Appication security

   

Purpose

This course-wide project introduces you to a variety of tasks and skills that are required for an entry-level security administrator who is tasked with securing systems in a Microsoft Windows environment.

The following tools and resources will be needed to complete this project:

§ Course textbook

§ Access to the Internet

Learning Objectives and Outcomes

You will be able to:

§ Describe the impact of adding Active Directory to an existing Windows network.

§ Develop procedures for changing access controls.

§ Develop procedures for ensuring a malware-free environment.

§ Recommend Group Policy Objects for a Windows environment.

§ Develop procedures for auditing security in a Windows system.

§ Develop procedures for restoring a failed Windows system.

§ Recommend Windows hardening techniques.

§ Describe security goals and write policies for securing Windows applications.

§ Ensure the integrity of all evidence collected in a Windows environment.

Overall Project Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.

Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.

  

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I addressed all questions required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines

  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cryptography course assignment

Find an article that discusses attacks on Public Key encryption.  Write a one to two page paper on the topic
Be sure to cite your sourcesBe sure to use APA format

 https://getpocket.com/explore/item/the-woman-who-smashed-codes-the-untold-story-of-cryptography-pioneer-elizebeth-friedman?utm_source=pocket-newtab 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5 Discussion: Cluster Analysis

Introduction

<>

Questions

 

1) Sequential pattern mining is a topic of data mining concerned with finding statistically relevant patterns between data examples where the values are delivered in a sequence. Discuss what is sequential data? What is sequential pattern mining? Explain difference between classification and clustering in data mining.

2) Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Conclusion

<>

 

Grading Rubric for DF5

  • Providing a comprehensive discussion of the topic: 25 percent
  • Justifying ideas and responses by using appropriate examples and references from texts, Web sites, other references, or personal experience and cited the sources in the correct: 25 percent
  • Commented on at least two of your classmates’ postings in a meaningful way at least 100 words: 25 percent
  • Filling the number of required 200 words or more for the discussion: 25 percent

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5 Discussion

 

  • 1. What do you think of EME? Why are people opposed to it?
  • 2. Are you a consumer or a user of technology?
  • 3. Do you think Hollywood and record companies have a right to alter or mandate changes to audio/video technology including TV’s, TIVO, gaming consoles, DVR’s, PC’s, phones and iPods, in order to insure or enforce copyright law?
  • 4. Do you think that the business model of “Hollywood” and “Big record labels” is obsolete because of the Internet and technology?
  • 5. How has copyright affected the way you listen and acquire music, games, and videos? Give your opinion and some examples.
  • 6. What do you think about Digital Rights Management?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Does IT Matter? Information Systems and Beyond

1. Analyze Carr’s position in regards to PC vs. Mac, Open Office vs. Microsoft Office, and Microsoft Powerpoint vs. Tableau.

2. Do some independent research on Nicholas Carr (the author of “IT Doesn’t Matter”) and explain his current position on the ability of IT to provide competitive advantage.

3. Review the WebEx website. What features of WebEx would contribute to good collaboration? Compare WebEx with other collaboration tools such as Skype or Google Hangouts?

Could you please provide answers to the above exercise questions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software Design Specification (SDS) Document

Assignment: Software Design Specification (SDS) Document

In this assignment, you need to create a Software Design Specification (SDS) document based on the first three phases of this project. Once your SDS is completed your team should be able to move on to system implementation using your designs as a blueprint.

To assist you with completing this document, please examine the following example: https://www.slideshare.net/RaviYasas/example-for-sds-document-in-software-engineering

Write a Software Design Specification document in which you:

– Summarize the main points for the first three phases of this project.

– Create all of the required diagrams from Phase 2 and 3 and fill in any gaps that may – have been identified as you have progressed through this course.

– Demonstrate in your SDS a thoughtful consideration of the ideas and concepts presented in this course by providing new thoughts and insights related to the previous phases.

– Use at least four quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

1. Fully develop your ideas:  While there is no specific page requirement, students are expected to fully develop their ideas using business communication language.  This means you must demonstrate to your professor you have absorbed the material and understand it.  A statement of fact should be supported by two or three sentences.  A paragraph should only contain one idea.  A fully developed idea doesn’t mean an exhaustive explanation in which students write everything they know, just enough to get the point across to the reader.

2. Make sure you do your own work: 

Include charts or diagrams created in MS-Project. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Read Chapter 6 of the textbook and answer Question 06

Read Chapter 6 of the textbook and answer   

 Question 06: Have you ever received an e-mail that indicated someone else had sent out spam with your return e-mail address on it? How would you feel about that?(150 words for the answer this question)

comment this 2 article (40 words for each comments)

1- This question raises an interesting dilemma. On one hand every person that owns an access point to the internet should be able to maintain and protect it to a reasonable extent. In one sense the in-action of not protecting your machine, makes you a perpetrator. On the other hand, people being infected by viruses and unknowingly running a program that is harmful to others, is a victim. I would say that the act of running one of these scripts should not be punished, but they should be made to replace or wipe their hard drive for the protection of others on the network. I would say that being involved in a spam emailing service makes you both a victim and a perpetrator. 

2-  When I first moved out of my house and into a dorm in Freshman year of college, I had a habit of not locking my door. I didn’t think it was a huge deal because the dorm was in a hidden corner of the building and my roommate had essentially moved out to live with her friend. Typically, it only helped me because there were times when a friend would want to borrow something from my room and if I wasn’t home, I could just tell them to let themselves in. I also had a bad habit of leaving my keys in my pockets, so when I was running late, I didn’t have to worry about digging through my laundry to find the keys. However, once I moved back home a couple years later, I continued that same habit with the front door of my parents’ house, where people actually do try to break in. To fix this, we installed an electronic lock that automatically locks the door after anyone leaves or enters. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 8 Final Project

The Scenario:

Tony Spacken, Sales Manager, has an Excel workbook listing properties for sale. If a property is sold, Select National Properties Group will finance the property loan for 30 years at 7.5% interest. If the monthly payment of a property is greater than $300,000, the company will give the buyer a 1% discount of the selling price.  Lavern Gallen is interested in purchasing the Pleasant Properties Warehouse, one of the company’s properties. She lives at 4231 Center Drive, Tempe, TX 76501.

For this project, you will need the following files:

   New blank Access database

   New blank PowerPoint presentation

   Gallen_Letter

   Sale_Properties

You will save your files as:

   Lastname_Firstname_Sale_Properties

   Lastname_Firstname_SNPG_Properties

   Lastname_Firstname_Gallen_Letter

   Lastname_Firstname_Sales_Presentation

  1. Open the file Sale_Properties, and then save the workbook as LastnameFirstname_Sale_Properties
  2. Copy the Properties worksheet to a new worksheet, 
  3. Rename the worksheet as Payments 
  4. In the Payments worksheet, convert the data to a table. 
  5. In column G, insert a calculated column using the PMT function to calculate the monthly payment for each of the properties. 
  6. In column H, insert a calculated column using the IF function to determine the amount of the if discount
    property qualifies for it. 
  7. Determine the totals for columns F:H. 
  8. Apply conditional formatting to cells with a selling price between $40,000,000 and $70,000,000. 
  9. Copy the Payments worksheet to a new worksheet,
  10. Rename the new worksheet as Pleasant Properties 
  11. Filter the table to display only the data for the Pleasant. Insert your name in the footer so that it displays on all worksheets. 
  12. Create a blank Access database, and then save it as Lastname_Firstname_SNPG_Properties 
  13. Import the data from the Properties worksheet. 
  14. Create a query that displays all fields, except the ID field, for properties located in Florida and Georgia. 
  15. Save the query as Lastname_Firstname_FL_GA Query 
  16. Export the query result as an RTF file
  17. Create another query that displays all fields, except the ID field, for all properties with selling prices less than $1,000,000. 
  18. Save the query as Lastname Firstname Price Query 
  19. For each query, create and format a report. 
  20. Save each report with the name as the query, substituting the word Report for Query. 
  21. Create a PowerPoint presentation using a template of your choice; the presentation will be shown to prospective buyers attending a sales conference. 
  22. Save the presentation as Lastname_Firstname_Sales_Presentation
  23. Insert the file name in the footer to display on all pages of the notes and handouts. 
  24. Modify the slides to help persuade buyers to purchase property from Select National Properties Group: 
  25. On one slide, inform the audience that the company sells many properties. 
  26. On the same slide, link the cell from the Excel Payments worksheet that displays the total selling price. 
  27. On a new slide, insert a SmartArt graphic that lists some of the different types of properties that the company develops and manages. 
  28. At the end of the presentation, insert a slide that contains the contact information for Mr. Spacken. 
  29. Insert additional text, pictures, and clip art to enhance the presentation. 
  30. Format any text or other objects to create a professional appearance. 
  31. Open the file Gallen_Letter, and then save as Lastname_Firstname_Gallen_Letter 
  32. Insert the file name in the footer. 
  33. Format the letterhead for Mr. Tony Spacken. 
  34. Insert the current date, and then insert Lavern Gallen’s name and address and a proper salutation. 
  35. Following the first paragraph, copy the SmartArt graphic from your presentation to the letter, changing text wrapping and resizing as necessary. 
  36. Following the second paragraph, from Excel, on the Pleasant Properties worksheet, link cells F1:G38 (first and second row) to the Word document. 
  37. Under the third paragraph, insert the RTF file listing the Florida and Georgia properties. 
  38. Format the document to create a professional appearance. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

need help building code

 
Write a program and flowchart, and include a snippet of your program running.ECPI has rented a Cruise Boat for its upcoming graduating class! You work at ECPI, and have been asked to manage the reservations for students and their families. You need to write a program that tracks the ages of at least 2 students and their families; as well as the meal plans they have selected. The program will achieve the following:

  • Track the ages of at least 2 parties – Student and family member(s
    • We need to capture ages, to know what each family member can participate in
    • Based off the age,  the price of the ticket per guest.  Sum up the cost of tickets per family.   Example,   $1000/adults,  $500/child,  $850/Seniors
  • Track the meal plans they have selected per party
    • Each family/party can select a meal plan per day; and your program must track those costs
  • Once you have included the Meal Plans, and the prices:
    • Calculate the total cost for the Meal Plans selected
    • And then the total cost of both meal plans

Instructions

The program you write should include these components at a minimum. Remember though: Get creative, and feel free to add different components that you feel are applicable in a Cruise Reservation program.

  1. You must have at least two different arrays – These are, in effect, parallel arrays:
    1. One for each Family/Party capturing the ages of every person in the reservation
      1. Minimum: 4 Families
    2. One for each Meal Plan Options selected
      1. Each family should have a meal plan included  
        1. Meal Plans can be, for example, breakfast, lunch and supper and should include just the prices for each one
        2. create and display a menu to see choices and prices
    3. ** Please note:
      1. The image below does not reflect the menu or the ticket cost 
      2. i. The arrays are for two families; and two meal plans, including the prices for each of the meals chosen
  2. Remember to use a “for” loop for each array
  3. You should have Totals that calculates the totals for each family meal plan
    1. Because you will have at 4 Parties/Families, all should have their own price totals; and then also a total for the meal plans reserved and ticketing
  4. Hints and Suggestions:
    1. You can set your own book prices – for example, see the prices in the example below
    2. You can set how many Meal Plans included for each section
      1. You can also write the program to ask the user for this input, but this is not required
  5. At the end, it prints out the totals for each section
  6. The very last total of all Meal Plans and ticket totals should be printed in a different color – so it really stands out

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data encryption Standard

evaluate the history of the Data Encryption Standard (DES) and then how it has  transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Use the textbook for added reference

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now