so?

· Identify the hypothesis or question being tested

· Summarize the overall article.

· Identify the conclusions of the authors

· Indicate whether or not you think the data support their conclusions/hypothesis

· Consider alternative explanations for the results

· Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)

· The relevance or importance of the study

· The appropriateness of the experimental design

When you write your evaluation, be brief and concise. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

· 3+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents.

Final Project Outline Assignment

Final Project Outline Assignment Instructions

Overview

In order to begin the Final Project Outline, a wireless telecommunications technology must be selected that you are familiar with.

Instructions

The objective of the Final Project Outline is to identify a

Thesis Statement (or to investigate current problems in the field of wireless security).

It is recommended that the selected topic is familiar to you. The subject must also fall within the scope of the course.

The topic proposal must consist of a written report which must be at a minimum of 5 pages. It must include a Statement of Technology that has been selected, as well as an outline of the project and the anticipated outcomes of the project.

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

1. Introduction – 1 page

2. Thesis Statement – a current problem in the field of wireless security . 2 pages

3. Statement of Technology – scope of the approach of research effort. 2 pages

4. Outline of the Project – Project Outcomes / anticipated outcomes of the project 5 pages

5. Conclusion – 1 page

6. References – 7

Downloading and exploring the attributes and value of using a Virtual Private Network (VPN).

Downloading and exploring the attributes and value of using a Virtual Private Network (VPN).
Introduction
This project gives the student the opportunity to get hands-on experience downloading and exploring the attributes and value of using a Virtual Private Network (VPN).

VPN Access
VPNs come in hardware and software varieties. There are a number of VPN apps that can be downloaded to your desktop and mobile device. One of these is called Tunnel Bear. Tunnel Bear has a free trial download. You are not required to use Tunnel Bear, but it is free.

Download Tunnel Bear (https://www.tunnelbear.com/) to your desktop/laptop AND mobile device (phone/tablet). Use Tunnel Bear for one week. Please keep in mind the free version is limited to 500 MB of data (so don’t use Tunnel Bear to watch Netflix or you will run out of data before you finish the assignment)! The idea is to experience a VPN client on your desktop and mobile device and keep a log of the sites your visit while changing the VPN servers that you connect to around the world. Make sure you change your VPN servers to a minimum of ten countries. Visit a minimum of ten websites (minimum of five sites on your desktop/laptop and a minimum of five different sites on your mobile device). Keep a log and make notes of your experience. What works well with the Tunnel Bear VPN? What doesn’t work so well. What specific performance impacts (if any) do you note. Why would you want to use a product like Tunnel Bear all the time?

Project Deliverables
Your deliverable consists of your turned in VPN log and a three to four page write up of your observations and experiences. Include the following questions as the sectional headings in your writeup (should be bolded in paper):

1. What VPN client did you use?
2. Did you have problems installing the client on either your desktop or mobile?
3. What was your general experience with the VPN client?
4. What specifically did you note about the VPN client when you connected to various VPN servers? Provide details.
5. What performance issues did you encounter (if any)?
6. Would you use a VPN client like Tunnel Bear all the time? If not, why not?
7. What are the perceived benefits of a VPN like Tunnel Bear.

You should include at least one relevant external reference, and your sources must be cited correctly in APA format. Your paper will be scored according to the Scoring Rubric below. Be sure you have incorporated all required aspects of the assignment.

Scoring Rubric

Attribute

Full points

Partial points

No points

Possible Points
VPN Log filled in completely Log is filled in with at least five desktop and five mobile sites. Observations recorded for each visit. Log is partially filled in with desktop and mobile sites. Log shows at fewer than 10 VPN servers. Observations are not recorded for each visit. No log or minimal effort. 3

Multiple VPN Servers

A minimum of 10 country VPN servers were tested.

Less than 10 country VPN servers were tested.

Single VPN server tested.

3
Document-General Experience

Write up explains the observer’s general experiences (positive/negative) regarding VPN client.

Write up lists minimal observations (positive/negative) regarding VPN client.

No general comments provided.

2
Write up-Specifics
Write up provides the observer’s specific details that were uncovered during testing.
Write up provides limited observer’s details that were uncovered during testing.
No specific details provided.
2
VPN Benefits
Write up shows an understanding of VPN concepts and how it is used.
Write up shows a limited understanding of VPN concepts and how it is used.
No benefits provided.
1
Document Format
The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; it incorporates illustrations or diagrams.
The document is not well-organized, and/or contains grammar and/or spelling errors; it does not contain appropriate illustrations or diagrams.
The document is extremely poorly written and does not convey the information.
1
Total Points: 12

Introduction
This project allows students to download and explore the benefits of using a Virtual Private Network (VPN).

VPNs are available in both hardware and software. Many VPN programs are available for both desktop and mobile devices. Tunnel Bear is one of them. Tunnel Bear offers a free trial. Tunnel Bear is optional yet free.

Download Tunnel Bear (https://www.tunnelbear.com/) to your phone/tablet. One week of Tunnel Bear. Don’t utilize Tunnel Bear to watch Netflix or you’ll run out of data before you finish the task! The goal is to use a VPN program on your computer and mobile device to change VPN servers throughout the world. Change your VPN servers to at least ten countries. Visit ten websites (five on your computer and five on your mobile device). Keep a journal of your experiences. What is good about Tunnel Bear VPN? What doesn’t work. If any, describe the impact on performance. Why would you want to keep using Tunnel Bear?

Deliverables
Your deliverables include your VPN log and a three-to-four page summary of your findings. Include the following questions as section titles (bold in paper):

1. How did you use VPN?
2. Did you experience issues installing the desktop or mobile client?
3. How did you find the VPN client in general?
4. What did you notice about the VPN client when connecting to different VPN servers? Give details.
5. Did you run across any performance issues?
6. Do you always use a VPN client like Tunnel Bear? Why not?
7. Benefits of a VPN like Tunnel Bear.

You must mention at least one external source accurately in APA format. Your paper will be graded using the rubric below. Assemble the needed elements of the assignment.

Scoresheet

Attribute

Points

Partially

0 pt

Possibilities
VPN Completed log Log has at least five desktop and mobile webpages. Observations per visit. Sites for PC and mobile half filled in. Less than 10 VPN servers log. Not every visit is noted. No log, no effort. 3

VPN Servers

We tested a minimum of ten VPN servers.

We only tested 10 VPN servers.

Tested one VPN server

3 – General Experience

Describes the observer’s general (positive/negative) VPN client experiences.

This article summarizes our VPN client experiences.

No general remarks made.

2
Particulars
The observer’s precise details discovered during testing are documented.
This post contains limited observer details discovered during testing.
No specifics given.
2 VPN Gains
This article displays a grasp of VPN concepts and usage.
The author has a limited understanding of VPN concepts and usage.
No benefits.
1 File Format
The paper is organized, has proper language structure, grammar, and spelling, and includes pictures or diagrams.
The text is poorly organized, has language and spelling problems, and lacks adequate drawings and diagrams.
The text is badly written and lacks information.
1 Total: 12

Electronic Innovation And The Government essay

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:

Be approximately three to four pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

—–

Find a peer-reviewed scholarly journal article about government electronic innovation. Complete an article review by creating a 2-3 page summary of the article. This will be a comprehensive synopsis of the journal article, covering the key topics and conclusions. Find one more source (it does not have to be a peer-reviewed academic paper) that supports the conclusions in the article you’re reading.
You’ll read the article and submit a review after you’ve found it. This is a review of a research article.
The following guidelines should be followed when writing your paper:

Not including the required cover page and reference page, the essay should be three to four pages long.
Adhere to the APA 7 criteria. Your paper should have an introduction, a body, and a conclusion.

The final hurdle is addressing the organization’s concerns about cloud security.essay

The final hurdle is addressing the organization’s concerns about cloud security. GTR leadership has requested that you present a report to address security and what AWS offers to ensure safe and secure cloud computing, storage, and access.

Write 2- to 3-page security design and approach brief in which you:

• Define the concept of a shared responsibility model in cloud security.
• Expound on why the shared responsibility model is unique to the cloud environment.
• List common security threats in the cloud environment that GTR would want to consider.
• List three security services.
• Explain how the security services would help mitigate threats.

Take time to explore the services before developing your explanation.

Cite all sources in APA and give attribution where appropriate.

No PLAGIARISM, ORIGINAL WORK ONLY

Finally, the organization’s worries about cloud security must be addressed. GTR management has asked you to present a report on security and what AWS has to offer in terms of safe and secure cloud computing, storage, and access.

Prepare a 2- to 3-page security design and methodology brief that includes the following:

• Define the term “shared responsibility model” in the context of cloud security.

• Explain why the cloud environment’s shared responsibility paradigm is unique.

• Make a list of common cloud security threats that GTR should be aware of.

• Name three different types of security services.

• Describe how the security services will aid in the mitigation of threats.

Before you build your explanation, take some time to investigate the services.

In APA style, cite all sources and give credit where it is due.

NO PLAGIARISM, ONLY ORIGINAL WORK

Research Questions – Qualitative essay

Topic: Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning

Questions

What kind of study has been done on machine learning’s application in healthcare?

What are the primary areas of machine learning’s benefits in terms of healthcare security?

What role does machine learning play in improving patient outcomes?

Who is making use of machine learning?

When and how does machine learning come into play?

Overview: Using the topic and research question above, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be applied to a qualitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies.

Directions:

Your research question in the form of a qualitative question (if it was not already).

An instrument or protocol (interview, ethnography, focus group protocol, etc) that could be used to answer the qualitative version of your research question.

A one paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the qualitative version of your research question.

500 words. APA format required with references.

Hippa Training Powerpoint essay

The human resource department is updating its HIPAA Basic Training for Privacy and Security course. As a security analyst for the hospital, you have been tasked with covering the topics in the training related to the HIPAA security rule and the information that hospital staff need to know regarding personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations.

This week, you will submit your PowerPoint presentation. The presentation should include narrative voice overlays for each slide. Include one to two slides (i.e. for a total of 4-8 slides) for each bullet point below explaining the following:

HIPAA Security Rule (1-2 slides )
HIPAA, PII, PHI, and ePHI Definitions (1-2 slides )
Safeguarding of PII, PHI, and ePHI (1-2 slides )
Disclosures of PII, PHI, and ePHI (1-2 slides )
Note:

The slide count of your presentation does not include the title slide, table of the content slide, introduction slide, and references slide. Include 2-3 quality references to support your assertions.

Use the given PowerPoint template in the project template section under the content area. You may also want to refer to the HIPAA Learning Resources from last week.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to integrate your IT skills in an organizational setting. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

You will not be evaluated on the voice recording quality.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
2.3.3: Explain inferences and deductions that follow logically from the evidence provided.
12.1.3: Communicate policies, processes, and/or procedures to stakeholders.
12.3.1: Select controls.
12.3.2: Describe the implementation of controls.
12.3.3: Explain how to assess controls.
12.9.1: Describe organizational compliance with government legislation that impacts technology.
12.9.2: Explain organizational compliance with industry regulations.
When you are finished, submit your work by using the box below.

The HIPAA Basic Training for Privacy and Security course is being updated by the human resources department. As a security analyst for the hospital, you’ve been tasked with covering the HIPAA security rule and the information that hospital staff needs to know about personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) in order to comply with federal regulations in the training.

You’ll turn in your PowerPoint presentation this week. Each slide in the presentation should include a narrative voice overlay. For each bullet point below, include one to two slides (for a total of 4-8 slides) that explain the following:

Security Rule of HIPAA (1-2 slides )

Definitions of HIPAA, PII, PHI, and ePHI (1-2 slides )

Protection of PII, PHI, and ePHI

Gave The Sample Example Follow The Instructions And Please Help Me To Finish This Simple Assighnment Asap -Sa

Quiz1 Demo Submission: Zenmap

(The goal of this document is to show you a rubric, or what is expected from you to submit in lab

assignments). You can use this sample for all class labs. This demo reflects my expectations from you

when you submit a lab assignment, in order to get a full grade

Introduction

• Latest version of Kali Linux can be downloaded from their official website

https://www.kali.org. As I am going to use it as a virtual OS, through Oracle Virtual Box, I

decided to use an already built virtual box from the website (http://www.osboxes.org/kali-

linux/). From this website, I downloaded: VirtualBox (VDI) 32bit Download Size: 3.4GB. This

image(based on the website) has the user name: root and the password osboxes.org

• After completing the download, I created an image in virtual box for the image disk that I

downloaded

• I noticed that their was an issue with the image (where I cant update or install tools properly),

so I updated the file (sources.list) in Kali (sudo gedit /etc/apt/sources.list) according to the

original lists described in Kali website (http://docs.kali.org/general-use/kali-linux-sources-list

repositories)

https://www.kali.org/
http://www.osboxes.org/kali-linux/
http://www.osboxes.org/kali-linux/
http://docs.kali.org/general-use/kali-linux-sources-list%20repositories
http://docs.kali.org/general-use/kali-linux-sources-list%20repositories
• Zenmap is a GUI version of NMAP network scanner (which is largely used as port

scanner/mapper)

• It can be called in Kali by its name (zenmap)

• Port scanning is used by hackers in early stages to know about open ports and based on that

try to attack the network. For Pen testers, its also used to make sure that only relevant ports

are open

• The tool uses nmap console commands, for example, we select a host and start intense scan,

the console command will be nmap –T4 –A –v www.yahoo.com

• The first information we extract from the tools is the TCP/UDP ports’ status (i.e. either open,

filters, or closed)

• Some commands can give more time in testing ports ( as TCP and UDP each has 64K ports,

some tasks can take time)

• We care more about open ports (as typically limited number of ports should be opened)

• For the least the host should have 80 open (to enable Internet)

• We can get more details in the hosts or services of the tested domain

What you will do ? Make your own demo and screenshots of Zenmap tool (For simplicity, you can

follow the steps describe in one the following two links, either one is fine)

https://www.youtube.com/watch?v=dlcx-fmzrnc

http://www.techken.in/linux/how-to-use-nmap-in-kali-linux-step-by-step-tutorial/

https://www.youtube.com/watch?v=dlcx-fmzrnc

Zenmap submitted a demo for Quiz 1

(The purpose of this paper is to present you a rubric, or a list of what is expected of you in lab.)

assignments). This sample can be used in any class lab. This demonstration is in line with my expectations of you.

If you want to obtain a complete score on a lab assignment, you must submit it on time.

Introduction

• Kali Linux’s most recent version can be obtained from their official website.

https://www.kali.org. I’m intending to utilize Oracle Virtual Box to run it as a virtual OS, so

choose to use a pre-built virtual box from the website (http://www.osboxes.org/kali-virtual-box/).

linux/). I downloaded VirtualBox (VDI) 32bit Download Size: 3.4GB from this page. This

image(based on the website) has the user name: root and the password osboxes.org

• After completing

Threat maps illustrate the millions of cyber threats

Threat maps illustrate the millions of cyber threats happening every day. In addition to visualizing the attacks, cyber threat maps also provide a limited amount of context including the source and target countries, attack types, and historical and (near) real-time data about threats. If you are working for a company, threat maps can be valuable to help your security team make connections and predictions on future attacks where your company may fall into the mix. Threat maps provide that visual connection that turns information into intelligence.
Imagine you are working for an IT/Cyber company and the cyber threats are one of the most significant threats that the company is facing. Analyze the maps and report your findings in 2-3 pages of Word document. APA format references. Introduce the company (can be an existing one or you can create one) and explain how your report will contribute to prediction on possible cyber attacks.
Feel free to use available free resources (Google, Youtube, GitHub) to explore the maps and their features.

1.Kaspersky Lab cyber attack map (Links to an external site.)
2.Deteque (Links to an external site.) botnet threat map (Links to an external site.)
3.CheckPoint (Links to an external site.) ThreatCoud (Links to an external site.) map (Links to an external site.)
4.FireEye real-time cyber attack map (Links to an external site.)
5.Akamai web monitor (Links to an external site.)
6.Bitdefender live cyber threat map (Links to an external site.)
7.Arbor Networks DDoS Attack Map (Links to an external site.)
8.Fortinet live cyber attack map (Links to an external site.)
9.Talos Spam and Malware Map (Links to an external site.)
10.Sophos Threat Tracking Map