ITAS 465

 

During this week’s LabSim modules you learned how to apply scanning techniques to perform an internal scan, external scan using Zenmap and scan with Nmap Scripts. Compare and contrast results. Perform Enumeration with NMAP and Metasploit and compare and contrast results and apply enumerations countermeasures to prevent zone transfer.

For the Unit 3 individual project submit a 3 page MS Word document that will include screen shots of your LabSim course outline showing completion of all of the nodes in the following modules and provide a 300-500 word summary of your lessons learned from completing these modules.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

dis 4 micro

 

Windows 10 allows users to customize their desktop preferences.

For the purpose of this discussion, consider a scenario where you manage more than 100 Windows 10 devices and are asked to provide input on allowing users to customize items such as the Start Menu.

  • What settings should you allow users to change, and what settings should be controlled by the system administrator?
  • What are the advantages and disadvantages?
  • How does the industry of the organization play a role in your answer?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

vuln assesment 2

 

Congratulations! Your boss, Judy “Mac” McNamara, thought you did a great job on your Vulnerability Management Process recommendation and analysis of the OpenVAS vulnerability report. However, the boss doesn’t think the free OpenVAS tool will provide the high-level presentation reporting and support needed by Mercury USA. Now, Judy would like you to evaluate the leading commercial vulnerability scanner, Nessus. Fortunately, Judy had asked someone in the IT department to install and configure a 30-day evaluation copy of Nessus. She hands you a recent Nessus report from IT that has a few more systems added, and with a wry smile adds, “It looks like there’s some really bad stuff in there!”

Judy would like you to provide an analysis of the report. You decide to highlight what you think the company should address first and how you would mitigate some of the top threats. In addition, Judy wants to know your thoughts on Nessus, since it’s expensive. You now realize that you need to ensure due diligence has been performed before making a purchase recommendation to executive management.

This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.

You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.

 

Delete the instructional text from the template before you submit.

Project overview:

 

Mercury USA is a small- and medium-sized business (SMB) in the transportation sector with 400 employees. 

You’ve just been hired by Mercury USA as the first cyber threat analyst on the team and will work within the existing Information Technology department. Mercury USA has an urgent interest in addressing security vulnerabilities.

Judy “Mac” McNamara, the manager of IT services, said the chief executive officer (CEO) recently learned via a mandatory breach disclosure that a competitor was a victim of ransomware. The firm in question lost a significant amount of intellectual property and customer data and is facing expensive litigation, government fines, and loss of customer confidence. These issues are likely to result in bankruptcy.

Thus, executive management would like to prevent Mercury USA’s critical data (e.g., order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software) from falling into the wrong hands and threatening the survival of the business.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

dis4

 

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

Looking ahead to Project 2’s VM Scanner Background Report (due at the end of Week 5), you will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

vul dis 6

 

During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.

For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:

1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:

  • Kali
  • Metasploit
  • Nessus
  • Nmap
  • Process Explorer
  • Splunk
  • Wireshark
  • Any other tool used in the course

2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?

3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Q) Hash tables (8 points)

This question looks at the behavior of the hash() method in the hash symbol table classes LinearProbingHashST and SeparateChainingHashST. You are given the following list of twelve strings:

  • Erdos
  • eRdos
  • erDos
  • erdOs
  • erdoS
  • erdos
  • Knuth
  • kNuth
  • knUth
  • knuTh
  • knutH
  • knuth

Note carefully which letters are upper case and which are not.

  1. Applying the hash method in either of the classes named above (it’s the same method in both) and which we often discussed in class, write two lists. The first contains each string and its hash value when the table size is 29 and the second contains each string and its hash value when the table size is 30.
  2. Assuming the strings are inserted into a linear probing hash table in the order given, what is the index where each ends up in each table? Again write two lists. The first contains each string and the index where it ends up in the table of length 29. The second contains each string and the index where it ends up in the table of length 30. Please list the strings in increasing order by index, not in alphabetical order by string.

As an example of what the lists should look like, here are the lists for a table of size 31.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 10 Assignment – Contingency Plan

Scenario

KION Group is a global material handling Equipment Company based  in Germany. Forklift trucks and warehouse automation equipment are the  company’s main products. KION Group needs to prepare for the prevailing  computer incidents of today and tomorrow. An organization can assist in  developing a computer incident response team (CIRT) plan for a number of  computer-based safety incidents.

This assignment will discuss a CIRT plan, which is often used as a  contingency plan for the KION Group. A system administrator noticed  yesterday that several of the file servers at HQ were responding very  slowly. The KION Group headquarters (HQ) handles all incidents so that  the plan will have its roots at HQ.

Like the latest IBM Threat Intelligence Index, read a recent  article to gather information on current threats and remember to  leverage the BCP and DRP you generated for the organization last week.

Instructions

Write a 5–6 page paper in which you:

  1. Describe the purpose and primary elements of a CIRT plan.
  2. Discuss the relationship between a CIRT plan and risk management.
  3. Discuss the five Ws (who, what, where, when, and why) found in a  CIRT plan in regard to the incident given in the above scenario.
  4. Explain how KION Group can leverage its BCP and DRP to develop and support its CIRT plan.
  5. Explain how you think threats will evolve to impact KION Group  in the future and how the CIRT plan should be updated to combat them.
  6. Discuss at least five best practices to follow when creating a CIRT plan.
  7. Use at least two quality resources in this assignment. 

The specific course learning outcome associated with this assignment is:

  • Develop a contingency plan for the sample organizations to include: business continuity, disaster recovery, and incident response.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Life Cycle Steps

 

Respond to the following in a minimum of 175 words:

  • Discuss the differences between the systems development life cycle (SDLC) and the security life cycle.
  • Include in your discussion both management and non-management IT security positions that perform security life cycle steps and briefly describe their role.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion – Theory

Discuss the theoretical framework you think helps explains your topic and problem you will address in your dissertation. Remember, this will also be cited in the literature as well, so make sure to include scholarly resources from a peer reviewed journal. 

Topic :  The Smart Phone as a Dangerous Technology  

APA format with references needed. 500 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Foundations of Emergency Management: Point Paper

 Topic: Threat of a hurricane to the Gulf Coast or East Coast area of the U.S. 

Instructions:   

The content of your paper must be at least 7 pages in length (double-spaced, Times New Roman 12 font), not including cover page, references, appendix, tables, etc. The format of the paper must include: 1) submit in Word document and not PDF; 2) a Cover page, which must include the title of the paper, your name, date of submission, and course name; 3) an Abstract or Introduction, which states the purpose of the paper; 4) Sub-headers for each topic as prescribed by the Guidelines listed below, which also serves as the evidence to be graded; and 5) a Conclusion, which summarizes your research findings, and includes comments of your personal perspective about the topic. The research paper must include a minimum of five (5) references, which must be properly cited using APA (7th edition) guidelines. Never use Wikipedia, which is unacceptable. All papers are filtered by Canvas through Turnitin (https://www.turnitin.com/). Evidence of plagiarism will result in a failing grade. You may also lose 10 points every day the paper is late. Follow the instructions carefully to earn a good grade.

First, conduct thorough research for the ‘Topic’, and be sure to use/cite a minimum of five (5) reference sources > APA 7th edition, citation/bibliography format. (10/10)  

Second, consider the hazard in relation to the setting and the probability of a future occurrence based on history as described in the readings of the textbook (Chapters 1 & 2): sub-header > History of Hazard. (20/20) 

Third, apply the principles of mitigation and planning considerations to the topic as described in the readings of the textbook (Chapter 3): sub-header > Principles of Mitigation. (20/20) 

Fourth, outline a community planning and preparedness program, and include the purpose and need of timely and accurate communication as mentioned in the textbook (Chapters 4 & 5): sub-header > Community Preparedness & Communication. (20/20) 

Fifth, provide an overview of the principles of Response and Recovery, and include significant factors necessary promote and enhance communication, collaboration, and cooperation as mentioned in the textbook (Chapters 6 & 7): sub-header > Principles of Response & Recovery. (20/20)

Lastly, must include the following: Cover page, Abstract, Conclusion, Sub-headers, Bibliography, spelling/grammar/punctuation; references cited; APA 7th edition format. (10/10)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now