I need help in completing my task

 

Complete the following assignment in one MS word document: 

Chapter 3 –discussion question #1-4 & exercise 12

Chapter 4 – discussion question #1-5 & exercise 2

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Below attached are the resources for Chapter 3 and Chapter 4.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux and Windows Comparison

 

Please view the following resources prior to completing this assignment:

For this assignment, you will craft a comparison PowerPoint on Windows and Linux. It’s important to understand how these systems are different, as the process for securing these can be quite different. 

Please ensure your PowerPoint discusses the following questions:

  • How do the filesystems differ between the two?
    • What is the structure?
    • How is file security maintained?
  • How does account management differ?
    • What types of accounts exist in each OS?
    • Where are user files stored in each operating system?
  • How does application management differ between the two?
    • How does one install an application on each OS?
    • How does one keep applications up to date on each OS?
  • What are some unique security features in each operating system? Name at least three.

PowerPoint Requirements

  • Minimum Slides: No minimum. Do what you think is right.
  • Must use proper grammar/spelling/APA formatting.
  • No crazy templates

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

issc242

 

1) Discuss security design principles utilizing different authentication methods and (password) policies.

For example, think about the basic security design principles and how organizations utilize password policies and authentication methods.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

1ssc227

 

What are the different kinds of storage devices available?  How does one determine which to use?

Identify the purposes and characteristics of power supplies

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

team

Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, “I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday.”

Instructions

The project specs require a multi-page design. The app will need to provide an interface to your company’s supply database for reading and entering data remotely as well as the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open-source software library modules.

Provide at least six steps in the SDLC during which security-strengthening behaviors will be applied.

Explain the specific security-relevant actions taken during each step, including the people involved, the considerations taken, and the security assurance methods used.

Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.

Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT Strategy plan

 

The GG Freightways (GGFRT) ITSP attachment has the instruction for this assignment. Assignment is due in 4 hours.

The Case Study is posted, Use the Case Study as the background to develop the assignment. 

You can utilize the ITSP2 IT Roadmap Table Example file (attached) to copy/paste the table into your assignment, then modify the information.

Use Part 1 of the assignment to develop this assignment as this is part 2.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science H week 6 assignment

 

Instructions

You must use the template I provided for this assignment since it will make it a lot easier for you. Failure to do so will result in a return of your paper for you to redo, a reduction in points, or both.

This second assignment also has three parts. 

The first part involves picking something you found interesting from week six, exploring it beyond the readings, and expanding on it in a paper. This section of your paper needs to be at least three pages long and cannot be about something you wrote directly about in a forum.

The second part involves picking one of the critical infrastructures you learned in week four and writing about it using the six guidelines below. You cannot write about the critical infrastructure that you wrote about in the first paper or the forum.

The third part involves picking one of the critical infrastructures you learned in week five and writing about it using the six guidelines below. You cannot write about the critical infrastructure you wrote about in the forum.

It is up to you to decide what will be the most interesting for you! 

You need to use the following outline for each of the two critical infrastructures:

  • Provide a Hypothetical Threat (cyber, natural disaster, or physical)
  • Brief background on the Critical Infrastructure as it relates to National Security
  • Elaborate on the known Risks/Threats/Hazards/Vulnerabilities from the Hypothetical Threat
  • Explain how damage from the Hypothetical Threat could impact the Dependencies/Interdependencies between critical infrastructure sectors
  • Existing Resiliency related to the Continuity of Operations
  • Consider how to Minimize Disruption that improves First Responder Safety. 

Technical Requirements

  • Write at least seven pages, per the guidance above, and include the title page, an abstract, and a reference page (these last three items are not part of the total page count).
  • Scholarly and credible references should be used. A good rule of thumb is at least two sources per content page.
  • Type in Times New Roman, 12 point, and double-spaced.
  • Students will follow the current APA Style (7th Edition) as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science I week 6 assignment

 

Instructions

Instructions: 

This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives.  You are to pick ONE and answer it in 6-8 page paper.  Grading will be based on the rubric.  Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc).  YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY. You must also have a strong introduction, thesis statement and conclusion.

Question #1: Select one of the studies presented in weeks 6 or 7 of this class or another case of your choosing with instructor approval. You might have to look ahead. Write an analysis paper providing more details of the attack, to include the following:

a.   Victim, attacker, and probable motivation for the attack.

b.   Nature and sophistication of the attack.

c.   What was the desired outcome of the attack?

d.   How successful was it?

e.   How effective were the attackers in covering their tracks?

f.    How did the victim respond?

OR  

Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:

a.   How future wars will be fought.

b.   How ethical is cyber warfare?

c.   How the United States is preparing defensively to counter cyber-attacks?

d.   What is next?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Predicting Emerging Trends Digital Artifact

 

  • Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.
    • NASCAR
  • Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option to investigate, 
    •  Blockchain for Data Security

In your role as a consultant in your chosen business scenario, create a digital artifact (student choice: video, animation, presentation, storyboard, report, infographic, etc.) that covers:
  • An executive summary or abstract (integrate business scenario description)
  • The business and/or societal factors that contributed to the interest in and/or growth of this emerging technology
  • The tools and techniques used to gauge and evaluate the usefulness and/or efficiency of this emerging technology

  • 3 scholarly references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Investigation 02

Purpose

In this assignment, you will examine a forensic disk image for evidence of corporate espionage. Read the scenario document carefully, as you may consider it interview notes with your client. This represents a more complex scenario than Investigation 01 and thus contains a greater degree of irrelevant data. Be sure to give yourself plenty of time to perform the examination, and be sure to take advantage of Autopsy’s features to assist your disambiguation.

Instructions

You’ll need to use the following resources to complete the assignment:

  • Investigation 02 Sample Evidence*
  • Autopsy the open-source forensic suite* (or another suite, such as EnCase or FTK.)
  • (Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)

*Accessed via the Virtual Lab.

After reading the Investigation 02 Scenario, open your forensic tool and import the sample evidence into the tool. Begin a forensic report and begin your search. As you do, be sure to take special note of these answers to these questions. These questions represent those that need to be answered to arrive at a logical conclusion to this scenario. They are provided here, but in the future, you will be required to decide these questions on your own.

Scenario

This scenario takes place circa 2008.

M57.biz is a hip web start-up developing a body art catalog. They’ve pulled in over $3 million in funding with a net return of $10 million. The company is small, with only seven employees, including founder Alison Smith. Alison was co-founder with her long-time partner Raoul Perdoga, but she recently forced him out of the business following a nasty break-up.

Current employees are:

  • President: Alison Smith
  • CFO: Jean Jones
  • Programmers: Bob Blackman, Carol Canfred, David Daubert, Emmy Arlington
  • Marketing: Gina Tangers, Harris Jenkins
  • BizDev: Indy Counterching

Despite their recent success, they have a decentralized office. Most people work at home or on the road. Communication and collaboration are primarily by email through their own @m57.biz domain. This worked fine until a spreadsheet containing confidential proprietary company information was posted as an attachment in the technical support forum of a competitor’s website.

The spreadsheet came from CFO Jean’s computer, but she denies any knowledge of the leak. She says that Alison asked her to prepare the spreadsheet as part of a new funding effort and to email it to her. Alison denies she ever asked for the spreadsheet and never received a copy by email. A recreation of the spreadsheet table is found below for you to use.

Questions

  1. When did Jean create the spreadsheet? Jean asserts that she created the spreadsheet after Alison had asked for it by email.
  2. How did the spreadsheet get from Jean’s computer to the competitor’s website? Jean says she emailed it to Alison but denies ever visiting the competitor’s website.
  3. Is anyone else from the company involved? What about people who are not in the company? What possible motive could they have?
  4. If what Jean says is true, what steps can we take to continue our investigation?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now