paraphrase 270 words

 The purpose of the virtual lab is to provide a hands-on learning experience of Wireshark and to analyze IP Protocols without compromising our own personal workstations or the workstations of others. The importance of this lab to cybersecurity is that, we as individuals who want to enter the profession of cybersecurity, knowing these protocols and getting familiar with their purpose is conducive to doing that job effectively. These tools are what makes a Cybersecurity Professional who they are. In this lab, we explored Wireshark and learned how to capture information between a source and a destination. The source can differ as you can see in my findings of frame 546 compared to frame 545. For Frame 546, the source was IntelCor while for Frame 545 the source was HonHaiPr, taking screenshots of both for reference. We learned how to identify a MAC address and what codes the IEEE assigns to a manufacturer which are the first 6 hexadecimal characters that are the representation of the source. This OUI (Organizationally Unique Identifier) is important cause it identifies the location of which the interaction occurred. We also got a glimpse of how to run a Command Prompt, though it was only to ping the IP address of the computer, it was nice start because it was the first time I have ever had the opportunity to do that. We also accessed the Flow Graph, in order to identify the handshake and the time that it occurred, between the IP Host and Google. Lastly, we used the Filter Box to filter out all DNS-related packets and screenshotted it for reference. 

Please provide turnitin report

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

paraphrase 470 words

  

A few of fields In cybersecurity that will be important in several years are Application Security, Network Security and Mobile Security. Both fields to me have a lot of growth opportunities and can be very dangerous if not used right. For instances application security plays a crucial part in our everyday life cycle which includes work, school, home use..etc. Certain application software can be very pricey, companies use it to evaluate security of the third-party software they may be using. Application penetration testing is a big help in order to exploit vulnerabilities in applications before hackers are able to discover them. Penetration testing are broken down into 5 stages which are analysis and WAF configuration, maintain access, planning and reconnaissance, scanning, and gaining access. Locking down the application is very important in so many ways. Mobile security is more important than ever before. More data is being stored on mobile devices so that gives the cybercriminal more opportunity to steal valuable information. More cybercriminals are focusing their efforts more on smartphones, tablets, and laptops. They can easily steal more money and data from users this way. IT security administrators noticed it’s getting harder over the years in securing sensitive data. While cybercriminals use it as another way to compromise businesses. That’s why in today’s society more organizations have personally banned the use of mobile devices or their property. People still view mobile devices as being more secure than PC’s. They think PC’s have a real operating system while mobile devices have some sort of firmware that’s unbreakable, along security apps which is not true. Network Security plays a important fact in cybersecurity, there is so many attacks daily on networks. Some common internet attacks are eavesdropping, Trojans, viruses, phishing denial of service, and IP spoofing. Over a period of time companies started to notice many data breaches over a network begins with negligent employees. These kinds of breaches happens all over the world, the cost of data breaches could range over $4 million per breach. With is huge price tag can do major damage to a business and customers will start to lost their trust in a organization like a bank. When it comes to cost data breaches can also come with legal fines. FCC found out carriers had breached personal data up to 305,000 users through their lax data security practices and exposed users. Penalties by the FCC has not been a regulatory body of concern with respect of data security and breaches. Some of the career opportunities and pathways to cybersecurity certifications are as follows: A Entry-level helpdesk which requires a Security + certification. A Cyber Security Forensics Specialist, certified Pen Tester w/Polygraph requires Certified Pen tester, programming experience with Java, C, C++, Perl, Python, Enscripts, Linux/Unix, Mobile OS, Android certifications. A Cyber Security Penetration Test Engineer requires OSCP, GIAC, GPEN, GWAPT, GSSP, ITIL, or CISSP certifications

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

paraphrase 240 words

  

In the Unit 2 Lab assignment, we continued to learn how to analyze wireless traffic using Wireshark and also began learning how to analyze wireless traffic using the NetWitness Investigator Tool. I began with practicing loading a file of traffic that Wireshark had previously captured. We reviewed previously captured ones so that all students were were following the same instructions. There is so much information to look at it can be a bit overwhelming. I am still finding that I have trouble using the Wireshark application, even after thoroughly following instructions. The introduction to the NetWitness Investigator Tool seemed a bit easier to follow. I was capturing the same packet information that I viewed in the first step when using WireShark. There was obviously a little trial and error involved, but I feel a little better about using this tool than WireShark. It appears to be a little more user friendly, but that could be because it isn’t all information overload on the menu. It appears to be displayed a littler easier to read. I still feel a little lost when it comes to most of the information that I am trying to find. This information is important to the cybersecurity field because it can provide important information to where a criminal hacker may be located or what it is exactly they are trying to achieve. It more or less shines a little light into the dark spaces of the internet.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethics and Discussion

 

This is the second of a series of five assignments focusing on software engineering ethics.

Read the attached Ethics-II.pdf Download Ethics-II.pdfwhich continues the discussion on what Ethics mean  in the context of software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 2.1 and 2.2
  • Questions 3.1 and 3.2
  • Question 4.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides. At least 3 pages 

 Question 2.1: What sorts of things can excellent software engineers contribute to the good life? (Answer as fully/in as many ways as you are able) 

Question 2.2: What kinds of character traits, qualities, behaviors and/or habits do you think mark the kinds of people who tend to contribute most in these ways? (Answer as fully/in as many ways as you are able) 

 Question 3.1: Who are the various stakeholders in this scenario, and what do they each have at stake in your action? Reflect carefully and deeply, and answer as fully as possible.

Question 3.2: What do you think is your ethical obligation in this situation? What do you think an excellent software engineer would do in this situation? Are they the same thing, or different? Please explain your answer. 

 Question 4.1: Which of the contributions in your answer to 2.1 are related to vital public good(s)? What vital public goods might software engineers help to secure that you did not mention in your initial answer to 2.1? 

 

M4 Discussion 1

Read the attached article: “The Mythical Man-Month Download The Mythical Man-Month“, by Frederick Brooks, extracts from The Mythical Man Month book, 1975.

1. Tell us something about what you learn from this article. Your posting should contain at least 100 words;
2. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

 

M4 Discussion 2

Find at least two credible sources to study the recent VW Diesel Scandal and read what this topic is about and what the latest development is.

1. Discuss your understanding of this case from the software engineering ethics viewpoint. Consider including in your post on your thoughts related to questions such as

  • What VW software engineers should have done to in order contribute to the good life for others in this case;
  • Who are the public’ to who the VW software engneers is obligated;
  • Why the software engineers is obligated to protect the public and
  • how VW software engineers failed in this case.

Your posting should contain at least 100 words;

2. List the two sources used in your research at the end of your post;

3. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 9): Discuss the correspondences between the ER model constructs and the relational model constructs. Show how each ER model construct can be mapped to the relational model, and discuss any alternative mappings?

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network security

1.What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access.

2. Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?

3. Which is your “favorite” attack? Why? Which is the most dangerous? Which do you think is the hardest to protect against?

4. Have you ever used e-mail or instant messenger to share information that was sensitive in nature? Have you ever gotten spam? Have you ever responded to spam? Have you tried to remove your name from the list? Did it work? Do you have any idea how your e-mail address wound up on the spam list in the first place?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Audit Procedure Guide

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Requirement: 2 Pages + 2 resources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Recovery : CitiBank backup tapes lost

Use the Web to search the terms “CitiBank backup tapes lost.” You will find many results. Select one article and write a report and identify what the article considers a shortcoming in CitiBank’s planning. What part of the contingency planning process came up short (IR, DR, or BC)? How could the shortcoming have been prevented?

( one page )

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper_ Part 2_ PD

The journal indicated below describes a national project. Based on the journal, and on your team’s understanding of the project, answer the questions below:

Journal title: “1976 Montreal Olympics: Case Study of Project Management Failure”

#QuestionPoints

1. Was it an internal or external project? Provide rationale.  

2. Identify at least 10 major stakeholders for the project.

3. What were the needs or expectation of each stakeholder?

4. Identify and describe at least 5 most important resources used in the project.

5.What was the alternative approach for the project (i.e. if the stadium had not been built, what else could have been done to ensure the olympics still occurred)?

6. Based on (5) above, was building the stadium at this location and at this time the best approach to have been chosen?  Provide rationale using PV, NPV, IRR, B/C. [1 page]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Recruiting methods to use for quantitative research

What are some recruiting methods you could use in quantitative research? What are some of the issues which must be taken into consideration in recruiting? 

I need this answer in 2 pages.

Dont forget to add references please.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now