Vulnerability Case Study and PowerPoint Presentation

Vulnerability Case Study

For the project, 15 minute presentation, a Powerpoint presentation (< 15 slides), and an annotated bibliography of the sources upon which you rely.  

THE VULNERABILITY YOU HAVE TO WORK ON IS 

 https://nvd.nist.gov/vuln/detail/CVE-2023-20198 

Subject Matter:

Your task is to research a known exploit of a vulnerability from within the past 3 years. 

  • A high-level description of the vulnerability
  • A more detailed discussion of the vulnerability.  You should start by looking up the CVE in the National Vulnerability Database and use that as a way to find additional references.  
  • Analyze what STRIDE aspects apply to the vulnerability
  • Analyze what aspects of the CIA triad were impacted
  • How the vulnerability was discovered and disclosed
  • How it was exploited and the impact
  • How it was resolved 

Research Process:

Your research should be done in a few separate phases:

1.  Start with a general search to find an interesting case for analysis.  You can Google for news stories, look at Google Project Zero, security focused blogs, newsletters, or YouTube channels, and similar sources to find a high-level discussion.

2.  Find the CVE in the National Vulnerability Database.  This will be a key step in getting sufficient technical details about the vulnerability and will lead you to additional resources.

3.  Look for third party analysis, discussion of exploits, responses from the product owner, patches, and other related information pertaining to the vulnerability.  Again, the CVE will be a good resource for this part.

As you find relevant sources that you will use, add it to the bibliography with a brief annotation.  The annotation should provide a high-level summary of the source and why the purpose for which you are using the source.  It could be helpful to highlight key quotes and/or excerpts as well.

Presentation and Slides:

Once you have done your research and conducted your analysis, the next step is to prepare the presentation.  Prepare a Powerpoint presentation (should be around 12 to 15 slides).  Slides should be organized.  Slides should provide short bullet points — do not write paragraphs on the slide and read off of them.  Relevant visuals and graphics that enhance the discussion are always welcome.

PLEASE YOU HAVE TO INCLUDE EVERYTHING WHICH I HAVE MENTION ABOVE ,

 As you find relevant sources that you will use, add it to the bibliography with a brief annotation.  The annotation should provide a high-level summary of the source and why the purpose for which you are using the source.  It could be helpful to highlight key quotes and/or excerpts as well. IT HAS TO BE IN A DIFFERENT FILE 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

data ETL

 

Tasks to complete

Goal: This project will be used to integrate concepts developed from all the assignments in the second half of this class, specifically. You will identify a data driven business problem that requires preparation of the data. This preparation involves Extracting data (from 3 or more sources), Transforming (or cleaning) the data before Loading it into a database for analysis. In other words, you will experience, first-hand, the ETL process of Data management – preparing the data for further analyses.

Options: You can take this project in one of two directions: (1) Identify a large file, clean the data and normalize it into three or more tables OR (2) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis. In either case, you will need to identify what you plan to learn from the cleaned and loaded data.  BOTTOM LINE: Can you do the analyses WITHOUT going through this ETL process. If so, what’s the point?!

Resource: This articleLinks to an external site.

In preparation for your project this term, I need you to do some digging to identify sources and ideas for a decent project.

There are a couple of decisions that have to be made. And so, I am making part of the project a “deliverable” so you can begin mulling over it. Most ETL tasks involve cleaning and integration. For integration, it is vital that you have an attribute that is common across all three data sets

Cleaning

Cleaning is one of the most important steps as it ensures the quality of the data in the data warehouse. Cleaning should perform basic data unification rules, such as:

  • Making identifiers unique (sex categories Male/Female/Unknown, M/F/null, Man/Woman/Not Available are translated to standard Male/Female/Unknown)
  • Convert null values into standardized Not Available/Not Provided value
  • Convert phone numbers, ZIP codes to a standardized form
  • Validate address fields, convert them into proper naming, e.g. Street/St/St./Str./Str
  • Validate address fields against each other (State/Country, City/State, City/ZIP code, City/Street).

Transform

The transform step applies a set of rules to transform the data from the source to the target. This includes

  • converting any measured data to the same dimension (i.e. conformed dimension) using the same units so that they can later be joined.
  • generating surrogate keys or FKs so that you can join data from several sources,
  • generating aggregates
  • deriving new calculated values,
  • Adding columns to create PKs and/or FKs

Data Integration

It is at this stage that you get the most value for the project. This typically means you are adding some attribute from a related set that adds ‘Color’ to the data. Perhaps Census data to labor data or other demographic data. The challenge is to locate data that are relatable.

Project direction: You will need to complete a datamart with significant pre-processing (ETL) activities. 

Requirements:

  1. Problem being solved:  What do you propose to learn from this data? List several of these business questions and show how your project solution (data set) could answer them.
  2. Tools: You must complete the entire project using Visual Studio. OR you can do this with some other tool of your choice (ETL) like Power BI or tableauLinks to an external site..
  3. Volume: Total result data set must add up to at least 5k records, but not more than 100k.
  4. Destination: SQL server table(s). Depending on the direction you are taking, you can move all the data to a single CSV file and dump it into SQL server at the end or direct the final destination tables to SQL server.
  5. Transformation – it must include TWO new columns (for each final destination) that is populated by (a) the current date and time so you know when that data was brought into the final dataset and (b) a second one to know where the data came from (source file name). This may be done through SSIS or in SQL server.
    Note: Filename capturing works only when the source is a flat file.  So, if your source is NOT a flat file,  you may want to make a CSV file an intermediate destination and then use this file as the source (Hint: Use derived column transformation to add a column)
    In addition it must include at least 3 of the following transformations: data conversion, derived column, data split, lookup, merge, merge join, multicast, union all, fuzzy lookup or any of the transforms not covered in class. 

Data sources: You are welcome to use datasets from work that has been sufficiently “anonymizedLinks to an external site.“. In fact this itself is a valuable transformation task that you can then use to protect your data and make it available for additional analysis/exploration. There are many public data sets that can be used (see “data sources” tab)

 

Project ideas & Data sets [for ETL]

Goal: Explore various datasets (see below) to see what is missing in any of the data and how you can enhance it by combining info from other seemingly unconnected data (industry, education, poverty and liquor shops?). The links below serve as a starting point for your exploration. Get started!’

Expectation: You can take this project in one of two directions: (1) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis.  OR (2) Identify a large file, clean the data and normalize it into three or more tables so that when you rejoin them, you get more accurate answers to your questions. Sometimes this process may require you to get “reference sources” so your dimension tables (destinations in Model Y above) are more complete/accurate.  

In either case, you will need to identify what you plan to learn from the cleaned and loaded data.

There are two main ideas to keep in mind: (1) Cleaning badly prepared data and (2) integrating data from multiple sources. An ETL project usually involves BOTH of these.

When integrating data from more than one source, you need to make sure that they can be linked in the first place. In other words, is there something in common between the two data sets? Some kind of identifier like we use as PK and FK? If not, can you create it?

As you review the following sources for ideas, look for files that can be linked. Otherwise, all you have is data!

Note: You don’t have to get ALL your data from a single source. As long as they are related, you can draw from multiple sources.

I ALREADY HAVE THE DATA SOURCES AND PROJECT BACKGROUND TO WORK WITH. YOU JUST HAVE TO DO THE PROJECT ETL AND PRESENTATION. FOR THIS PROJECT YOU NEED TO USE VISUAL STUDIO 2019(PREFFERED) OR POWER BI OR TABLEAU. I NEED IN A SHORT TIME SO PLEASE BID ONLY IF YOU ARE SURE YOU CAN DO IT . I WILL BE UPLOADING THE DATA FILES HERE.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Security in Cloudcomputing with AWS

 Can you do a full research work for Network Security in Cloudcomputing with AWS as a case study, under the umbrella of Cyberforensics. The case study has to be detailed and has to be done proper with detailed screenshots as well to show the entire process. 

 build a cyberforensic case from scratch, solve it, show all the artifacts and evidences and put everything into writing 

 what artifacts do you plan to use? What tools do you intend to use? And can you describe the scenario you plan to use for the case study? What happened, the incident, the resolution, more like a very short description 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Disc.

 

Analytics and Jail Classification

Objective jail classification is a subject of much controversy in the United States. In this week’s discussion, you will talk about what it is, what are the pros and cons, and how analytics fits into the issue.

Begin by researching objective jail classification. In your original discussion board response, provide a summary of not less than 100 words, describing it. Do not be lax in this. Be specific about the purposes, catalysts, and detractions for the use of objective jail classification. Next, discuss the independent variables which are part of objective jail classification, based on your research. Discuss what independent variables have been used and identified as the most effective in decision tree models. Finally, discuss the ethics of objective jail classification. Cite examples of positive and negative outcomes of its use, and share your perspective on whether or not it is ethical to use it.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud

Cloud services are becoming a major concern in cybersecurity. Discuss how redefined policies will create terms of service with all cloud service providers to ensure that company information and activities are protected with the same degree of security a company would intend to provide on its own.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

policy

In this assignment, you will develop a patch management policy that adheres to corporate change management requirements. Understanding the set of changes conducted to a server or system to improve, update, shore up security vulnerabilities, and remove bugs is often referred to as patching. This action, usually put forward by the vendor, is often automatic in client operating systems.

Create a 250- to 500-word patch management policy that includes the following:

  • Overview: Present a synopsis of the patching policy along with a stated goal.
  • Scope: Identify to whom the policy applies.
  • Quality Assurance Plan: Present a plan that certifies the veracity of the patch and verifies the success of the rollout. Be sure to identify change management requirements for pre- and post-implementation testing.
  • Frequency: Include a defined schedule for all phases of the patching cycle. Be sure to address procedures for emergency patching and approval of exceptions to the patching schedule.
  • Rollback/Reversal Procedure: Include a timeline, notifications, and supporting departments. Be sure to identify change management requirements for developing a rollback/reversal plan should a patch not function as desired.
  • Patching Exceptions: Define the requirements and process for requesting a mitigating control in place of patching.
  • Authorizing Authority: Identify at least two levels up and include organizational notification requirements for both patching and rollback.
  • Audit Controls and Management: Document the process that evidences this policy is being followed in accordance with change management tracking requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SWOT Analysis

SWOT Analysis
As discussed in the chapter, the primary purpose of the SWOT analysis is to identify and assign significant factors that affect the business to one of the four categories to analyze where it stands in the market and help guide an organization’s strategic planning process.

Don’t worry about elaborating on the nature of the strengths, weaknesses, opportunities, and threats; bullet points are sufficient at this stage of the analysis. Just capture the factors that are relevant in each of the four areas using two or three words to describe them.

After listing factors in all four areas, compare your lists side by side to get an overall picture of how the businesses is performing and what issues need to be addressed. Create four prioritized lists by prioritizing the issues by importance and ease of implementation by asking yourself “What needs to and can be addressed now?” and “What can and will have to wait until later?”

Finally, review the prioritized lists by asking:

How can we use our strengths to take advantage of the opportunities identified?
How can we use these strengths to overcome the threats identified?
What do we need to do to overcome the identified weaknesses to take advantage of the listed opportunities?
How can we minimize our weaknesses to overcome the identified threats?
When you have your finalized lists, the SWOT analysis is ready to guide the process of developing corporate and IT strategies. The value of a SWOT analysis depends on how well the analysis is performed. To gain the greatest value from performing a SWOT, carrying out the SWOT early on in the strategic planning process and following these rules helps:

Be realistic about the strengths and weaknesses of your organization.
Be realistic about the size of the opportunities and threats.
Be specific and keep the analysis simple or as simple as possible.
Evaluate your company’s strengths and weaknesses in relation to those of competitors (better than or worse than competitors).
Expect conflicting views because SWOT is subjective, forward-looking, and based on assumptions.
Have Fun with a Personal SWOT
To identify the actions you can take to best meet the requirements of the job or promotion you are seeking, conduct a personal SWOT analysis. To help you understand yourself, picture yourself as a competitive product in the marketplace, and list your strengths, weaknesses, opportunities, or threats from the perspective of a prospective “customer,” that is, your employer. Comparing your strengths and weaknesses to job requirements will help you identify gaps, prepare you to be the best candidate for the position you are seeking, and alert you to issues that could arise in the interview process.

The paper should be three to four pages long following APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit IV Journal

 

Throughout this unit, you were introduced to multimedia (i.e., video, audio, and animation). Thinking about your own web browsing experience, do you expect multimedia to be included on all websites or just certain types of sites? Do you believe multimedia enhances websites? Why, or why not? Give an example of a website that you often visit and how you could improve its use of multimedia.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Graduate Professional Experience II DEC 1

Week 4 Assignment Part 1:

Create a document that contains answers to the following questions:

1. My long-term career goal (3-5 years) is to be a (an):

a. Find this job on a company website or job board and include a link to it or copy and paste the job description.

b. To obtain this position, I foresee myself having to:

c. The date I have set to obtain this career goal is:

Week 4 Assignment Part 2:

2. My ultimate career goal is to be a (an):

a. Find this job on a company website or job board and include a link to it or copy and paste the job description.

b. In this position, I will perform the following tasks:

c. The date I have set to obtain this career tool is:

Your submission should be a minimum of two pages of content in length. Please type all work, save it as a doc or pdf and upload here. All work must be submitted in APA format.

Assignments with a similarity report greater than 10% will not be graded. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study 4-2: IBM

1.How does My developerWorks leverage changes in the way people work?

2.Why do you think Alice Chou carefully monitors the My developerWorks site? What would be an example of an insight she would gain from the data she’s collecting?

3.why do you think Alice chou thinks a rewards program is necessary for my developer’s works, given that so many profiles have already been developed. do you agree that rewards would be necessary?

note: each question answer shoud be 100 words( i needed in 1.30 hour)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now