equifax hack

 200 words due 09/26 11:59 pm est

Beginning on  May 13, 2017 hackers successfully breached Equifax’s customer dispute portal. The hackers used an Apache Struts vulnerability, a months-old issue that Equifax knew about but failed to patch, and gained access to login credentials for three servers.  Those login credentials in turn allowed the hackers to access another 48 servers containing personal information. The hackers spent 76 days within the Equifax network before they were detected. Equifax didn’t discover the attack until July 29, and cut off the hackers’ access on July 30. The breach exposed the personally identifiable information of over 147 million Americans.  This information included social security  numbers, names, addresses,  birthdates, credit card numbers and driver’s license numbers. Personally identifiable information of British and Canadian citizens was also compromised.In your initial post, please answer both of the following questions:

  1. Choose a federal law (Equifax is a credit reporting agency and subject to special laws) or a  US state data breach law or the EU GDPR (check our reading materials and PowerPoint slides, the links below, and ncsl.org for descriptions of applicable law) and explain how it applies or has already been applied to Equifax for its data security breach.  You use the FTC settlement page as a source for your discussion or include a discussion of any private litigation. Alternatively, since 4 members of the Chinese People’s Liberation Army have recently been indicted, you may choose to discuss whether this indictment represents an example of state-sponsored cyber warfare. Remember to distinguish in your own mind the difference between Equifax’s liability for the security/data breach and the hackers’ liability for carrying out the breach.
  2. Using your best judgment, what would you recommend to create and maintain an infrastructure for Equifax that would most robustly and effectively protect against future breaches and the liabilities resulting from those breaches?  Include any specifics you may be familiar with such as hardware and software recommendations, compliance with specific US and  international laws, industry best practices, and any appropriate third-party vendor solutions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 524 Small Parser

Write a Python 3 program tlparser.py to parse the five given timelog data files in the folder “Homepage/Course Project/Small Parser” of the Blackboard to get how many hours and minutes the author spent in each file. The timelog file name will be an argument for your Python program. For example, you run your program on the spirit machine like “python3 tlparser.py TimeLogCarbon.txt” a. Your program needs to report the line number if there is something wrong with the format of the time data in that line that your Python program cannot parse. We cannot assume that there will be a time data value in each line. The line like ‘- 10.remove “other”’ is a perfect line. b. Your program start to count the time after it found the hard-coded “Time Log:” (case insensitive, there is a space between Time and Log). c. The “pm” and “am” should be case insensitive, i.e., 9:10pm or 9:10PM or 9:10pM or 9:10Pm are all valid time value. d. “9:10pm – 11:40pm” or “9:10pm-11:40pm” or “9:10pm -11:40pm” are all valid time periods, i.e., the spaces between “-” and the time value are not important. e. Do not use the regular expression module “re” in your source code. f. We assume there will be no space within “9:10pm”. Please issue “python3 tlparser.py TimeLogCarbon.txt” on the spirit machine (Python version 3.8.10) to test your Python program before you turnin it. Please use “if __name__ == ‘__main__’:” in your code and avoid global variables (read sections 2.5 and 3.17 at Google Python Style Guide (https://google.github.io/styleguide/pyguide.html)). Two articles about the variable __name__ in Python: https://medium.com/python-features/understanding-if-name-main-in-python-a37a3d4ab0c3 https://www.geeksforgeeks.org/what-does-the-if-__name__-__main__-do/ ease type your solutions in a Word document file hwch4_xxxxxxx.docx where xxxxxxx is your CSU ID number. Choose File -> Save As from Word to save your solutions as a hwch4_xxxxxxx.pdf. The cover page should contain your name, your CSU ID and the login id you used to turnin the project. Turning it in You have to submit your program electronically by using the following command on the grail machine: turnin -ccis524x -p sparser tlparser.py Start on time and good luck. If you have any questions, send e-mail to [email protected], [email protected], or [email protected].

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Iphone Discussion

 The first iPhone was revealed at the Mac World conference in early January 2007, and later released in June of that year. Initially, third-party native applications were not allowed. Apple products have created a unique brand value within society.  Their products do not support third party applications, thus providing additional layers of security from social engineering and malware attacks.

  • How has the use of core ideas such as location and orientation-aware pushed iPhone beyond its web browser and tightly integrated web functionalities?
  • Why are Plists (property lists) the easiest way to store information on Macs?
  • Discuss the benefits of using Xcode for developing iOS apps.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RESUME

Instruction:: Create your resume in a style of your choice.  The resume should be written from the standpoint of your career objectives based on the major(cybersecurity) you selected at this University, and applying for your first job in your chosen career. need it within 6-7 hours. Thank you

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Compare and contrast the vulnerability scanning tools you used in the labs. Are there scenarios in which a scanning tool would be advantageous to use over others?
  • When assessing the security risks of a network, a step that is important but sometimes overlooked is the gathering of organizational data. How can knowledge of organizational data give you leverage over network vulnerabilities? Name two types of organizational data and explain how a hacker might be able to exploit them.

Cite sources to support your assignment. 

Format your citations according to APA guidelines. 

Submit the reflection.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer architecture

 

Reaction Paper:

Please read “Windows 3.1: 25 Years Later, It’s Still a Milestone” by Benji Edwards and write an 1000 word summary and reaction paper in APA format, including citations to the paper and a “works cited” section which must include at least the article itself. Please note that this will be automatically run through “TurnItIn dot Com”, so please be sure that it will not appear to be plagiarized.

Works Cited

Edwards, B. (2017, May). Windows 3.1: 25 Years Later, It’s Still a Milestone. PC World, 35(5), pp. 157-171.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Requirements

 

The heart of this course is a project, in which you will design, implement, and evaluate a user interface. User interface design is an iterative process, so you will build your UI not just once, but three times, as successively higher-fidelity and more complete prototypes. 

This project is the first step in the user interface design process.  By the end of Project 2 you will have completed the user research, created user personas, developed wireframes. In Project 3, you will develop a working prototype. In Project 4, you will revisit heuristic analysis and usability testing on the user interface and experience you designed.

Focus for this project is on user research and wireframes – understanding who the users are, what are they trying to accomplish, how can your interface design support and delight them. We review several approaches to structuring, performing, and documenting user research, including a special focus on personas of different types and on use cases. This project provides a walk-through planning and analysis stages for UX/UI projects: why the planning matters and methods that can be used.

You may choose to design a user interface for any industry. The type of user interface you create is also your choice (i.e. SmartTV, AR, VR, smartphone, app, website). If you need some ideas to get you started, browse these concepts:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Analysis and Design 5th Edition Chapter 5 page 219 – Excercise F

Draw a level 0 data flow diagram (DFD) for the health club system in Exercise G, Chapter 4.

Important: Use Visio to create the DFD.

Note: This paper will be used and stored as part of the SafeAssign™ services in accordance with the University. 

Exercise G. health club system

——————————— 

Create a set of use cases for the following health club membership system: When members join the

health club, they pay a fee for a certain length of time.  Most memberships are for one year, but memberships as short as two months are available. Throughout the year, the health club offers a variety of discounts on  its regular membership prices (e.g.,two memberships for the price of one for Valentine’s Day).  It is common for members to pay different amounts for the same length of membership. 

The club wants to mail out reminder letters to members asking them to renew their memberships one month before their memberships expire. Some members have become angry when asked to renew at a much higher rate than their original membership contract, so that the club wants to track the price paid so that the manager can override the regular prices with special prices when members are asked to renew. The system must track these new prices so that renewals can be processed accurately. One of the problems in the health club industry is the high turnover rate of members. While some members remain active for many years, about half of the members do not renew their memberships. This is a major problem because the health club spends a lot in advertising to attract each new member. The manager wants the system to track each time a member comes into the club. The system will then identify the heavy users and generate a report so that the manager can ask them to renew their memberships early, perhaps offering them a reduced rate for early renewal. Likewise, the system should identify members who have not visited the club in more than a month so that the manager can call them and attempt to reinterest them in the club.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: What did you learn about risk when managing track covid vaccinations project – IS Project management

Discussion: 

What did you learn about risk when managing your project?

Subject: Information Technology Project Management

Chapter 11 – Project Risk Management 

Project:

Plan and build digital system to capture and track covid vaccinations. This App can share its data with different state and each state has unique ID system. Incorporate that into the various state Id systems. This app will be completely digitalized and avoid manipulation or duplication or forging etc possible with paper Vaccination records.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

scripting tech

 

There are a large number of tasks involved in information technology and programming, and many of these tasks can be automated using scripting technology. The ability to use scripting correctly will save significant time and leverage available resources in many ways. The first step toward better productivity is to understand how scripting languages work and how they can be used. For this assignment, you will begin to learn the characteristics of scripting languages and gain an understanding of how to select the right scripting tool for a specific task.

  • Prepare a document to submit your results:
    • Use Word
    • Title Page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Identify a scenario where scripting would be useful to automate a task.
    • Define at least 5 requirements of a scripting language that would be necessary for the task.
    • Identify 2 scripting language candidates that meet the requirements.
    • Select 1 of the scripting languages, and justify the selection based on how well it meets the stated requirements.
  • Name the document yourname_ITSD327_IP1.doc.
  • Submit the document for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now