Information Assurance Essays and Research Papers

Instructions for Information Assurance College Essay Examples

Title: Information Assurance

  • Total Pages: 10
  • Words: 2565
  • References:8
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: The question I am looking to address with this paper is,

What role might time play in information assurance, or in civilizing the cyber world and its laws?

The following is just some thoughts I have on the question, to give the writer an idea of what I am thinking.

I feel that time will play a major role in information assurance and in civilizing the cyber world and it laws. It is important to understand that the laws that we currently have today in the United States did not evolve over night. Just like the human race we gain more knowledge as time went on and as we grew, adapted, and changed, we in turn learned that laws were an important part of our society because they create a concrete way of governing the people. Time changes everything. Thing you do now you will have no interest in doing 20 years down the road. Laws are viewed in the same capacity. It is important to know what we have to govern us now so we know how to change things in the future. As for the internet and the laws that govern it, it will take broad definitions as to what is considered right and what is considered wrong. It will be hard to govern the internet and all the activities that go on in the same second from billions of PCs and internet connections.
Homeland Security was established eight years ago, Homeland security didn’t exist. We thought that on a large scale that we were a safe country. We knew we had enemies but we thought that if something were to happen our 9-1-1 emergency system would be able to handle it all. Then two planes crashed into the twin tower, one hit the pentagon and another crashed in a field. Four planes were hijacked on the same day and we knew nothing until the end. We realized then that we needed new laws and regulations and procedure to deal with such tragic events.
The internet is no different, there is no face, no name, no race, no nothing; just an IP address and that is what we are going to have to build off of. Many people just want to check their emails, and communicate with family and friends; not everyone is on the internet to hack into the computers of others and steal personal information or trying to send viruses through email and websites. It’s the few people who have personal agendas and vendettas that ruin it for the rest of us. I understand free speech and how important it is and how people should be able to display publicly what they feel they have the right to, but that doesn’t disregard the fact that things need to be monitored from smaller children. I don’t feel it is the laws responsibility to deter children from entering into adult sights on the internet just like it is not their right to deter them from robbing a bank. It is the law enforcer’s job to take action after a crime has been committed, it is personal morals and experiences that try in talk a child out of a bad choice. Laws will only improve with time, because it is time that will show how many ways it can be broken. Once we have seen all we need to see, then we will be able to write laws that are specific and that have punishments that fit the crime committed.
At the website provided: http://www.nap.edu/netsafekids/pp_li_il.html, you will find the laws that are currently active as it pertains to the internet. There are few that pertain to children and the internet. We have yet to cross the line of sexual predators that are after our young children on the internet. But it is also understood how uncharted that territory is. How unlawful it is to monitor someone personal belongings without search warrants and how our current laws protect every individual living in the United States. It is with time that we will learn what works and was doesn’t and it is with time that we will formulate a way to govern the internet just like we have learn to govern all other public forms of communication.

This last paragraph is something I definitely want the writer to address.

Laws for the Internet are evolving but they are currently inadequate. The real problem is that the Internet is evolving faster than our legal system can produce legislation to control it. If the Internet ever matures to a steady state and doesn't change for a decade or so I think our legal system will evolve to control it but until that happens I think it will always be a loosing battle (legislatively). While the Internet is changing so rapidly I think another option is to use code rather than laws to enforce ethical and moral behavior online.


I want the writer to crystallize a crisp statement about what your paper will address and what it won't in the introduction paragraph.

The Research Paper will be graded against the following criteria:
• Clear statement of thesis to be analyzed and its relevance: 15%
• Technical Content (depth and accuracy of information and analysis): 40%
• Recommendation, answer, or conclusion supported by research and analysis: 15%
• Clarity, Organization, grammar and spelling: 15%
• APA Style: 15%

Please have the writer email me with any questions.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
References:

Bibliography

Barlow.A Declaration of the Independence of Cyberspace

Libicki (1995)What is Information Warfare?. Strategic Forum, No. 28. [Online] Available: http://www.ndu.edu/inss/actpubs/act003/actpub.htm Luiijf

Lunt, T.F. Information assurance: securing the naval command and information infrastructure.

Network-Centric Naval Forces (2000.):A Transition Strategy for Enhancing Operational Capabilities by the Naval Studies Board. National Research Council;

Miller, S (1995) Civilizing Cyberspace: Policy, Power, And The Information Superhighway

Chris et al. (2004 ) Advanced Information Assurance Handbook

Toffler, T (1993)War and Anti-War: Survival at the dawn of the 21st Century

Trout, B. (2007). "Cyber Law: A Legal Arsenal For Online Business," New York: World Audience, Inc.

Richard et al. (2006) Emerging Technologies and the Law: Forms and Analysis, III. Law Journal Press, 2002-2008. ISBN 1-58852-107-9

Order Custom Essay On This Topic

Title: Information Assurance and Security IAS Digital forensics DF

  • Total Pages: 33
  • Words: 9242
  • Works Cited:25
  • Citation Style: IEEE
  • Document Type: Research Paper
Essay Instructions: Possible project for you to do is to develop a set of Information Assurance and Security (IAS) Digital forensics (DF) labs (or a lab workbook) for future use in teaching. Highlights are below:

? 3 large-scale labs (collaborative, students may finish in about 1 month)
? 5 medium-scale labs (collaborative or individual, Students may finish in about 2 weeks),
? And 10 small-scale labs (individual, students may finish in about 1 week)

Labs should address core concepts and practices in information/network security/assurance and digital/computer forensics

? Labs should help student gain practices based on concepts, algorithms, and mechanisms learned in class some labs should be programming ones
? For each lab, expected components in workbook include purposes and goals, IAS/DF concepts/algorithms covered, software/hardware/network needed, skills needed, main tasks and procedures, expected lab outcomes and results, suggested grading criteria, possible bonus work and points, duration of lab, and suggested (undergraduate/graduate) courses using the lab

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Works Cited:

References"

[1] Lab VI: Timeline Analysis. Available at https://cs.nmt.edu/~df/Labs/Lab06_sol.pdf

[2] LAB IV: File Recovery: Meta Data Layer. Available at

[3] Lab V: File Recovery: Data Layer Revisited. Available at

[4] Windows Client Configuration. Available at

[5] Port Connection Status. Available at

[6] FTP Communication. Available at

[7] Lab III: Unix File Recovery - Data Unit Level. Available at

[8] Lab II: Search Word Filtering from Unallocated, Slack and Swap Space. Available at

[9] Lab I: Disk Imaging and Cloning. Available at

[10] Digital Forensics With Fred. Available at

[11] EnCase 7 - Basic + Intermediate Topics. Available at http://www.digitalintelligence.com/training/coursedata/EnCase7_Syllabus.pdf

[12] Lab 9 - Caesar Cipher in C. Available at

[13] Computer Forensic Analysis and Validation. Available at

[14] Understanding Computer Investigations. Available at

[15] Working with Windows and DOS Systems. Available at

[16] Computer Forensic Tools. Available at

[17] E-mail Investigations. Available at

[18] F.B.I. Digital Forensics Helps Solve Crimes, May 31, 2011. Available at

[19] Some Basic DOS Commands. Available at http://eml.berkeley.edu/sst/basic.dos.html#DiskDrive

[20] Cindy Hill, " What Is the Definition of Digital Forensics?, " eHow, June 23, 2014. Available at http://www.ehow.com/about_5504910_definition-digital-forensics.html

[21] What Is the Salary for Someone in Digital Forensics?. Available at '

[22] Information Assurance CSIAC. Available at

[23] Information Assurance Overview. Available at

[24] Digital Forensics Access Data. Available at

[25] What Is Digital Forensics? Careers In Forensics. Available at http://careers-in-forensics.com/what-is-digital-forensics/

Order Custom Essay On This Topic

Title: See Below

  • Total Pages: 25
  • Words: 6861
  • Bibliography:0
  • Citation Style: APA
  • Document Type: Essay
Essay Instructions: Topic: why/how to create a information assurance program within the case study organization with organization-wide polices for
1. Data Management / Change Management
2. Application Development



Final paper must contain the following components as indicated within the handbook:
? A cover page;
? A one-page executive summary;
? A table of contents (ToC) (created using the MS-Word headings feature that allows a ToC to be created using the Insert | Reference | Index and Tables ? | Table of Contents function);
? Report on the findings for all the topics discussed during the seminar that are relevant to their workplace;
? Analysis in each section of positive and negative aspects of the security posture of the organization;
? Concrete recommendations for improvement with analysis of relative importance, expected efforts, costs and feasibility to the extent possible given the time constraints;
? Appendix showing all the recommendations in a numbered list;
? Appendix showing all the recommendations sorted by priority and with expected costs, if available;
? Footnotes or endnotes for references that use the document automation features (e.g., Insert |Reference | Footnote) to avoid manual renumbering (it is not acceptable to use manually numbered footnotes or endnotes);
? A bibliography showing the full list of sources used in the footnotes or endnotes sorted by author and showing full author lists, date of publication, titles, book or journal, and other bibliographic details.

Including Budget Information

When you are making recommendations to business leaders, who will be making a decision about your recommendation and approving any associated costs involved, you need to include re-sourcing budget estimates to help your leaders in making their approval and allocation decisions for your proposed plan.

You should provide cost estimates for not only hard dollars, but also for other resources, such as number of personnel, man-hours, and time ranges.

It is not expected that you can always provide exact amounts. However, you should be able to provide estimated costs for all recommendations. If you like to provide the estimates as a range of amounts, that is fine, as long as your ranges are not so wide that a business leader would consider it as ridiculous and, as a result, damage the credibility of your recommendations.

Use of Research Papers

DO NOT copy and paste the research papers into the final paper This is *NOT* acceptable, and is not the purpose of the final paper. You will get a zero for this action.

Direct quotes from research papers papers - should be quite limited.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Bibliography:

Reference:

Harwood, I.A. (2006). Confidentiality constraints within mergers and acquisitions: gaining insights through a 'bubble' metaphor, British Journal of Management, Vol. 17, Issue 4., 347 -- 359.

Parker, Donn B.] (2002). "Toward a New Framework for Information Security." New York, NY: John Wiley & Sons. ISBN 0471412589.

Elsayed, E. (1996) Reliability Engineering, Addison Wesley, Reading, California: USA.

SACA (2006). CISA Review Manual 2006. Information Systems Audit and Control Association. pp. 85. ISBN 1-933284-15-3.

Thomas. R, (2001), Information Security Risk Analysis (CRC Press, 2001)

Bleichrodt H, Quiggin J (December 1999). "Life-cycle preferences over consumption and health: when is cost-effectiveness analysis equivalent to cost-benefit analysis?." J Health Econ 18 (6): 681 -- 708

Order Custom Essay On This Topic

Title: Information Security and Assurance

  • Total Pages: 3
  • Words: 1148
  • Sources:6
  • Citation Style: MLA
  • Document Type: Research Paper
Essay Instructions: This is an Information Security & Assurance term paper. When you read the questions below, keep in mind that your answer has to be from an information security and assurance perspective. All of the questions are related to information security and assurance even if it was not mentioned clearly.

Directions

-Answer any three (3) questions from Part A below.

-Each answer is expected to be concise, direct and to the point. It is anticipted to take approximately 3 to 4 paragraphs to answer (usually not more than a page). For each question, you must include at least two independent sources for your answer. In addition, You must answer your chosen questions in great details. Any reliable source is accepted, except 'wikipedia-like' and newspaper sources. Please make sure to site when needed and to provide a high quality paper that answers every aspect of your chosen questions.


Part A

1. In developing a policy for accessing a system you can use a closed or open approach. Decide which policy you would select for a system that has access to confidential data (such as student records, not online). Explain why your policy will be effective and how it will minimize an attacker's access to the records.

2. Explain which is more secure, Asymmetric or Symmetric Encryption, and provide two circumstances where each could be effective, one for Asymmetric and one for Symmetric. Each circumstance should be different from the other.

3. Explain Steganography and two circumstances where Steganography would be appropriate.

4. Name at least two different Information Assurance (IA) standards, each from a different standards organization. Summarize the standards and explain why they are important.

5. Summarize one major US technology law that has gone into effect in the last 10 years. Explain its impact, why it is helpful, and where it is a problem.

[ Order Custom Essay ]

[ View Full Essay ]

Excerpt From Essay:
Sources:

References

Blyth, a ., Koyacic., G (2006).Information assurance: security in the information environment. Springer Science & Business,

Department of Defense (1999). INFORMATION ASSURANCE:Legal, Regulatory, Policy and Organizational Considerations,4th Edition. Accessed on 3/15/2012 at http://www.au.af.mil/au/awc/awcgate/jcs/ia.pdf

Dunbar, B (2002). A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.SANS Institute. Accessed on 3/15/2012 at http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677

ISO/IEC (2002). Information technology -- Security techniques -- Security information objects for access control. ISO/IEC 15816. Accessed on 3/15/2012 at http://webstore.iec.ch/preview/info_isoiec15816%7Bed1.0%7Den.pdf

Johnson, NF (1995) Steganography. Technical Report. November 1995.

Khanafer, a.,Saad, W.,Ba-ar, T., and Debbah, M., (2012) Competition in femtocell networks: strategic access policies in the uplink. Proc. IEEE International Conf. Communications (ICC 2012) - Wireless Networks Symposium ('ICC'12 WN'), Ottawa, Canada, June 10-15, 2012.

Santesson, S.,Nystrom, M., & Polk, T (2004). Internet X.509 Public Key Infrastructure:

Qualified Certificates Profile. Accessed on 3/15/2012 at http://www.ietf.org/rfc/rfc3739.txt

International Telecommunication Union (2000). ITU-T X.509: SERIES X: DATA NETWORKS and OPEN SYSTEM COMMUNICATIONS. Accessed on 3/15/2012 at http://physik.uibk.ac.at/hephy/grid/project/x509.pdf

Order Custom Essay On This Topic
Request A Custom Essay On This Topic Request A Custom Essay
Testimonials:
“I really do appreciate HelpMyEssay.com. I'm not a good writer and the service really gets me going in the right direction. The staff gets back to me quickly with any concerns that I might have and they are always on time.’’ Tiffany R
“I have had all positive experiences with HelpMyEssay.com. I will recommend your service to everyone I know. Thank you!’’ Charlotte H
“I am finished with school thanks to HelpMyEssay.com. They really did help me graduate college.’’ Bill K