Wk 4 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises? 
  • What are the different types of denial-of-service attacks? How do you detect and respond to these types of events? 

Cite sources to support your assignment. 

Format your citations according to APA guidelines. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 5 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages: 

  • Reflecting on the lab exercises you completed this week, how do these techniques apply in day-to-day cybersecurity operations?
  • Consider the regulatory requirements surrounding privacy and security of information you learned about this week. Using an industry with which you are familiar, explain the laws that regulate information security in this business sector. What types of security operations and practices do these laws translate to?

Cite sources to support your assignment.

Format your citations according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

create asp.net project

create asp project using visual studio

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

: Machine learning-based SMS Spam Filtering

For a team with multiple team members, one team member submits the answer and a file of names for all team members. Each of other team members submits a file that contains names of all team members.  

Project Statements

– Objective

For this project, you are asked to implement a detection program supporting Short Message Service (SMS) spam filtering. The main concern is to design/generate features to differentiate SMS spam messages from legitimate ones, and run machine learning techniques (i.e., supervised learning) to classify SMS spam messages. Unlike email spam filtering, SMS spam filtering poses its own intrinsic problem because the length of text messages is relatively small (up to 160 characters or less). To come up with this project successfully, you must devise robust and efficient detection features to solve this problem.

.

– Dataset

You will explore real SMS Spam Collection Data Set, corpus of mobile SMS labeled Spam/Legitimate. The SMS Spam collection contains a total  of 1324 SMS messages, which is composed of 82 spam and 1002 legitimate messages.  Each line has one SMS message including two columns separted by “,”: the second column indicates label if the SMS message is spam or legitimate (ham), and the first one is the content of the message (i.e., raw text). Table 1 shows some samples of SMS Spam/Legitimate messages in the given dataset.

Table 1: SMS Spam/legitimate message samples

Label Text

spam “For the most sparkling shopping breaks from 45 per person; call 0121 2025050 or visit www.shortbreaks.org.uk”

spam December only! Had your mobile 11mths+? You are entitled to update to the latest colour camera mobile for Free! Call The Mobile Update Co FREE on 08002986906

ham Yup next stop.

ham No. I dont want to hear anything

Project Requirements

– Feature Extraction

Write a java (or python, or other program langagues but you need to give a demo to me) program for the detection features from raw text and generate a feature set file. You will be programming FOUR detection features and are responsible for justifying the implementation strategy for each of the features in the report. If you are using any references in terms of the implementation, you should cite and explain it concisely. For project 1, the detection features are:

Detection feature Description

Number of Characters typed

in Message In Table 1 above, it appears that SMS spam messages include relatively large number of characters than legitimate messages. From the SMS spammers’ (e.g., marketers) perspective, they are likely to use more characters available as long as it doesn’t exceed the limit of SMS to send the sufficient information to customers for illicit profits.   

Number of Currency Symbols To take the bait by mobile users, SMS spammers might emphasize the prize (or cash) using the currency symbol (e.g., £) in the SMS message. This is typically different from legitimate messages. Here is an example, “Please call our customer service representative on 0800 169 6031 between 10am-9pm as you have WON a guaranteed £1000 cash or £5000 prize!”

Number of Numeric String One of the intrinsic factors from the SMS spams is a CONTACT number or PROMOTION code. Since the phone number is sensitive, it is not likely to be in the legitimate messages frequently. (Example: “PRIVATE! Your 2003 Account Statement for shows 800 un-redeemed S. I. M. points. Call 08719899230 Identifier Code: 41685 Expires 07/11/04”)

The frequency of most popular term/word

   

– Binary Classification

From WEKA, run different binary classifiers to identify SMS Spam messages using the feature set you devised. You should run the following FIVE classification algorithms with Cross Validation (by default, K =10) and report the experimental results you analyzed. Specifically, you must report  the best classifier with i) Accuracy, ii) True Positive rate (TPR), and iii) False Positive rate (FPR).

Decision Tree (J48)

Multinomial Naive Bayes

K-Nearest Neighbors

SVM (LibSVM)    

RandomForest

Programming Requirements

We highly recommend you to use Java (or Python) and WEKA  for this assignment. You can also use other langagues but you need to clearly write the instrucitons to configure the compling and running environment to test your code. You might also be required to give a demo of your code. You need to write the programs to extract detection features and apply machine learning techniques using WEKA. Here is official Weka documentation (e.g., Weka Wiki, FAQ, Tutorials) link (http://www.cs.waikato.ac.nz/ml/weka/documentation.html). If the program only runs in your own machine, you should show the demo to TA or the instructor  in person.

Your program should generate the output in the format of Attribute-Relation File Format (ARFF), which can be directly analyzed by the Weka. 

Submission Requirements

The assignment must be done originally. Please submit TWO files:

i) A single tar (or zip) file that include all files below:

Source codes: your java (or python) codes and a shell script files (if applicable) that you use for testing. Your code also needs to be well-documented, with any major constructs (i.e., functions) clearly commented.

README: overall high-level documentation of instructions to run your program.(1 page)

Report: well-documented summary that includes the annotation/justification of detection features and the experimental results you analyzed. (at least 5 pages, the more formal the better.)  

Dataset: a feature set data in the format of ARFF to be tested

ii)  a MS word (or Acrobat PDF, Plain Text) file, including ONLY source codes for originality checking.   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper Summary

What is the paper about?

Questions are in attached .jpeg. Please go through the attachments

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 4 Discussion – Indicators of Compromise

 

 Respond to the following in a minimum of 175 words: 

An important part of managing security in connections and communications between a secured network and the Internet at-large is to have a benchmark for what normal traffic looks like. Many applications exist for the purpose of monitoring, probing, or scanning traffic-related events to catch irregularities that can inform a deeper investigation. 

  • What types of irregularities could signal a potential security event or incident? Describe at least 2 types of indicators.
  • Which tools would you recommend to track these indicators, and how would you respond to these occurrences on your network? How would you determine if these indicators signaled a real threat?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operational excellence

1. what a community of practice is. Why are they important and how can they impact the culture within an organization? Have you ever needed to research a technical issue and found yourself on a community web page where others have expressed a similar issue and receive responses from the community to aid in addressing the issue? What about professional organizations which publish how-to steps for technical concepts? Please provide examples in your response where such resources can be helpful to others in the IT community.

Response should be 300 words.

 Information Technology and Organizational Learning Assignment:

 Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.**Remember the APA cover page and the references (if required) do not count towards the page length**Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment. 

 

Information Technology and Organizational Learning

ISBN: 9781138238589

Authors: Arthur M. Langer

Publisher: CRC Press

Publication Date: 2017-10-17

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Capstone project

I need to complete a capstone project in order to graduate. 

CAR 490 Capstone CSIS

Student Leadership Model

This capstone
follows a student leadership and industry partner teaming approach. In the
student leadership model, faculty do not identify or develop the project topics
and scope for the students. This capstone will be a driven by the student and
supported by a faculty member.

Learning Objectives

The learning
objectives for this capstone are:

1) Enhance
independent thinking by engaging in projects that further develop competencies
acquired in pre-requisite courses.

2) Further
develop critical thinking skills required to solve open ended problems related
to design, analysis, and/or construction of projects.

3) Further
develop skills associated with project management such as developing,
implementing, and adjusting a project plan or schedule, clearly defining scope
of work, and estimating time and costs required to complete a project.

4) Further
develop communication skills required to produce organized documentation,
graphic illustrations, professional presentations, and clear and concise
project reports.

Phases of
the Capstone

This capstone will follow a SDLC (Software Development Life Cycle)
approach. The following phases to cover include:

         
Requirement Gathering and Analysis

         
Design

         
Implementation or Coding

         
Testing

         
Deployment

         
Maintenance

Capstone Timeline

The capstone will follow the timeline below:

Week 1 Requirement Gathering and Analysis Expectations:

         
Consider the following areas to build off of:
software (programming or app), website, database, data analytics, or systems
analysis. You may suggest another area as well based on your interests and
career goals.

         
Investigate the needs

         
Write a project statement including:

o  
Define the problem/need

o  
Why is this project/problem worth
doing/solving?

o  
What do you know already that can be applied
to the problem?

o  
What do you need to know more about to solve
the problem?

o  
Develop a timeline to producing the solution

       

Week 2 Design Expectations:

         
Write up the design method including the
following:

o  
How are you going to go about solving it?

o  
What are the final deliverables for the
project?

o  
Define the user requirements for the solution

o  
What is the system architecture and components
this solution is using?

          

Week 3 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

          

         

Week 4 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

         
Integrate any feedback from the previous week

          

Week 5 Implementation and Coding Expectations:

         
Move forward with proposed and approved
technology solutions

         
Integrate any feedback from the previous week

         
Submit work for review

         
Check in with instructor for brainstorming and
support

         
Submit timesheet

Week 6 Testing Expectations:

         
Create a series of test questions/scenarios
for a user to perform using the solution/project developed

         
Have a user test the solution/project

         
Submit user evaluation, report any needed
changes, submit a plan to implement needed changes

          

Week 7 Implementation and Coding Expectations:

         
Integrate improvements/changes needed based on
user testing

         
Submit work for review

         

Week 8 Testing Expectations:

         
Have a user test the solution/project

         
Submit user evaluation, report any needed
changes, submit a plan to implement needed changes

         

Week 9 Implementation and Coding Expectations:

         
Integrate improvements/changes needed based on
user testing

Week 10 Deployment Expectations:

         
Develop any necessary training/support guides
for solution

         
Walkthrough all solution components with instructor

          

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business Continuity

Analyze the impact that business continuity planning has on risk management 

500 words APA format wit references needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Questions – File attached

Discussion and Question attached

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now