The U.S. Department of Homeland Security in the “war against terrorism

Investigate via a web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also, investigate how other governments or government agencies are using models in their mission. Write a report.

Chapter 9

Question 1: What is Big Data? Why is it important? Where does Big Data come from?

Question 2: What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?

Sample Solution

Security threats specific to VoIP

  1. List at least five security threats specific to VoIP. Give a brief description and possible scenario.
  2. List at least 10 Vulnerabilities in VoIP. Briefly describe each of the listed vulnerability, along with a possible recommendation for a countermeasure.
  3. Explain the end-to-end process of how VoIP works.
  4. Go back to problem 3 and list possible vulnerabilities in each step of the process.
  5. In problem 4 list what would be most risky vulnerability, with the most possible damage

Sample Solution

7 Wireless Networking and Security

Question 1:
Simplify the following expression (10 pts):
cos (2πft + π/2) + sin(2πft – π)
Question 2:
Support the fact that, in a transmission system using radio frequencies, increasing the
transmission frequency by a factor of 3 incurs a penalty (loss) ofapproximately 9.5 dB (10 pts).
Question 3:
How much bandwidth does a communication channel need to achieve a capacity of 40 Mbps
with a Signal-to-Noise ratio of 255? (Note: 1 Mbps is 1,000,000 bps) (10 pts)
Question 4:
Given the following parameters:
N = number of hops between two end systems
L = message length in bits (e.g., length of the original message, before being divided in
several packets)
B = data rate in bps, on all links
P = fixed packet size in bits
H = overhead (header) in bits per packet
D = propagation delay per hop in second
The number of packets (Np) required to send the original message of length L (in bits) can be
computed as:
𝑁𝑁𝑝𝑝 = � 𝐿𝐿
𝑃𝑃 − 𝐻𝐻�
The total end-to-end time delay for packet switching is calculated using the formula:
T = Np * (P/B) + (N-1) * (P/B) + N * D
Let us assume that L/(P-H) is an integer. What value of P, as a function of N, L, and H would
minimize the end-to-end time delay? (10 pts)
Question 5:
A Virtual Channel Identifier (VCI), in the header of an ATM cell, is used for routing to and from the end
user. Explain why a VCI is needed together with the Virtual Path Identifier (VPI). (10 pts)
Question 6:
Is there a need for a network layer in a broadcast network? Justify your answer. (10 pts)
Question 7:
Describe the significance of the following IPv4 header fields (10 pts):
(a) Time to live (b) Protocol
Question 8:
The transmit power of a station is 57.67 dBm (10 pts).
(a) How much power in KW is this equivalent to?
(b) Using an antenna with 1 GHz carrier frequency, what will be the received power in dB at
a free space distance of 0.5 km?

Sample Solution

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations is a well­known NIST publication consisting of a catalog of security and
privacy controls used to assist US federal government agencies in meeting the requirements of FISMA and serves as a best practice framework for other, non­federal entities.
NIST controls are organized into 18 different control families, and as the new CCISO you will need to explain at least 9 of these to the CEO and CTO on their meaning, and
examples of their implementation in a 12–15­page slide presentation in MS PowerPoint. On the last technical slide, a summary of the NIST Risk Management Framework Please
use the following format for the presentation:

Sample Solution

Cyber Security

On your first day on the job as an IT intern, you attend a meeting with several department heads regarding proposed budget reductions. One of the department heads suggests that money for information security be cut by at least 40 percent because the company has not been infected with a virus in the last three months, proving that the current defenses are adequate. What would you say in response

Sample Solution

Biden Administration that explores Port Security past 2021

Draft a Policy Document for the Biden Administration that explores Port Security past 2021
Develop a 5-7 double spaced white paper.
Specifics: You are the new Secretary of Homeland Security. You are drafting a Policy Document for the Biden Administration that explores Port Security past

  1. MTSA and S.A.F.E Port are key legislations; the Secure Freight Initiative is a process embraced by the world. What are YOU recommending be the next
    issue to address within this homeland security issue? Is the biggest issue cyber-related? Is it the use of containers as weapons? Choose your issue.

Sample Solution

Domestic intelligence collection

Develop a research paper to address domestic intelligence collection and analysis of your selected terrorist group (ISIS)
What domestic intelligence collection efforts would be best utilized on the organization you selected?
Which members of the IC would be the best collectors of intelligence on this particular organization within the country?
What intelligence analysis strategies would be the most effective and why?

Sample Solution