Viruses in Mac vs Windows

Geri’s post reminded me about viruses in Mac Vs Windows. From time to time I hear from students about how Macs tend to get fewer viruses. Why do you think Windows has a bad rep with viruses and hacks? Is there a reason for being attacked more than a Mac? Are Macs more secure than Windows? What are your thoughts?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CVE vs NVD

  

CVE vs NVD

Description: In this project, you will explore both CVE and NVD.

Submission: Answer the following questions and upload to the Blackboard Assignments tab.

Vulnerability feeds are available to provide updated information to scanning software about the latest vulnerabilities. One of the most highly regarded vulnerability feeds is the Mitre Common Vulnerabilities and Exposures (CVE). 

1. Open your web browser and enter the URL https://cve.mitre.org/.

2. Hover over About and click on About CVE

3. This page gives a brief overview of CVE. Read through the information regarding CVE. 

a) In your own words, how would you describe it? How does it work? What advantages does it provide?

4. Next Hover over About, click FAQs, and click on CVE Records

a) Describe the three elements that make up a CVE Entry.

Now that you have a better idea of what the CVE list is designed for let’s use it to cross-reference a current security situation in the United States. The SolarWinds massive security hack took place throughout 2020. This attack compromised thousands of US government-owned systems, among countless other systems where the software was integrated.

SolarWinds has been a highly valued company for many years and is known for some of the best Network Management software on the market. SolarWinds is a top performer in their field. The Orion platform, which they produce, is designed to manage many different infrastructure areas under the hood of a single piece of software. Orion is what was in the heat of the controversy. The SolarWinds actual supply chain was compromised, and a nation-state threat actor was able to insert a modified .dll file into their source code repository. When updates got pushed out to their users, the infected files were then brought over to systems worldwide.

At that point, the remote attacker could bypass authentication and execute API commands on the software. Linked below is a high-level overview of how the attack took place. I recommend reading the article, it’s very interesting. 

https://www.fortinet.com/blog/threat-research/what-we-have-learned-so-far-about-the-sunburst-solarwinds-hack

Search for the SolarWinds Orion vulnerability in the CVE database.

5. Navigate back to the CVE Mitre site and scroll up to the top of the page. Click Search CVE List.

6. Search “SolarWinds Orion” to display the CVE entries.

7. Locate CVE-ID: CVE-2020-10148 and click into it. The CVE will provide a brief overview of the vulnerability and provide references supporting its release. A lot of the time this will be an official statement provided by the company.

8. Under References click on “CONFIRM:https://www.solarwinds.com/securityadvisory” to read more about the advisory notice released by SolarWinds along with fixes. 

9. Navigate back to the SolarWinds CVE record. Notice next to the CVE-ID it says, “Learn more at National Vulnerability Database (NVD)” This is where you can find more detailed information and version numbers of the software that has been affected. Click on the “Learn more at National Vulnerability Database (NVD)” to view this database and how it relates to the CVE.

The National Vulnerability Database (NVD) is managed by the U.S. government as a repository for security checklists, vulnerability management data, software flaws, misconfigurations, product names, and their impacts. This data enables automation of vulnerability management, security measurement, and compliance.

10. Navigate to the National Vulnerability Database home page. https://nvd.nist.gov/ 

11. Click the plus sign next to General.

12. Click FAQ.

13. Click General FAQs.

14. Read through the material. 

a) In your own words, how does the Mitre CVE compare with the NIST NVD? 

b) When would you use the CVE? 

c) When would you use the NVD? 

d) How frequently is the NVD updated? 

15. Return to the home page and again click the plus sign next to General.

16. Click NVD Dashboard to view the latest information. 

a) Do the numbers surprise you? 

b) How does the number of vulnerabilities under the score distribution compare? 

c) How many CVEs were received and processed today?

17. Scroll through the Last 20 Scored Vulnerability IDs & Summaries. 

a) Have you heard of any of these vulnerabilities? 

18. Return to the home page and again click the plus sign next to General.

19. Click Visualizations to display graphical information.

20. Click Vulnerabilities – CVE.

21. Click Description Summary Word to display a bar graph of the most common words used as part of a vulnerability description. Hover over the three highest bars to view the three most frequent words used. 

a) List the top three most frequently used words in a vulnerability description.

22. Return to the NVD Visualizations page: https://nvd.nist.gov/general/visualizations. Click Products – CPE. 

a) Which vendor has the highest number of total products that appears in the NVD? 

View other vendors by hovering over the bars. 

a) What do you find interesting about this distribution?

23. Return to the home page. https://nvd.nist.gov/ and click the plus sign next to “Other Sites”.

24. Click Checklist (NCP) Repository.

25. This page displays a form you can use to search for checklists, benchmarks, and secure configuration guides. This repository provides guidance on applying these security configurations and best practices to operating systems and applications. 

Now let’s look at the Department of Defense (DOD) recommend best practices for applying and modifying Group Policy Objects on Windows Server 2019. 

Group policy is what defines user/computer configurations and security access of an operating system. These group policy objects (GPOs) control what the computer is allowed to do and what the user is allowed to do in the OS. 

26. Click the target dropdown box and select Microsoft Windows Server 2019. Click search

27. Under resources click on Group Policy Objects (GPOs)- July 2022.

28. Download the check list resource and unpackage the zip file by double clicking on it. Open the folder.

29. Open the DoD Windows Server 2019 MS and DC v2r4 folder. Open Reports folder.

30. Open: DoD Windows Server 2019 Member Server STIG Computer v2r4.html

31. Under Computer Configuration expand Security Settings expand Account Policies/Password Policy. This is the recommended password guidance for the most secure environment. It shows the recommended length and setting that should be applied to Windows Server 2019. This is just one example of many thousands of GPOs that can be imported into any OS. By adopting and applying these policies to an operating system, you are creating a more secure environment. 

32. Finally navigate the GPO list and find three other policies you find important from this list.

a)  

b)  

c)  

33. Close all windows.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

outline of the article

 Re-create an outline of the article provided for this week’s assignment.  What guideline/outline would the authors of this article have created before they started to write the article.  Your outline of this article would include the various sections of the paper such as an abstract, keywords, introduction etc. as well as subheadings, and mention any figures/tables which were included in the article but do not actually include them in your outline.  Very briefly summarize what information is in each section/subheading in no more than 2 sentences. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Mobile Device Use

Mobile devices

  • What are the most used features in your mobile device?
  • What is your favorite app and why?
  • Have you used AirDrop, Google Drive, Dropbox, or other cloud based file systems? I have used them all.  How do you use them?
  • What is your experience with virtual assistants such as Google, Siri, or even Alexa?
  • What is the best way to secure your mobile device? I use my digital security password, fingerprint & facial recognition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Virtues in Global Supply Chain Management

  1. What are the objectives of global supply chains?
  2. What are main characteristics of global supply chains?
  3. What is the process view of global supply chains? (Push/Pull)
  4. What are key decision phases in the global supply chain?

main 5 Principles to Consider in Business Partner Selection (Outsourcing) about Biblical Concept of Justice 

250- 300 words with minimum 2 references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Create a risk status report for your company.

 

Module 04 Content

  1. Create a risk status report for your company. Be sure the report shows risks identified and specific actions to be taken. Then, create a simple IT audit process for your company. At a minimum, cover the IT resources or products.

    Your assignment should meet the following requirements:

    • Be 5-6 pages long, not including the cover page and reference page.
    • Conform to APA Style.
    • Support your answers with at least two current scholarly journal articles (not more than five years old). The Rasmussen Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.
    •  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risk mitigation

 

Discuss web applications and risk to an organization. Include at least three examples of where web applications were compromised (such as the SQL injection hack at Qatar National Bank), and how security teams can assess and mitigate the relative risk of insecure web applications.

Your assignment should meet the following requirements:

  • 5-6 pages long, not including the cover page and reference page.
  • Conform to APA Style.
  • Support your answers with at least two current scholarly journal articles (not more than five years old). The Rasmussen Library is a great place to find resources.
  • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CTI

 

Assignment Content

  1. Summarize your threat intelligence findings in a concise and informative 8-page report for your organization.

    Complete the following in your summary:

    1. Identify company details: client, organization, stakeholders
    2. Identify test details: tests performed, dates performed, duration, assets analyzed, categorized threat intelligence types
    3. Include an executive summary:
    4. Summarize the impact of the threats on the organization.
    5. Include direct and indirect threats.
    6. Articulate the traffic light protocol:
    7. Recommend a method for disseminating intelligence in the organization.
    8. Indicate threat risk levels.
    9. Describe the security team: skill sets and size of the team needed to run the threat intelligence program.
    10. Explain the analysis methodology: methods used to collect, extract, process, analyze, and evaluate data.
    11. Describe the threat details: technical information on identified threats.
    12. Identify IoC: specifies indicators.
    13. Summarize recommended actions based on risk analysis.
    14. Cite any references to support your assignment.

      Format your assignment according to APA guidelines.

      Submit your assignment.

       

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion ro

Your job this week is to choose one of the applications from the list available at this link from National Instruments. (Links to an external site.) Once you open the National Instruments link, hover over ‘Solutions’ to navigate to one of the possible solutions using LabView.

Pick one of the applications listed that relate to an area that interests you.

Review the ‘Industry Trends’ to gain an insight of possible and future applications.

Summarize the characteristics of the application to choose from in an initial post to your classmates.

In your original post, answer the following:

  • Be sure your application is not too similar to classmates’. There are many different applications to choose from, so this should not be a problem.
  • Your response should demonstrate critical thinking.
  • Your response must incorporate information attained from one credible resource. Cite your source.
  • Make sure your post is free of grammatical and spelling errors.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

150 WORDS + 50 WORDS SUMMARY

1Q. How can implementing a wireless network be helpful in a disaster recovery event? What type(s) of wireless network would work in this instance? ASAP please(150 WORDS + 50 WORDS SUMMARY)

2Q. Review and consider the pro’s and con’s of 2.4GHz wifi vs. 5GHz wifi, and channel use in each range?(150 WORDS + 50 WORDS SUMMARY)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now