Vulnerability Assessment & Penetration Test Report

 

Learning Objective – Write a summary report based on a vulnerability scanning report.

Assignment Requirements:

  • Download and review Vulnerability Assessment & Penetration Test Report For eClipse Bank.
  • Write a summary report that includes:
    • Brief descriptions of scanned issues designated as High severity.
    • Suggested corrective actions to correct the deficiencies designated as High severity.
    • For corrective actions that involve modifying user accounts, provide high-level steps describing how to perform the actions in a Windows or Linux environment.

Submission Requirements:

  • Format: Microsoft Word
  • Font: Arial, 12-point, Double-spaced
  • Citation Style: APA
  • Length: 1-2 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RESEARCH PAPER USING organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization. 
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. 
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short? 
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

movie war games

 

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Use at least three sources.  Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business Intelligence week 3

Discussion: I have attached the pdf question which has all the details for discussion

Knowledge and skills paper: Attached the question image.

Please refer to attachments and let me know if u have any questions

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Interactive-Visualizations-and-Dashboards

 

In this assignment, you will build an interactive dashboard to explore the Belly Button Biodiversity dataset (http://robdunnlab.com/projects/belly-button-biodiversity/),  which catalogs the microbes that colonize human navels.

The dataset reveals that a small handful of microbial species (also called operational taxonomic units, or OTUs, in the study) were present in more than 70% of people, while the rest were relatively rare.

Step 1: Plotly

  1. Use the D3 library to read in samples.json.
  2. Create a horizontal bar chart with a dropdown menu to display the top 10 OTUs found in that individual.
  • Use sample_values as the values for the bar chart.
  • Use otu_ids as the labels for the bar chart.
  • Use otu_labels as the hovertext for the chart.

hw01.png

  1. Create a bubble chart that displays each sample.
  • Use otu_ids for the x values.
  • Use sample_values for the y values.
  • Use sample_values for the marker size.
  • Use otu_ids for the marker colors.
  • Use otu_labels for the text values.

hm02.png

  1. Display the sample metadata, i.e., an individual’s demographic information.
  2. Display each key-value pair from the metadata JSON object somewhere on the page.

hm03.png

  1. Update all of the plots any time that a new sample is selected.

Additionally, you are welcome to create any layout that you would like for your dashboard. An example dashboard is shown below:

dashboard_part1

  • Adapt the Gauge Chart from https://plot.ly/javascript/gauge-charts/ to plot the weekly washing frequency of the individual.
  • You will need to modify the example gauge code to account for values ranging from 0 through 9.
  • Update the chart whenever a new sample is selected.

dashboard_part2

Deployment

  • Deploy your app to a free static page hosting service, such as GitHub Pages. Submit the links to your deployment and your GitHub repo.
  • Ensure your repository has regular commits (i.e. 20+ commits) and a thorough README.md file

Hints

  • Use console.log inside of your JavaScript code to see what your data looks like at each step.
  • Refer to the Plotly.js documentation when building the plots.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lab computer science

 

For this lab you will implement a Java program that uses several different data types and operators.

  1. Start Apache NetBeans.
  2. Create a new project called Lab 3.
  3. Add a java main class called yourlastnameLab3.java with your last name to the project and csci1011.lab3 as the package name
  4. Your program must have the following comments at the top of it

// <your name here>
// Sample program to calculate the value of a deposit
// after a year of earning interest.
// CSCI 1011 Lab 3

  1. It then should show a welcome message
  2. It then prompts the user to enter an initial deposit amount
  3. It reads the initial deposit value and assigns it into a double variable.
  4. Program then updates the new value of balance by using the following formula:

balance = balance + (balance * 0.049);

  1. Then the program will show a message like:

With a 4.9% APR your deposit will be worth $Y in one year.”

  1. Instead of Y you must show the value of balance variable.
  2. Run the program and test it with sample input. Do this several times.
  3. Modify the program so it uses a named constant in place of 0.049.
  4. Run the program and test it to see if it gives the same values.
  5. Modify the interest rate to 0.059.
  6. Run the program again and test it to see the values it gives have changed.
  7. Did you change the output so it now says 5.9%? If not make that change and run the program again.
  8. Since it would be easier not to have to change the program in two places, declare a new double variable called percent and set its value to 100 times the interest rate.
  9. Modify your output statement so it uses the percent variable instead of 5.9.
  10. Run the program again and test it to make sure it still works properly.
  11. Add some additional statements to compute what the balance will be after a second year of earning interest and display this result along with the original result.
  12. Run the program again and test it to make sure that the new code works.
  13. Here is an output of the program:

Welcome to (your name)’s interest calculator

Please enter your initial deposit amount:

10

With a 5.8999999999999995% APR your deposit will be worth $10.59 in one year.

With a 5.8999999999999995% APR your deposit will be worth $11.21481 in two years.

  1. Upload the file yourlastnameLab3.java to the drop box folder labeled Lab 3.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 5

 

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 2 – Apply: Challenges for Fixing Vulnerabilities

Assignment Content

  1. Review the “Challenges for Fixing Vulnerabilities” Team activity.

    Create a table comparing 10 of the vulnerabilities, threats, and risks for the real-world security incident discussed by the class (Verizon DBR) , along with related vulnerabilities that may have contributed to the security incident.
    Include the following as at least 3 of the comparisons used in the table:

    • How was the vulnerability detected?
    • What protocol was attacked?
    • What steps were taken to resolve the vulnerability?
    • Write a 1- to 2-page narrative explaining trends shown from the table.

      ** Waring this assignment has two parts **

      Part 1 – Table 
      Part 2 – Narrative 

      Narrative checklist:

    1. The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count) 
    2. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    3. Include at least one references that are properly cited 
    4. Any images must have a caption and referenced in the paper. 
    5. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points   
    6. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Assignments (Malware Attacks and Online Interactions)

 Assignment #1

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.  

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.  

Complete the following in your outline: 

  • Provide details of the malware. 
  • Identify the exploited vulnerability and its attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Note: You will use content from this #1 assignment as part of the #2 Signature Assignment

Assignment #2

Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.  

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.  

Include the following information in this section: 

  • Describe 2 threats this interaction poses on the company.
  • Provide step-by-step instructions on how to mitigate each interaction. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Combine This assignment #2 with your revised assignment #1 – 

Apply: Malware Attacks sections of your Playbook

Cite at least 2 resources to support each assignment.

Format each assignment according to APA guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING

 

This assignment consists of two parts:

Part 1: SLP Assignment Overview

When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.

Part 1 SLP Assignment Expectations

The Prototype should address the following requirements:

  • The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
  • A basic visual interface to support navigation of the program and identify the future functionality of the application.
  • No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docxthat describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
    • This document should also provide a summary of how the prototype shows proof-of-concept for the project.
    • Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Part 2: SLP Assignment Overview

For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.

Part 2 SLP Assignment Expectations

The Alpha version should address the following requirements:

  • The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
  • All major functionality should be operational at least at a minimal level.
  • Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
  • The visual interface should provide access to all major functions of the application.
  • There should be a demonstrable, functional connection to the required database for the project.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docx that describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    • Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now