Identifying and Removing Malware from Windows Systems

 Questions 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 

2. How often should you update your antivirus protection? 

3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD?  4. Is the manual quick scan good enough protection for a system? 

5. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code? 

6. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender? 

7. What are some of the most common symptoms of malware? 

8. What risk or threat do malware applications, such as spyware, pose to the workstation domain? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

open source vulnerability tool

Research for a open-source vulnerability scanning tool, write a paragraph to describe the software and its functions. 

please see attached file for questions 1-4…

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

bill’s business start up proposal

Bill Wilson, a close friend of your family wants to start a business. A family member referred him to you since you are presently working on a technology related degree. In your first discussion, you discover the following facts:

·         Bill has been a sales representative for a major restaurant supply company for many years.

·         His prior skills are very low tech. He drove from city to city, visiting restaurants and either providing his customers with supplies, or visiting new restaurants to try and convince them to purchase supplies from him exclusively. He phoned in his orders to the manufacturer, and other than accounting for his expenses while on the road, he did little or no record keeping.

·         Other than basic email skills and a some familiarization with Microsoft Word, Bill has little or no experience with existing communications technologies or software applications.

·         Bill’s business plan is to start a new restaurant supply business in his home. He wishes to spend more time at home and travel much less than he did in the past. He knows he will sometimes be required to travel to negotiate deals or meet with clients, but he would prefer to be able to do all this at home whenever possible.

Bill has already implemented the following actions:

ü  He has found an accountant who has agreed to help him set up his accounting system. (Do not consider any accounting software for this assignment. The accountant will provide that.)

ü  He has contacted six different restaurant supply companies and negotiated a fee and commission arrangement that will allow him to represent them and sell their products.

ü  Bill understands the basic operation of Windows 7 and Microsoft Word. For any new software applications, be prepared to provide guidance on the appropriate training he can find locally or online.

Although Bill has minimal technical skills, he does know what he wants. You completed your first discussion with Bill, and the following information was provided by Bill or deduced by you:

o   Budget: Bill has funds for the start up, but the budget has some limits. He doesn’t want the fastest, biggest or best, but he will spend what it takes to have equipment that will suit his needs.

o   Security: Bill has heard horror stories about computer information being hacked, and he wants your assurance that his business information will be secure if he follows your suggestions.

o   Hardware: Bill knows of no special requirements for hardware, but he does know he will need to store somewhere between two and three terabytes of catalog information from the companies with whom he will be working. He needs to be able to access this info at all times from any location. He has no knowledge or preferences about hardware and says he will go with what you recommend.

o   Operating System and Software: Bill feels comfortable with the Windows 7 environment, and prefers not to learn another operating system.

o   The Cloud, Wi-Fi, Mobile Computing: Bill has no idea how these technologies tie in to his business, but he does know he needs to be able to do the following from his home office, from his car, or from any remote location: Check his email and compose/send emails at any time, place a supplies order via the Internet to any of his suppliers, be able to answer phone calls, and be able to set up video conferencing phone calls. 

The Proposal:

Prepare and submit a written proposal to Bill that gives your suggested solution to his business plan. This report is to be written to Bill. DO NOT write your report to your instructor and talk about Bill. DO NOT speak about Bill in the third person. Write this proposal as a professional business letter directly to Bill. Provide Bill with the details of what he needs to purchase in order to have what he needs to conduct his business using today’s technology. Make sure you include the following items in your report:

1.      Hardware: What items of hardware (computer, laptop, tablet device, telephone, etc.) should Bill purchase. For items like a computer, include minimum specifications for all major internal components. Justify the need for any major hardware items recommended.

2.      Operating System: With the recommended hardware, what operating system choices are available and which would be best? Why?

3.      Other Technologies: How will Bill handle communications and mobile computing? Include the details on any peripheral devices and technologies that you propose (“The Cloud”, mobile computing devices, Bluetooth, wireless networking, etc.) and explain how they fit into the business plan.

4.      Software & Training: List the software applications that should be purchased. Make sure you include at a minimum: Operating System, system utilities, such as defrag apps, virus and malware protection and any system utilities Bill might need. Include the training courses that Bill should attend to gain basic skills in the software packages you recommend.

5.      Cost: Provide Bill with an estimated cost for him to implement all of your suggestions. Give an estimate for the individual components and applications, and an approximate cost for all of the items you suggest.

Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would like to ask Bill, you may also address a memo to “Bill” by posting it in the Week 4 area of the online Forum. Your instructor will answer these memos as Bill might. And all students will be able to see any information posted.

DELIVERABLE: Submit your Business Proposal to your instructor, in the Assignment section of the site, as a Word document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Recovery From Chapter 2, page 81, Real World Exercise 2.4

 From this link read abstract and answer the question https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=246582 Do you think having a simulator for training and readiness would help or hinder the quality of the contingencies? why or why not?

BA63572G319 Disaster Recovery

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

How database auditing and monitoring fit within a SOX compliance framework.

 

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Dark Web

  1. In your own words, describe the Dark Web.
  2. What type pf content is generally found on the Darknet?
  3. What kind of information can be found using the hiddenwiki?

https://www.youtube.com/watch?v=joxQ_XbsPVw&feature=emb_logo

https://www.youtube.com/watch?v=oiR2mvep_nQ&feature=emb_logo

https://www.youtube.com/watch?v=fUjSVrh9UN4&feature=emb_logo

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Process and Threads

For this first assignment, you won’t be writing code; instead, you will be reading and executing the given below codes. Read the README instruction below for directions on how to compile and link the programs. Submit your answer in writing onto Blackboard.

  • Experiment 1. Thread and Process Creation
    Study the programs thr_create.c and fork.c. These programs measure the average time to create a thread using thr_create() and to create a process using fork(). Compile and execute the programs. What do you conclude from this experiment? Describe the reasons for the difference in timings.
  • Experiment 2. Processes vs Threads
    Study the two programs thr_shared.c and proc_shared.c. These programs are identical except that one uses threads and the other uses processes. Compile and execute the programs. What do you conclude from this second experiment? Explain the reason for the difference in behavior.
  • Experiment 3: The Update Problem
    Study the programs shared_data.c and SharedData.java. In these examples, multiple threads are both updating (i.e., modifying) a shared variable. Compile and execute both. Are the programs behaving “correctly”? What do you conclude from this experiment?
    README Instructions
  • Run the program on Linux platform.
  • To compile and run a C program (e.g., thr_create.c):
    gcc -o thr_create thr_create.c -lpthread thr_create
  • To build and run a classfile from the java code: javac SharedData.java
    java SharedData

Submission Guidelines and Requirements

  • Submit your answers for all the experiments as a PDF file onto Blackboard
  • Include your name, UCM ID and Certification statement in your solution:
    //Your name
    // Your UCM ID
    //Certificate of Authenticity: “I certify that the codes/answers of this assignment are entirely my own work.”

thr_create.c

#include <sys/time.h> #include <stdio.h> #include <pthread.h> #include <errno.h> main()

{
struct timeval start,end; long forktime;
double avgtime; pthread_t last_thread; int i;
int iters = 250;
void *null_proc();

gettimeofday(&start,NULL);

for (i = 0; i < iters – 1; i++) /* create (iters-1) threads */ pthread_create(&last_thread,NULL,null_proc,NULL);

pthread_create(&last_thread,NULL,null_proc,NULL); /* create last thread */ gettimeofday(&end,NULL);

pthread_join(last_thread, NULL); /* wait for last thread */ forktime = (end.tv_sec – start.tv_sec)*1000000 +

(end.tv_usec – start.tv_usec); avgtime = (double)forktime/(double)iters;

printf(“Avg thr_create time = %f microsec\n”, avgtime); }

void *null_proc() {}

for (i = 0; i < iters; i++) /* create iters processes */ {

if ((pid = fork()) == 0) /* child process */ {

null_proc();

exit(1); }

else if (pid == -1) {

/* error */

printf(“error %d\n”,errno);

exit(-1); }

else /* parent process */ continue;

}

/* only parent process reaches this point */ gettimeofday(&end,NULL);
for ( i = 0; i < iters; i++) /* have to do a wait for each child */ wait(&status);
forktime = (end.tv_sec – start.tv_sec)*1000000 +

(end.tv_usec – start.tv_usec); avgtime = (double)forktime/(double)iters;

printf(“Avg fork time =%f microsec\n”, avgtime);

} null_proc() {
}

fork.c

#include <sys/time.h> #include <stdio.h> #include <errno.h>

main() {

int pid;
struct timeval start,end;
int i;
long forktime;
double avgtime;
int iters = 250;
int status; gettimeofday(&start,NULL);

#include <sys/time.h> #include <stdio.h> #include <pthread.h> #include <unistd.h> #include <stdlib.h>

void *proc();
int shared_number;

main() {

int i;
pthread_t new_thread; int sleep_time;
int seed;

shared_number = 1;

printf(“Enter a positive integer for seed: “);
scanf(“%d”,&seed);
srand48(seed); /* initialize seed of random number stream */

/* thr_create(NULL,0,proc,NULL,0,&new_thread);*/ pthread_create(&new_thread,NULL,proc,NULL);
/* create new thread */

for (i = 0; i < 50; i++) {

printf(“MAIN THREAD: i = %d, shared_number = %d\n”,i,shared_number); sleep_time = 100000.0*drand48(); /* generate random sleep time */ printf(“sleep time = %d microseconds\n”,sleep_time);
usleep(sleep_time);

shared_number = shared_number + 2; }

pthread_join(new_thread,NULL);

printf(“MAIN THREAD: DONE\n”); }

thr_shared.c

void *proc() {

int i = 0; int DONE;

DONE = 0; while (!DONE)

{ i++;

if (i%10000 == 0)
printf(“CHILD THREAD: i = %d,shared_number = %d\n”,i,shared_number);

if (i > 5000000) DONE = 1;

}
printf(“CHILD THREAD: DONE\n”);

}

#include <sys/time.h> #include <stdio.h> #include <pthread.h> #include <unistd.h> #include <stdlib.h> #include <errno.h>

void *proc();
int shared_number;

main() {

int i;
pthread_t new_thread; int sleep_time;
int pid;
int status;
int seed;

shared_number = 1;

proc_shared.c

printf(“Enter a positive integer for seed: “); scanf(“%d”,&seed);

srand48(seed);

if ((pid = fork()) == 0) {

proc();

exit(0); }

else if (pid == -1) {

printf(“error %d\n”,errno);

exit(-1); }

else
{ /* parent process */

for (i = 0; i < 50; i++) {

/* initialize random number stream */ /* child process */

/* error */

printf(“MAIN PROCESS: i = %d, shared_number = %d\n”,i,shared_number); sleep_time = 100000.0*drand48(); /* generate random sleep time */ printf(“sleep time = %d microseconds\n”,sleep_time);
usleep(sleep_time);

shared_number = shared_number + 2; }

wait(&status); /* wait for child process */

printf(“MAIN PROCESS: DONE\n”); }

}

void *proc() {

int i;
int DONE;

DONE = 0;
i = 0;
while (!DONE)

{ i++;

if (i%10000 == 0)

printf(“CHILD PROCESS: i = %d,shared_number = %d\n”,i,shared_number); if (i > 5000000)

DONE = 1; }

printf(“CHILD PROCESS: DONE\n”); }

shared_data.c

#include <sys/time.h> #include <stdio.h> #include <pthread.h> #include <unistd.h> #include <stdlib.h>

void *proc();
int shared_number;

main() {

int i;
pthread_t new_thread; int sleep_time;
int number;
int seed;

shared_number = 1;
printf(“Enter a positive integer for seed: “); scanf(“%d”,&seed);
srand48(seed);

pthread_create(&new_thread,NULL,proc,NULL);

for (i = 0; i < 20; i++) {

number = shared_number;
printf(“MAIN THREAD: i = %d, shared_number = %d\n”,i,shared_number); sleep_time = 100000.0*drand48(); /* generate random sleep time */ printf(“sleep time = %d microseconds\n”,sleep_time);

usleep(sleep_time);

shared_number = number + 2; }

pthread_join(new_thread,NULL);

printf(“MAIN THREAD: DONE\n”); }

void *proc() {

int number,i; int sleep_time;

printf(“CHILD\n”); for (i = 0; i < 10; i++)

{
number = shared_number;
printf(“CHILD THREAD: i = %d, shared_number = %d\n”,i,shared_number); sleep_time = 100000.0*drand48(); /* generate random sleep time */ printf(“sleep time = %d microseconds\n”,sleep_time);
usleep(sleep_time);
shared_number = number + 200000;

}
printf(“CHILD THREAD: DONE\n”);

}

SharedData.java

import java.util.Random;
public class SharedData extends Thread {

static Random gRandom = new Random(); static int gSharedNumber = 0;
private int gID;
public SharedData(int id) {

this.gID = id; }

public void run() { for(int i=0;i<20;i++) {

int number = gSharedNumber; System.out.println(“SharedData[“+gID+”](i=”+i+”) = “+gSharedNumber); try { Thread.sleep(gRandom.nextInt(1000));
} catch (InterruptedException e) { /* ignore */ }
if(gID == 0) gSharedNumber = number + 1;
else gSharedNumber = number + 1000;

} }

public static void main(String args[]) throws Exception { SharedData sd1 = new SharedData(0);
SharedData sd2 = new SharedData(1);

sd1.start(); sd2.start();

sd1.join(); sd2.join(); }

}

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ program

 

Write a C++ program based on this information below

https://docs.google.com/document/d/1nM3WyAKAwJN6QHNia99ReTT50oRNXirUzEPVjtMjB1U/edit?usp=sharing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Homework

Write an research with a minimum of 1000-words explaining the significance of cybersecurity frameworks. Provide detail explanation of NIST and ISO 2700 series. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2.4 | Lab | Application Protocols

In this lab, you will apply what you have learned about Wireshark use as well as Application Layer standards and protocols to analyze files of captured web and email traffic. The packet capture files for analysis are provided. Download the attached instructions. When you have completed the lab, click on the assignment link to submit your finished work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now