Computer Science
IT Networking
1)Research and define a complex and realistic network setup, including specific devices that would make part of the network.2) Research 2 vectors, that hackers could use to gain access to the network (or parts of it), as well as mitigation solutions to protect against such attacks.3) Write a report to document the research carried out.REPORT STRUCTURE:A 5-page IEEE double column format report including all figures, tables and references.1. Executive Summary Brief description of the scope and objectives. Brief description of the network and justification why you chose this network type. Summary of key findings and recommendations.2. Network Setup Describe the process you followed to define the network setup (e.g., researched network types, researched specific devices, etc.). Discuss the aspects that make this a realistic and complex network setup. Page 1 of 3 Draw and include a diagram of your network setup. Note that if you choose a large network you should only draw its main components and devices (e.g., do not draw tens or hundreds of clients but draw a client device from different categories such as HR, IT, lecturer, student, etc.). Describe the network characteristics, its type (e.g., LAN, WAN, etc.), its purpose (e.g., home network, SME network with only company devices or both company and BYOD devices, campus network, hospital network, etc.). Include a summary table of the main devices making up the network (e.g., client devices, servers, routers, switches, appliance firewalls, IoT devices, etc.). For each specific device or device class include the main hardware (e.g., manufacturer, model), and software details (e.g., OS, main service application like Apache/IIS web server, main client application, etc.). Do not include too many details, but include details that are important for the attack vector (e.g., mention your network card chip and firmware if you will discuss some vulnerability with them, mention the vulnerable client application that can be exploited such as MS Word, Chrome, or Zoom, etc.). Assumptions that you make related to your network setup (e.g., if client devices run older OS version like Windows 7 or Android 8, provide some market share statistics or estimates to show the percentage of devices using this version globally or in specific context, e.g., hospitals). Your main assumption is that the network and devices are quite secure, so focus on recent vulnerabilities and attacks (e.g., from the past 2-3 years). The idea is not to just have a generic diagram but a personalised network. For example, if you choose to focus on a home network, personalise it with specific devices you personally have (e.g., smartphones, laptop/desktop PCs, gateway/router, TVs, game console, IP camera or other IoT devices, etc.), and if your network would be too basic expand it by adding some more specific devices that you would like to have. If you choose to focus on a company network, connect to your work experience (if you have any) and/or do some research and exemplify with specific routers/switches/firewalls that a company may use (e.g., by Cisco, Juniper, etc.), servers and/or client desktops/laptops that a company may use (e.g., by Dell, Apple, etc.), client devices that BYOD employees would potentially use (e.g., Windows / Mac OS / Linux laptops, iPhones, Android Smartphones, etc.). Note that you may also consider that many companies use cloud services, rather than buying and maintaining their own HW servers. Make sure to cite all relevant sources you consult while defining your network setup.3. Attack Vectors Start the section with a paragraph summarising how the attack vectors are different (e.g., in terms of techniques, targeted technologies / devices, vulnerabilities, exploits, etc.). It would also be good to include a table summarising the main characteristics of the attack vectors (e.g., type, techniques, vulnerability CVE and name, exploit, etc.). Have a separate subsection with meaningful heading for each of the attack vectors. In each subsection include a detailed description of the attack vector, interpretation and critical analysisof the findings. The details can include but may not be limited to:o Motives(e.g.,eavesdrop,monitoractivity,stealinformation,ransom,etc.).o Techniques(e.g.,physicalaccess,socialengineering,firewallbypassing,passwordattacks,DDoS,implanting malware, exploiting software vulnerabilities, etc.).o Targetdevices/technologieswhichspecificdevicesand/ortechnologiesfromyournetworkarebeing targeted (e.g., wireless technologies WiFi / 4G / Bluetooth, network devices like routers /switches / appliance firewalls, servers, client devices, IoT devices, etc.).o Vulnerabilities (e.g., in hardware, software, protocols). Include CVE numbers and details aboutspecific vulnerabilities that could be exploited as part of the attack (e.g., you can search databasessuch as https://cve.mitre.org/ or https://nvd.nist.gov/).o Exploits detail any known exploits for the vulnerabilities (e.g., you can search Google and/orexploit databases such as https://www.exploit-db.com/).o Impactoftheattackifsuccessful.o Reference and briefly describe real world security incidents that used this attack vector onindividuals or companies to support your answers.Page 2 of 34. Mitigation Solutions Research and discuss mitigation solutions and provide recommendations on how individuals / organisations can protect themselves against these attacks (e.g., best practices, firewalls, IDS, anti-virus, network segregation, VLANs, etc.). Reference and discuss specific patches/update numbers, new guidelines (e.g., NIST SP 800-63 B (2020) for password guidance), or legislation (e.g., California bans default passwords), new standards (e.g., WPA3), and discuss what would be the consequences for the users (e.g., using stronger passwords may be cheaper than buying WPA3 access points).5. Conclusions Include an overall discussion of the main findings, limitations and implications. Detail next steps (i.e., what else would you do if you had more time).
History of Computer and History of Internet
1. Describe the history of computers. 2. Describe the history of the Internet. 3. Describe the three Internet categories. How to Submit Your Answers: Copy each of the above questions and paste it into a Microsoft Word document. Format the questions in bold, and your answer in regular. Separate each response with a double-space.
Genetic Algorithm Application
review of genetic algorithm application with No need to specify the area of application, the genetic algorithm area need to be in computer science perspective
Data Analysis outline
ASSIGNMENT: Data Analysis OutlineASSIGNMENT: DATA ANALYSIS DRAFT SUMMARYNow that you have collected data using your survey, it is time to prepare to write your report. Use the following description of the sections required for the report to make an outline of your report.For this assignment, you are to write a sentence outline. In this outline, include the topic sentence for each paragraph you plan to include in the report. For credit, the sentence outline must include specific information about your project, not generic sentences. Present your actual results, discussion, and recommendation.To help you get started, here is an explanation the report, as well as an explanation of what should be in each section:Writing the Lab-Style ReportWere going to use a lab-style report for writing about your survey results. Whether youre in healthcare, engineering, education, or the social sciences, the lab report is the general format for writing up primary research. It contains specific sections, which will be discussed below.Sections to Include in Your ReportYour report must include the following sections with the contents described below.Introduction: Give some background on your topic here, and lead the reader into your research question or hypothesis. Conclude by naming your primary research method and at least one major finding from your results in this section. I almost always write this section LAST because its hard to summarize your findings when you havent written about them yet. (150-200 words in final draft)Methods: In this short section, describe how you gathered your data. (200-250 words in final draft)Results: This should be the meat of your report. In this section, discuss the results of your data collection. What did you discover? Use at least one graphic to illustrate some of your results. (250-300 words in final draft)Discussion: This iswhere you analyze your results. Discuss the following:Did any results contradict or support your hypotheses?Did you make any connections between answers?Were there any trends in the answers you got?What ideas or hypotheses do your results prove?What are the limitations of your study? (400-500 words in final draft)Recommendation: In this section, summarize your major findings and help your reader understand what should be done with your results. Should some action be taken based on these results? Who should take that action? How should your results shape policy? What are the implications of your research on the future of your topic? (350-400 words in final draft)Appendices: Use this section to add copies of your survey, your data tabulations in an Excel spreadsheet, and any other material that is relevant and referred to, but did not find a place in your report.
Risk Frameworks
Select a financial institution, high-tech manufacturer, or a hospital that has no fewer than 500 employees and provide guidance regarding the risks faced by the organization. Consider the organization that you select and name, as well as the industry in your response. Your guidance is directed to the Chief Information Officer (CIO) as a result of the concern during a period where the Chief Security Office (CSO) is not available. You need to fill in for the CIO.Review key external influences on risk and then outline the most important influences from within the organization. Start by selecting any appropriate laws, standards, frameworks, and theories that should underscore your guidance. Use the foundation to establish a strong framework allowing you to provide a convincing and logical response, leading to the acceptance of your guidance. Your response should be persuasive and supported by both scholarly sources and especially any relevant legislation, standards, frameworks, and theories. Despite the formal foundation, including a strong focus on practical issues and values. Note that the focus is on risk and guidance, not mitigation.
Security And Privacy Compliance Standards
The assignment must be a minimum of 2-full pages in length with a minimum of 2 – sources. Please be sure to follow APA v6 guidelines for the entire paper. Assignment Requirements. Research and compare (this means, actually compare them. Do not simply list them individually) the Cyber Incident response requirements for at least two of the major security and privacy compliance standards, such as HIPAA, PCI DSS, FERPA, COPPA, FACTA, ECPA. Does the policy require an Incident Response capability? What are the requirements? How are they different? How are they similar? For more information on Security And Privacy, Compliance Standards read this: https://en.wikipedia.org/wiki/Privacy_policy
Information System Analysis
As more companies outsource systems development, will there be less need for in-house systems analysts? Why or why not?
Hacking
Common Hacking Techniques You Should Know About Hacking is the process of gaining unauthorized access into a computer system or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Discussion/Research Questions What are the best ways to guard against hacking attacks? List one of the biggest (known) hacks of all time and provide a few details related to this incident For more information on Hacking read this: https://en.wikipedia.org/wiki/Hacker
[SOLVED] Coronavirus Data
Please answer the following questions. Include any R-script that you may have used to justify your answers, and discuss your methodology on how you found your information.1) Based on what we learned in Module 2, import the csv file from the following URL. This is a file of the coronavirus data within the US territory recorded on January 1, 2021, by Johns Hopkins University.https://github.com/CSSEGISandData/COVID-19/raw/master/csse_covid_19_data/csse_covid_19_daily_reports_us/01-01-2021.csvUse the functions from the dplyr package to filter out the observations of states names that start with M. What is the mean number of Recovered patients from this subset?2) From the same subset of states that start with M, create a new variable named Ratio, which is the value of Active cases divided by Confirmed cases. What is the maximum value of Ratio in this subset?
Use Promo Code: FIRST15