Emerging Threats and Countermeasures

 

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures. 

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • Paper MUST address:  How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles

http://libguides.gwu.edu/education/peer-reviewed-articles

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2: Best Coding Practices

 

You  have been promoted to manager for the e-Commerce site for the company  you made up in Assignment 1. You are concerned about the recent SQL  attack. Your team reacted to the situation by notifying you immediately.  You and your team were successful in containing and correcting the  issues that allowed the Website and database to be compromised by a SQL  injection attack. 

Knowing  that many of the issues can be created by human error, you have decided  to evaluate the processes your team uses when they code. As their  leader, it is your responsibility to be current on all of the best  secure coding practices. Your job is to create guidelines for best  coding practices, which you will present to your team.

For Part I,  you’re going to write a memo to the CEO and CSO documenting your  guidelines based on your findings when you evaluated your company’s  processes. 

  1. Justify why it is less expensive to build secure software than to correct security issues after a breach. 
  2. Outline  the objectives and purpose of your company’s “best secure coding  practices” and explain how it will influence your division.   
  3. Evaluate  which method of the secure software development life cycle will best  serve your team and explain how you plan on implementing your thoughts  into your existing processes. 
  4. Identify  three resources that can be used as “reference material” and act as a  beginner’s guideline for new employees. Outline the importance of each  resource and how each resource can assist new coders.
  5. Use at least four quality references in this assignment. Note:  Wikipedia and similar websites do not qualify as quality references. Be  sure to CITE your sources with complete functioning Web links. Test the  links to ensure they work before submitting your paper
  6. Format your assignment according to the following formatting requirements: 
    • Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include  a cover page containing the title of the assignment, the student’s  name, the professor’s name, the course title, and the date. The cover  page is not included in the required page length.
    • Include a reference page. Citations and references must follow professional business language format.

Part II: PowerPoint Presentation

Create a PowerPoint presentation for your team in which you:

  1. Outline  the all of the major aspects of the Best Practice Coding guideline,  including objectives, purpose, resources, and methodology. Note:  Please include your fictional company’s name on each slide of your  presentation. Remember, you’re planning on using this experience when  you take what you’ve learned out into the real world.

The specific course learning outcomes associated with this assignment are:

  1. Analyze common Website attacks, weaknesses, and security best practices.
  2. Describe the attributes and qualities of secure coding practices and the tools used to conduct security verification.
  3. Analyze the role and importance of quality assurance testing for Web applications using a security lifecycle.
  4. Use technology and information resources to research issues in securing Web-based applications.
  5. Write  clearly and concisely about Web application security topics using  proper writing mechanics and technical style conventions. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ass 6 v

  1. Using a Web browser, search for “incident response training.” Look through the first five results and identify one or two companies that offer such training. Pick one company and look at the course offerings. Locate a course that can train you to create a CSIRT. How many days will that course take?
  2. Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
  3. Visit the Web site at w­w­w­.­f­i­r­s­t­.­o­r­g­/­g­l­o­b­a­l­/­p­r­a­c­t­i­c­e­s. Look for information about best practices contests. When was the last one held and in which city? What value would such a contest have for individuals interested in incident response?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Adobe Muse – Building a Portfolio Website

  MUST HAVE Adobe Muse!!!

Need done in 8 hours

Assignment Instructions:

1. Download the “Adobe Muse – building your first website” PDF from your Lab 5 folder. 

2. Download the Data files for Katie’s Café from Blackboard or use the following link. http://muse.adobe.com/assets/katies-caf%C3%A9-building-v3.zip

3. Save and Unzip the above Data Files to your Desktop.

4. Open the “Adobe Muse – building your first website”

5. Open Adobe Muse Application

6. Using the “Adobe Muse – building your first website” PDF as a guide to help you create a Portfolio Website containing 5 pages.

Page 1: Home (This page should resemble a splash page stating your name, creating a logo, containing an image that defines you, and the navigation bar.)

Page 2: About (This page should written similar to a cover letter.)

Page 3: Resume (This page will display your resume; therefore, find an appropriate way to display your resume.)

Page 4: Portfolio (This page should show your course work or internship projects.)

Page 5: Contact (This page will contain a form that you create, which will allow employers to contact you.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Assignment

  

Exercise 1 [5 points]: 

Create the following classes shown in the UML diagram. Then, create PointTest.java class with main method to test all functionality of these classes. 

 

Exercise 2 [10 points]: 

The following figure shows a UML diagram in which the class Student is inherited from the class 

Person 

a. Implement a Person class. The person constructor takes two strings: a first name and a last name. The constructor initializes the email address to the first letter of the first name followed by first five letters of the last name followed by @tru.ca. If the last name has fewer than five letters, the e-mail address will be the first letter of the first name followed by the entire last name followed by a @tru.ca. Examples: 

  

Name 

Email Address 

 

Jane Smith 

[email protected] 

 

Musfiq Rahman 

[email protected] 

 

John Morris 

[email protected] 

 

Mary Key 

[email protected] 

 

b. Override Object’s toString method for the Person class. The toString method should return the present state of the object. 

c. Now, create a Student class that is a subclass of Person and implements Comparable interface. 

d. The Student constructor will be called with two String parameters, the first name and last name of the student. When the student is constructed, the inherited fields lastName, firstName, and email will be properly initialized, the student’s gpa and number of credit will be set to 0. The variable lastIdAssigend will be properly incremented each time a Student object is constructed and the studentId will be set to the next available ID number as tracked by the class variable lastIdAssigend. 

e. Override the object’s toString method for the Student class. The toString method should return the present state of the object. Note that it should use the toString() method from its superclass.  

f. The addCourse() method should update the credits completed, calculate, and update the gpa value. 

Use the following values for grade: 

 

Example GPA calculation: 

GRADE    CREDIT    CALCULATION 

(A) 4.0  x  4    =  16.00 

(B) 3.0  x  4    =  12.00 

(B) 3.0  x  4    =  12.00 

(A) 4.0  x  1    =  4.00 

(C) 2.0  x  3    =  6.00 

GPA = 50.00 / 16 = 3.125; the getGPA() method should return this value. 

g. Students are compared to each other by comparing GPAs. Override the compareTo() method for the student class. Note that to override the compareTo() method, the Student class must implement Comparable interface. 

Now, test your code with the supplied client code (StudentClient.java). Note: You should not modify this client code. We will use the same client code to test your classes.  

Exercise 3 [10 points]: 

In this exercise, you need to implement a class that encapsulate a Grid. A grid is a useful concept in creating board-game applications. Later we will use this class to create a board game. A grid is a two-dimensional matrix (see example below) with the same number of rows and columns. You can create a grid of size 8, for example, it’s an 8×8 grid. There are 64 cells in this grid. A cell in the grid can have any arbitrary value. Later in this course, we will learn how to create a cell that can hold any arbitrary values. However, for the time being, we will assume that the cell-values are non-negative integers. If a cell contains a value ‘0’ that means, the cell is empty. To identify a cell, you need row number and column number, for example, cell (1, 3) means 3rd cell of the 

1st row. You need to create a class that satisfies the following requirements. 

Tasks 

Write tests and code for each of the following requirements, in order. The words in bold indicate message names. Whenever a requirement says the user can “ask whether…“, the expected answer is boolean. Whenever a requirement speaks of a “particular” item, then that item will be an argument to the method. 

1. The user can create a Grid specifying the number of row and column. Also the user can create a Grid specifying the size only. 

2. The user can ask a Grid whether its isEmpty. A grid is empty when all the cells of the grid is empty. 

3. The user can clear all the cells of the grid. It’s a void method. 

4. The user can ask a Grid whether a particular cell isValid. 

5. The user can ask a Grid to set a particular value by setValue to a particular row and col. The grid sets the value only if that cell is valid. 

6. The user can ask a Grid to getValue (in this case integer) from a particular row and col. The grid returns the value only if the locations are valid. 

7. The user can ask a Grid to set part of its row and column with particular values. Example, setCells(int rows[], int cols[], int vals[]), in this method user can specify the indexes of rows and columns that the user wants to set with some particular values (supplied in vals array). Note that, rows, cols, and vals arrays should be of same size. 

8. Make another overridden method for setCells(int rows[], int cols[], int v), that will set particular rows and cols of a grid with a particular value. 

Apart from these basic requirements, feel free to add more behaviors to the Grid class that you think appropriate. Please provide explanation for those behaviors as a comment in the source file. 

Write a test class to test the behaviours of the Grid class and submit the test class as well. 

Note: A grid is composed of many cells. So, you may want to decompose the grid into a Cell class that encapsulates all the necessary behavior of a cell in the grid 

Exercise 4 [10 points]: 

Introduction 

This exercise asks you to implement a small class that will later serve as part of larger programs. You will implement a new kind of number, a BoundedInteger. 

When we write programs to solve problems in the world, we often need to model particular kinds of values, and those values don’t match up with the primitive types in our program language. For example, if we were writing a program to implement a clock or a calendar, then we would need numbers to represent minutes or days. But these numbers aren’t Java integers, which range from -231to 231-1; they range from 0 to 59 and 1 to 31 (or less!), respectively. Java’s base types are useful building blocks, but at the level of atoms, not molecules. 

Tasks 

Write a class for representing bounded integers

A bounded integer takes integer values within a given range. For example, the minutes part of a time takes values in the range [0..59]. The next minute after 59 is 0. The minute before 0 is 59. 

Object creation 

We want to be able to create bounded integers in two ways. 

1. We specify the object’s lower bound, its upper bound, and its initial value. 

2. We specify only the object’s lower bound and its upper bound. The object’s initial value is the same as its lower bound. 

Of course, this means that you need to write two constructors. 

We would like to be able to use bounded integers in much the same way we use regular ints. 

Arithmetic operations 

We would like to be able to: 

• add an int to a bounded integer. 

• subtract an int from it. 

• increment and decrement it. 

A bounded integer “wraps around” when it does such arithmetic. For example, suppose that we have a minutes bounded integer whose value is 52. Adding 10 to this object gives it a value of 2. 

Value operations 

We would like to be able to: 

• ask a bounded integer for its value as an int. 

• change its value to an arbitrary int. 

• print its value out. The way to do this in Java is for the object to respond to toString() message by returning a String that can be printed. 

If we try to set a bounded integer to a value outside of its range, the object should keep its current value and print an error message to System.err. or System.out. 

Comparison operations 

We would like to be able to: 

• ask one bounded integer if it is equal to another. 

• ask one bounded integer if it is less than another. 

• ask a bounded integer if a particular int is a legal value for the bounded integer. For example, 23 is a legal value for the minutes bounded integer, but 67 is not. 

The answer to each of these questions is true or false. 

You may implement these requirements in any order you choose, though you’ll need at least one constructor before you can test any of the others. Write a class to test your code and submit that test class as well. 

Some Suggestions for Coding: 

To write your program, first write a test that expresses what you would like your code to do, and then write the code to do it. Take small steps, and your tests will give you feedback as soon as possible. 

Exercise 5 [15 Points] 

For this exercise, you will design a set of classes that work together to simulate a parking officer checking a parked car issuing a parking ticket if there is a parking violation. Here are the classes that need to collaborate: 

• The ParkedCar class: This class should simulate a parked car. The car has a make, model, color, license number

• The ParkingMeter class: This class should simulate a parking meter. The class has three parameters: 

− A 5-digit ID that identifies the meter. 

− A reference to the car (ParkedCar object) that is currently parked at the meter. If no car is parked, this parameter should be set to null (in this case, make sure to return “Car: none” in your toString method). 

− Whether the meter has expired or not. 

− The current time (you may simulate the current time). 

• The ParkingTicket class: This class should simulate a parking ticket. The class should report: 

− The make, model, color and license number of the illegally parked car. 

− Meter ID 

− The current time. 

− The amount of fine, which is $25 if the meter has expired and the current time is between 9 a.m. and 5 p.m. and $10 if the meter has expired and the current time is between 5.01 p.m. and 8.59 a.m. 

− The name and badge number of the police officer issuing the ticket (DO NOT store ParkingOfficer object). 

• The ParkingOfficer class: This class should simulate a parking officer inspecting parked cars. The class has 

− Officer’s name and badge number 

− isExpired method that examines the ParkingMeter object and determines whether the meter has expired. 

− A method that examines the given parking meter and returns a parking ticket (generates a ParkingTicket object) if the meter has expired. If it is not expired or no car is parked at the meter, return null value. 

You may include instance variables and public interfaces in each class as you may find appropriate. Also add appropriate error checks. 

Write a client program that demonstrates how these classes collaborate. In addition, you should create a UML diagram for demonstrating relationship among the classes and submit that UML as part of your submission. 

Here are some examples of your output. They need not be exactly as shown. Feel free to be creative, but you should test your program for all cases. 

Parking Meter: 34521 Time: 8.00 p.m. 

No car parked. 

Parking Meter: 45673 Time: 4.54 p.m. 

Car Parked: Lexus ES350, Black, ABC123 

Meter: Not expired 

Parking Meter: 98764 Time: 5.01 p.m. 

Car Parked: Toyota Camry, Red, EFL786 

Meter: Expired 

Parking Ticket Issued 

Toyota Camry, Red, EFL786 

Meter ID: 98764 Time: 5.01 p.m. 

Fine Amount: $10 

Issuing Officer: G.Bertrand, IO5674 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws, and the establishment of regulations and policies for access control?

What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws, and the establishment of regulations and policies for access control? Cite such laws, regulations and policies in your particular state.

This discussion should be between 200-to-300 words and it must contain a properly formatted in-text citation and scholarly reference.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISO

  

Choose two of the controls from the ISO 27002 standard and develop a measurement construct for each using the template provided in Annex B of the ISO 27004 standard.  

Choose two of the measurement constructs from Annex B of the ISO 27004 designed to assess the efficiency of an ISMS and discuss which one you believe is more meaningful and why.

-APA

-APPROXIMATE 2PAGES

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Executive Program Practical Connection Assignment

It  is a priority that students are provided with strong educational  programs and courses that allow them to be servant-leaders in their  disciplines and communities, linking research with practice and  knowledge with ethical decision-making. This assignment is a written  assignment where students will demonstrate how this course research has  connected and put into practice within their own career.

Assignment:
Provide  a reflection of at least 500 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of “Business Intelligence and Analytics (Systems for decision support)” course have been applied or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study. 

 Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate  a connection to your current work environment. If you are not employed,  demonstrate a connection to your desired work environment. 

You  should NOT provide an overview of the assignments assigned in the  course. The assignment asks that you reflect how the knowledge and  skills obtained through meeting course objectives were applied or could  be applied in the workplace. 

NOTE:  This research question is an individual assignment and NOT a group  assignment. This is for you to reflect on what you have learned so far  in connection with your present job and if not working as of this  moments, what impact will the knowledge from this class have on your  next employment. 

**FYI, I am working as Software Developer

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Packet tracer

 he topology has 3 major networks: HQ, WORLD and BRANCH as shown in the diagram below. You are NOT allowed to do any modifications in the WORLD. As a result of a recent security breach in the company, there are several problems found in the following areas: A. Routing Protocols (26 marks)  HQ internal network uses RIP for internal and external connections.  Branch internal network uses RIP for internal and external connections.  Every router in HQ should be able to ping every other router  Routers should be configured with a default route You need to identify all the problems with the settings in each router, the impact on the network due to the problems and how you can rectify them. You need to implement your proposed solutions in the given packet tracer file. IP addresses of the router interfaces are NOT to be changed. Routers Problems Impact Solutions HQ Tech Router HQ LVL1 Router HQ LVL2 Router HQ Router Branch Router HQ WORLD BRANCH 4 B. Complaints from Staff (20 marks) You need to identify all the causes associated with the complaints shown in the table below and how you can rectify them. You do NOT need to mention any issues related to the settings in the router for this section. You need to implement your proposed solutions in the given packet tracer file. From Complaints Causes Solutions HQ Lvl2_user1 Not able to ping lvl1_user1 Not able to email lvl2_user2 Not able to ping lvl1 printer HQ Lvl1_user1 Not able to ping lvl1_user2 Branch Wireless_PC Not able to ping Branch Printer All HQ users Not able to type www.hq.com in the web browser to access the HQ server Not able to type www.world.com in the web browser to access the WWW server Not able to type www.branch.com in the web browser to access the BRANCH server C. Implementing Security Measures (24 marks) The company decides to improve the security of the company by implementing the following: 1. HQ_Router a. Set up NAT/PAT – allowing internal users to go to the external network but blocks all incoming connections with the exception of the HQ server which is accessible from the external network with the IP address 200.20.2.3 2. Branch Network a. DHCP to be set up to allocate IP addresses to the Branch users b. Block connection to WWW Server c. Add in Branch user3 to the Branch Switch using VLAN2 d. Branch user3 must be able to access the printer which is in VLAN1 e. Branch switch to disable all unused ports 3. All routers a. Configure a password for privileged EXEC mode (password – cisco) b. Configure a password for the console connection (password – class) c. Configure a password for the VTY connection (password – cisco) d. Configure encryption to all passwords e. Configure a message of the day banner f. Inactive session timeout on the console port and the virtual terminal after 30 seconds 5  You need to implement the above requirements in the given packet tracer file.  Comment on the security measures being implemented and how you can further improve them D. Implementing VLAN (10 marks) Describe how you would implement VLAN to the HQ and BRANCH LAN. You need to implement this in the given packet tracer file.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

movement of traditional IT staff

  

Focus on the movement of traditional IT staff.  To facilitate cultural assimilation, IT and non-IT must become more integrated.  What are some strategies to implement to allow this type of interaction to occur?

Write 3 different independent scenarios for the above topic. The main scenario needs to be 300-350 (from the text books provided) words and the other 2 for 200-250 words. This submission should be between 750 and 850 words (The word count does not include the title and reference page). Deductions will apply if the word count is not observed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now