A researcher wanted to know if there was a significant difference in cyber security breaches between cities on two different continents. What test should he conduct to determine if there is a significant difference in cyber security breaches between the

 A researcher wanted to know if there was a significant difference in cyber security breaches between cities on two different continents.  What test should he conduct to determine if there is a significant difference in cyber security breaches between the continents?  Write up the results and determine what do the results mean? 

Here is the data set:

Asia

Europe

40

25

52

35

63

20

70

18

25

19

19

14

 

11

 

9

: In Excel write data analysis

Results are to be written in excel

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Penetration Test Report

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

There are two deliverables due for Project 2.

  • A video showing your exploitation, credential theft, and data exfiltration.
  • A penetration test report that discusses the steps and actions in the video and how they are relevant to the client. The report also includes your recommendations for the client.

Use Microsoft Stream to create the video.

If you have not already done so last week:

Upload and submit two items for this assignment:

  • the Hacking Video Demonstration showing your exploitation
  • the Penetration Test Report document

How Will My Work Be Evaluated?

Penetrating the system (gaining access) is only the beginning for a penetration tester. You must also be able to clearly communicate your findings and recommend corrective actions in a way that a nontechnical audience can understand. Therefore, the written report describing the engagement’s technical details is a critical part of the job.

Having the best keyboard penetration skills in the business will not help if you are not able to properly document findings and convey critical issues to the client. A successful penetration proposal could lead to additional business from the client’s subsidiaries and partners.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

2.1.2: Describe the context surrounding the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, address the client in the correspondence. Provide a brief introduction explaining the services performed and a summary at the end of the report. Summarize the actions of the attacker during the penetration test. Validate the attack methodology using industry approved techniques. Include at least two to three references in IEEE format.

2.1.3: Explain the significance of the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, discuss the vulnerability you exploited on the system. Explain how you were able to steal credentials and take data important to the company. Discuss the implications, including loss of revenue and company reputation.

10.1.2: Gather project requirements to meet stakeholder needs.

  • In the Penetration Test Report, you need to address the fact that the client has asked you to use other accepted practices and tools to exploit its systems. You will need to use tools such as Kali, Metasploit, John the Ripper, and include screenshots with date and time stamps, IP addresses, and ports that show how you connected the attack system to the victim machine.

12.2.1: Identify systems for the risk assessment.

  • In the Penetration Test Report, you need to address the fact that during any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are exploiting. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the penetration test.

12.2.2: Perform a risk analysis.

  • In the Hacking Video Demonstration and the Penetration Test Report, explain to the client in clear terms the security issues that are present on the system. Discuss the exploit you used to compromise the Linux system and the steps to mitigate this vulnerability. Provide detailed information on the versions of the vulnerability and application software.

13.1.1: Create documentation appropriate to the stakeholder.

  • In the Penetration Test Report, explain to the client the actions that you used during the engagement. Talk about how an attacker would know how to get into the system and what methods could be used to compromise the victim machine. Finally, discuss the post exploitation techniques that allowed the attacker to get the credentials of a user account and to extract confidential data from the target system.

When you are finished, click “add a file” to upload your two deliverables, and then click the Submit button.   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Using Machine Learning and Data Analytics to Prevent APT

  

  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these  technologies at the time of the event. Be specific.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Algorithms Coding assignment.(4 problems- 2 Theory and 2 coding questions)

 Problem 1: Knapsack Variant  (Pseudocode)
                  Consider the following version of Knapsack. Given are two weight limits W1 and W2, where W1 ≤ W2. Given are also n items (w1, c1),(w2, c2), . . . ,(wn, cn), where wi is the weight and ci the cost of the i-th item. We want to find a subset of these items of the highest cost, where the subset weights at least W1 and at most W2. Give an O(nW2) algorithm for this problem. (Re Block Crusher (Kattis) call that the cost (respectively weight) of a subset is the sum of the costs (respectively weights) of the items in the subset.) 

 Problem 2: Minimum Spanning Tree with Repeated Costs (Proof)
                  Consider the Minimum Cost Spanning Tree problem on an undirected graph G = (V, E) with a cost ce ≥ 0 on each edge, where the costs may not all be different. If the costs are not all distinct, there can in general be many distinct minimum-cost solutions. Suppose we are given a spanning tree T ⊆ E with the guarantee that, for every e ∈ T, e belongs to some minimum-cost spanning tree in G. Can we conclude that T itself must be a minimum-cost spanning tree in G? Give a proof or counterexample with explanation. 

Problem 3: Block Crusher (Kattis)
                 Solve the “Block Crusher”, which you can find at this web address: https://open.kattis. com/problems/blockcrusher This is a coding problem; be sure to follow the relevant instructions for testing and submitting. 

Problem 4:  Continuous Median (Kattis)
                   Solve the “Continuous Median” problem, which you can find at this web address: https: //open.kattis.com/problems/continuousmedian This is a coding problem; be sure to follow the relevant instructions for testing and submitting. An O(n 2 ) algorithm will not be fast enough to pass all the tests, and will receive at most 3 points out of 10. You need to get the running time down to o(n 2 ), and ideally, O(n log n).
Hint 1: Suppose “median” in the problem statement were replaced by “min” (or “max”). How would you solve that problem? Suppose we added the additional condition that, after even-numbered inputs, you must return the min value, and thereafter treat it as having been deleted from the data set. How would you solve it now?
Hint 2: Notice that the median element is (ignoring rounding for now) the maximum element of the bottom half of the input, and the minimum element of the top half of the input. How can you make use of that fact?
Hint 3: Choosing the right data structure is essential. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Algorithms

 

Complete the Lab 4-6, “Programming Challenge 1 – Tip, Tax, and Total,” of Starting Out with Programming Logic and Design.

Note: You are only required to create the pseudocode for this activity; however, notice how the pseudocode compares to the given Python code for this assignment.

file attached below. Thats for homework 1

2 Homework 

 

The university reassessed its needs for the website design and determined it will no longer require all students to take five classes. 

Update the website program to reflect the following changes:

  • Prompt the student for the number of courses being taken 
  • Use a while loop to prompt the student for the price of each book based upon the number of classes being taken
  • After the price of each book has been entered, prompt the user for shipping options: delivery or pick-up
  • Use an if statement to add the charges to the total price if the shipping charges are greater than 0
  • Display the total cost

Create a 1/2- to 1-page document containing pseudocode based on the revised program needs. Add this to the revised program pseudocode from the Week One Individual Assignment, Problem Solving with Algorithms.

Create a 1-page flowchart based on the algorithm for the revised program needs. Add this to the revised program flowchart from the Week One Individual Assignment, Problem Solving with Algorithms.

Please, I need to pass this class. Thank you.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a paper

 

The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, “Key Components of an Information System as Related to the Cyber Domain,” is looking for more information on the cyber domain in hopes of determining the organization’s cybersecurity needs. As a cybersecurity consultant, you believe you can provide the CIO with the information he needs.

Using Microsoft® Word, write a 1- to 2-page communication to the CIO of the organization. Provide an overview of the following in your letter:

  • A definition of the cyber domain and its key components or aspects. The cyber domain encompasses cybersecurity, a discipline that involves the following:
    • Securing computer information, communications systems, networks, infrastructures, assets
    • Protecting them against damage, unauthorized use, modification, exploitation
  • The components of an information system, elaborating on the similarities to the cyber domain
  • An approach to implementing information security for the organization you chose and how that approach could be expanded to the larger cyber domain
  • The systems development life cycle compared to the cyber domain life cycle
  • The components of the threat environment for the organization you chose, including an argument that a threat to the organization is also a threat to the larger domain

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT Governance

See Attachment

Assignment Questions 

 Question 1. Make a case whether or not to retain information security function in the light of IT infrastructure being scrapped in favor of cloud services. (3 points) 

 Question 2. Is there any need to re-configure information security approach to meet the demands of new environment? Why? (4 points) 

 Question 3. What should be the focus of information security function? (4 points) 

 Question 4. How would you set up information security for Upward Bound Airlines to address the challenges of new developments? (4 points) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Installation and Configuration

Provide detailed installation steps for each of the major components and protocols planned for the system.

Discuss configuration considerations for installation of these components and protocols.

Include configuration of the system for remote access.

APA references and intext citations, attached are current project and Information about what this class is covering

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research paper

 Research Topic (Successful implementation and operation of a biometric security system)

Class:

The assignment for this week is to flesh out your Week # 8 Research Paper Outline. Please see below for the details:

Week 2: Research Paper Topic Selection

Week 5: Research Paper Outline due (i.e. this week by Sunday at 11:59 p.m.)

Week 8: Research Paper Due

Research Paper Outline: For this assignment – create your research paper outline and include the following all in APA format:

  • Title page with the title of your paper, name, date, class, professor, and university info.
  • Top level headers which outline what you will be talking about in your paper.
  • Second level headers (sub-headers) which outline detail for each of your top level headers
  • A reference section list with at least 5 sources that you have researched (you will need a total of ten for the final paper).
  • Submit your outline in a word file with the following file naming convention: ISSC325_Outline_First_Last.doc(x)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Week 5 assignment ITMG281

 

Instructions

Format:

  • Complete the assignment in a Word document and then upload the assignment for grading.
  • When assigning a name to your document, use the following format: Lastname-Assignment#.
  • Make sure to include a title page (with your name and date) and a reference page (with your sources).
  • Double-space paper, 1-inch margins, 12-point font.
  • When submitting the paper, it will automatically be processed through Turnitin for review. 
  • This assignment is due by 2355 EST on Sunday.

    Instructions: Use examples from the readings, lecture notes, and outside research to support your answers. Use high-quality sources (no Wikis, blogs, or anonymously authored articles). Be sure to follow APA guidelines for citing and referencing source material. Answer the below questions (250 words for each question):

    1. (250 words + 1 reputable source)
    Read Chapter 8. Review Question #4 on page 261 and then answer the following question: The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

    2. (250 words + 1 reputable source, which can be the case itself on page 275)
    Read Chapter 9. Answer the following question: Apple Inc. and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to black-out restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Read the case, and describe how DRM can help protect Apple, MLB, or both. WARNING: Do not simply state your opinion without support.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now