INT 1010 assignment 7

  Please complete the steps below and upload your Excel workbook assignment under Chapter 7 Assignment Submit Here.

  1. Open a blank Excel workbook
  2. Create the following headers in row 1
    1. Class Date
    2. Topic of the week
    3. Assignment
    4. Due Date
    5. Possible Points
    6. Points Earned
    7. Grade
  3. Format Class Date column with MM/DD/YY format
  4. Format Due Date column with MM/DD/YY format
  5. Format Possible Points column as a Number with 0 Decimal Places
  6. Format Points Earned column as a Number with 0 Decimal Places
  7. Format Grade as a Percentage with two decimals
  8. The calculation for the grade column is Points Earned divided by Possible Points.  Complete for each topic. (use formulas)
  9. Enter a Row for assignment per the detailed schedule
  10. Enter all the Points Earned in the Points Earned Column (use formulas)
  11. Calculate the Grade for each Points Earned in the Grade Column (use formulas)
  12.  Add the sum of the column labeld Possible Points (use formulas)
  13. Add the sum of the column labeld Points Earned (use formulas)
  14. The Grade Column is the calculation for the sum of all Points Earned divided by the sum Possible Points (use formulas)
  15. Save the file as Excel_Database_StudentFirstandLastName and submit.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 1: Global Economic Summit Step 1: Complete the Preparatory Exercises

 

Resources

Lab Instructions

Preparatory Lab Exercises

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty.)
  • SubType: ELM Cyber (CBR/CST/DFC/CYB)
  • SubType Detail: Pick the category that best fits the issue you are experiencing.
  • Email: Type the email that you currently use for classroom communications.

In the form’s description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.

https://vdi.umgc.edu/Citrix/UMGCWeb/

https://leocontent.umgc.edu/content/dam/course-content/tgs/cyb/cyb-670/document/PreparatoryLabExercise.pdf?ou=622385

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Nations Behaving Badly Step 11: Analyze Cyber Defense Information

 This step includes a mandatory lab exercise. The teams should work together on the exercise, relying on each other’s expertise in the subject area of the exercise. The findings will be included in your team’s Security Baseline Report.

The attack continues. Now the CIO reports high-volume activity shutting down web access to the summit and to the attending nations’ government websites. In addition, the volume impact has also caused latency in third-party websites whose processes and data sharing are linked to the summit and to the nations’ government websites.

Your team now enters Workspace to analyze the .pcap files the CIOs had provided. You will analyze the .pcap files to understand some of the conditions that may have led to this high-volume traffic, an apparent DoS attack.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty.)
  • SubType: ELM Cyber (CBR/CST/DFC/CYB)
  • SubType Detail: Pick the category that best fits the issue you are experiencing.
  • Email: Type the email that you currently use for classroom communications.

In the form’s description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.

Compile screenshots and your analyses of the DoS events affecting the summit, the nations’ government web pages, and third-party websites as well, where relevant. Maintain your Wireshark packet analysis for any future investigation

https://leocontent.umgc.edu/content/dam/course-content/tgs/cyb/cyb-670/document/NetworkDefense.pdf?ou=622385

https://vdi.umgc.edu/Citrix/UMGCWeb/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Nations Behaving Badly Step 15: Develop Final Forensic Report

 

There are many digital forensic tools and techniques available to conduct an end-to-end forensic investigation. An end-to-end investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used during the attack, and who was attacked. A typical investigation will involve visual analysis to statically review the contents of any drives, as well as dynamically review logs, artifacts (strategies for handling digital artifacts), and internet activity from the web history associated with the breached network (web browser forensics).

The investigation concludes when the investigator examines all of the information, he or she correlates all of the events and all of the data from the various sources to get the whole picture, and prepares reports and evidence in a forensically sound manner.

In this scenario, you know that there has been an attempted/successful intrusion on the network, and you have completed the packet capture analysis using Wireshark. Your task is to write a Final Forensic Report that summarizes network forensics and the digital forensic tools and techniques for analyzing network incidents. This report will include your lab report from the previous step and should also be composed of network attack techniques, network attack vectors, and a comprehensive comparison of at least five tools used for analyzing network intrusions. This report will conclude with a recommendation for network administrators to meet the goals of hardening the infrastructure and protecting private data on the network.

Submit the Final Forensic Report for review and feedback. 

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

  • Click Activities and Assessments in the top navigation bar.
  • Click Assignments.
  • Select the relevant assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project 2: Nations Behaving Badly Step 16: Deliver to Your CISO

 

As a synthesis of the previous steps in this project, you will now submit the following for grading a packaged deliverable to the CISO that contains the following:

  1. Cybersecurity Risk Assessment including Vulnerability Matrix
  2. Incident Response Plan
  3. Service-Level Agreement
  4. FVEY Indicator Sharing Report
  5. Final Forensic Report

Based on the feedback you have received, you should have revised the deliverables. Although many of these deliverables were initially developed in a team setting, each team member is responsible for submitting his or her own documents for individual assessment.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 4.4: Demonstrate diversity and inclusiveness in a team setting.
  • 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards.
  • 5.8: Apply procedures, practices, and technologies for protecting web servers, web users, and their surrounding organizations.
  • 6.1: Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.
  • 8.1: Employ ethics when planning and conducting forensic investigations, and when testifying in court.
  • 8.2: Incorporate international issues including culture and foreign language to plans for investigations.

Take Action

For this assignment, each team must designate a member who will submit the initial deliverable for the team. Other team members must submit their assignment folder entries for this deliverable in order to receive a grade and feedback. To avoid confusion, please add a comment to your submission, e.g., “I am a member of team [xyz]. [Student name] will submit the deliverable for our team.”

Revisions should made be made as a team and resubmitted using the same process. However, if a team member disagrees with the team’s deliverable, he or she is allowed to submit a separate revision based upon the original deliverable.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

  • Click Activities and Assessments in the top navigation bar.
  • Click Assignments.
  • Select the relevant assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

R Studio

 Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria.  She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or      NY?  Done
  2. Is the crime rate higher in FL or NY (Note a low score      in crime means lower crime)?  Done
  3. Is the crime rate higher in lower or higher house price      areas?  Done

Using the R tool, show the data in the tool to answer each of the questions.  Also, show the data visualization to go along with the summary.

  1. If you were Suzie, where would you move based on the      questions above? Done

Need the below done ONLY

  1. After you gave Suzie the answer above (to #4), she gave      you some additional information that you need to consider:
    1. She has $100,000 to put down for the house.
    2. If she moves to NY she will have a job earning       $120,000 per year.
    3. If she moves to FL she will have a job earning $75,000       per year.
    4. She wants to know the following:
      1. On average what location will she be able to pay off        her house first based on average housing prices and income she will        receive?
      2. Where should she move and why?  Please show        graphics and thoroughly explain your answer here based on the new        information provided above.

Note: The screenshots should be copied and pasted and must be legible.  Only upload the word document.  Be sure to answer all of the questions above and number the answers.  Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Whistleblower Cybersecurity Crisis Training: Stakeholder Press Conference Exercise (Edward Snowden)

 

Whistleblower

Cybersecurity Crisis Training: Stakeholder Press Conference Exercise (Edward Snowden)

Purpose: This exercise is designed to give you practical experience in handling real-life cybersecurity threats or attacks for their organization. Through this exercise, you will better understand how the types of cyber-attacks described in class are applied, take a shot at forming policy solutions, and sharpen you communication skills.

Deliverables: Prepare a sample press packet.  This press packet should include the following items:

Press Release (1 page)

Short technical background sheet (1-2 pages)

•  This section should describe in more detail the technical issues of the problem at hand.  It may also include pictures and diagrams.

Frequently Asked Questions (1 page)

•  This section should anticipate questions other stakeholders or the media would ask in response to the problem and should provide your organization’s answers.

Preparation:

Read the material found via the links below. Additional research on stakeholder positions is strongly suggested as well. You may use any resource you deem necessary to prepare your statement, press kit, and for Q&A.

Potential roles:

There are two important stakeholder roles in this cybersecurity legal case. You may choose to take on one of two different roles:

•  US Citizens

•  U.S. National Security Agency

Select one of the following scenarios

Scenario: A 36-year NSA veteran, William Binney resigned from the agency and became a whistleblower after discovering that elements of a data-monitoring program he had helped develop — nicknamed ThinThread — were being used to spy on Americans.

William Binney FRONTLINE’s Interview Dec. 13, 2013.

Scenario: Mark Klein was among the first to expose the NSA’s domestic wiretapping efforts. The former AT & T technician watched the construction of the secret switching room at the telecom’s facility on Folsom Street in San Francisco

NSA Leak Vindicates AT&T Whistleblower

Scenario: Daniel Hale, a former National Security Agency (NSA) official has been charged with giving classified documents on drone warfare to a journalist.  Hale, 31, was indicted by a grand jury on five charges relating to the alleged leak. Each charge carries a maximum 10-year prison sentence. The US justice department said Hale was arrested.

Ex-NSA official charged with leaking classified drone documents

Scenario: Thomas Tamm stumbled upon the existence of a highly classified National Security Agency program that seemed to be eavesdropping on U.S. citizens. The unit had special rules that appeared to be hiding the NSA activities from a panel of federal judges who are required to approve such surveillance. Tamm exposed the Bush administration’s domestic warrantless eavesdropping program that intercepted private email messages and phone calls of U.S. residents without a court warrant.

The Whistleblower Who Exposed Warrantless Wiretaps

Whistleblower Facing Ethics Charges Over NSA Leak

Scenario: Edward Snowden leaked classified information from the NSA in 2013 when he was contractor employee for the CIA.  The documents disclosed global surveillance program by the NSA and the Five Eves Intelligence Alliance working with telecommunication companies and European governments.

Edward Snowden, Whistle-Blower

Assignment: Your assignment is to explore one of these incidents further, using your research to present it from the perspective of your assigned stakeholder. Your goal is to hold a press conference which explains the controversy and your organization’s future plans or suggested policy changes in response to it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 4 – 1

This week we focus on establishing your editorial thinking.  What does the author mean by editorial thinking?  Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic. In response to peers, add to their thoughts on the video and their topic.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 4-2

????Week 4 Discussion 2 Week 4 Discussion 2When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Project

You will be designing and creating a DBMS for the field of Healthcare. You will be creating SQL queries based on common queries that a common end-user would make to a healthcare system. In addition, identify when to use No-SQL. Not only are you building multi-table databases for different components of a healthcare system, but you will also incorporate and create image databases that store real and publicly available health data like cancer images and how databases play a role in building machine learning models.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now