Week 2- Apply: Malware Attacks

Assignment Content

  1. Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams; all of which make it easy to follow troubleshooting instructions.

    Throughout the next four weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

    Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

    Include the following information:

    • Details of the malware
    • The exploited vulnerability and its attack vector
    • Two risks of this malware
    • Step-by-step instructions on how to resolve the malware attack
    • Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

      Cite at least two resources within the assignment in APA format.

      Submit your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Golang chat server using Go Rpc Package

  

Requirements of Chat Server Go program:

1.  The program must be written in Go.

2. The server should be able to read short messages from clients concurrently (at the same time) and enable other participants to respond quickly. The communication should be similar to that of a spoken conversation, unlike apps such as those for forums and email.

3. Let multiple people talk at the same time on the Chat server.

4. Anything said is seen by everyone unless the sender specifies that the message is a PM (private message) and names the receiver.

5. Make the chat app extensible. To add more features we should be able to implement and export a server-side method and write a client stub which calls the exported method over RPC.

6. Test your program to see that the Request and Reply, and the PM work. Use the Go Testing program for doing this.

7. User Requests should include a Request to join the Chat Room, get and display unseen messages including PM.

8. Use the Go RPC package for implementing remote procedure calls in Go including the implementation of a client-server interface with the server by the client.

9. Register the program with an HTTP handler in the RPC package and turn the terminal program into a Web Service that handles HTTP requests through a TCP Listener. See HandleHTTP and DialHTTP in Go RPC package. 

Submit the Go source code, a ReadME file with the compile and run options that you use, and submit a file containing the sequence of input strings that you use as client messages to the Chat server. Zip the files submitted into one .zip file using 7-zip.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

1-1 Discussion: Jurisdiction and Venue in Cyberspace

 

1-1 Discussion: Jurisdiction and Venue in Cyberspace

After reading about the origin of the internet in the textbook, discuss how difficult it is to determine who has jurisdiction over the internet and the global implications.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business networks

 In chapter 6, the author describes basic components of a business network. Create a new thread, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Omnet++ Assignment

Wired Network Performance Consider a wired network model (OMNET++) using a Gigabit Ethernet (GbE) backbone switch linked to several Ethernet sub-switches (also called subnet) so that large number of wired nodes/clients can be accommodated to the network. For example, one subnet can support up to 20 nodes (for optimum performance). So, if you are simulating a network with 100 nodes in total, your network model should have 5 subnets linked to a GbE backbone. Simulation parameters: 

• Number of nodes/clients: 100 

• Simulation time: 3600 Sec (longer required for Video streaming)

• Traffic type: Video streaming

 • Packet type: UDP packet 

• Performance metrics: 

(a) Video Throughput; (b) Video End-to-end delays; (c) Video packet losses. 

[Hint: Video streaming uses UDP transport layer protocol, and hence UDPVideoStreamCli, UDPVideoStreamSvr can be used for video client and video Server, respectively.] Investigation: Effect of increasing the number of video clients on system performance You may use the following table to record your simulation results. 

Analyse the results (including model validation) and write your report (4-6 pages) by summarising your research findings. 

Hint: You can draw several graphs including number of clients versus video throughput, end-to-end delays, and packet losses.

General Report Format Cover page: Assignment title, student’s name, and ID Introduction: What, why and how? – Begin your report with a clear objective (What!) of your assignment. Explain why this assignment/research is needed and how you have completed it. Outline the structure of the rest of the report. Modelling the network: Describe the model that you have developed using appropriate screenshots for models and subnet (hint: avoid unnecessary screenshots). Results and Analysis: Summarise your simulation results using tables and/or graphs (Excel or Matlab graphs) and provide a comparative analysis. Model Validation: Discuss how you have validated your simulation results. Lesson learned: Write a paragraph or two, reflecting on your own learning. Conclusion: Summarise the main findings and future research directions. References: List at least 5 references that you have used in the report. Report Length: (Part 1: 4-6 pages; Part 2: 10-14 pages) Spacing: 1.5 Font: 11 Times New Roman.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

data structures and algorithm

In this programming assignment you are asked to expand the SortedArrayList data structure we

have developed in class by adding the following new methods:

 void IncrementItems(T aValue)

– Function: Increments all lists’ values by aValue.

– Precondition: List has been initialized

aValue has been initialized

– Postcondition: Function value = elements of the list have their info incremented

by a Value.

 int CountEven()

– Function: Returns the number of elements that appears an even number of

times the list.

– Precondition: List has been initialized

– Postcondition: Function value = number of even integers in the list.

 void ReverseOrder ( )

– Function: Reverses the order of the list’s elements.

– Precondition: List has been initialized.

– Postcondition: Function value = elements changed to descending order, if

elements are in ascending order, and vice-vers

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack

Article:

             Reading Assignments       

Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security  Risk Management With Bounded Rationality in the Internet of Things. IEEE  Transactions on Information Forensics and Security, 14(11), 2958-2971.

Borek, A. (2014). Total Information Risk Management: Maximizing the  Value of Data and Information Assets (Vol. First edition). Amsterdam:  Morgan Kaufmann 

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=e000xna&bquery=Total+Information+Risk+Management%3a+Maximizing+the+Value+of+Data+and+Information+Assets&type=0&searchMode=And&site=ehost-live&custID=s8501869&groupID=main&profID=ehost  

The readings this week discusses broad context of risk and  investigative forensics. Part of risk management is to understand when  things go wrong, we need to be able to investigate and report our  findings to management. Using this research, or other research you have  uncovered discuss in detail how risk and investigate techniques could  work to help the organization. ERM helps to protect an organization  before an attack, where as forensics investigate technique will help us  after an attack – so lets discus both this week.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

It243-2 System analysis and design

1-The Packaged Software has a property, “Rarely a perfect fit with business needs”. What do you mean by this property? Explain in your own sentences.

2-In terms of client-server architectures, can you explain the difference between the two-tier, three-tier, and n-tier?
3-Visit a commercial Web site (e.g., CDnow, Amazon.com).  If files were being used to store the data supporting the application, what types of files would be needed?  What data would they contain?
4- Distinguish between transaction structures and transform structures on a structure chart. Can we have one module that will be a part of both types of structures? Satisfy your answer.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Infer Stats in Decision-Making (DSRT-734)

 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is Cyber Security or any Security IT-related and peer-reviewed, academic research piece.   Four pages requried and the paper should cover the basic guidelines.  Must submit original work and plagiarism should be less than 20%.

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber Law- week 5 Discussion

 When asked if you “accept the terms” of downloaded software, describe how clicking “yes” indicates you have entered into a contract. Discuss whether you have ever read these terms of use before you clicked and what the terms say. 

Post should be 500 words and add references in APA format. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now