Computer Science
[SOLVED] Network Access Control
High-level Overview Presentation Scenario Look back at the three previous assignments, Network Access Control, the Cost of Inadequate Controls, and Access Control Strategy Approach. Reflect on the work that you and your IT Security team did for LOTR. In these first three assignments, upper management and the Board of Directors for LOTR asked you to review and repair various access control issues. They have now asked that you create a presentation that will review all the changes that you have implemented to improve access control security. For this final presentation, they have asked for a high-level overview of the procedures you implemented to improve Network Access Control and the newly mapped access controls. They also want you to create a security checklist that can be used to conduct annual access control audits. Finally, they have asked you to make recommendations for three websites that include security RSS feeds to keep the company abreast of possible future security issues and exploits. Instructions To complete this assignment, you have two options. You may either create a PowerPoint presentation or a video presentation that includes a high-level overview according to the following criteria: Summarize the access controls implemented at LOTR. Please provide a brief rationale for each of the recommended and implemented controls. Create a security checklist that can be used to conduct annual access control audits. Recommend three security websites with the ability to set up a corporate RSS feed. Explain why you selected these three sites. Note: Please use three quality resources for this last step. Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: For PowerPoint submissions, do the following Your PowerPoint presentation must be submitted as a functional, valid .PPT file through the Blackboard course shell. Include a title slide containing the title of the assignment, your name, the professor’s name, the course title, and the date. For video submissions, do the following: Please submit a valid link to your video in the Blackboard course shell. Your professor must be able to see and hear you clearly in the video. In addition to your video link, you must also submit a written summary of the points you cover in the video. Think of your written summary as the “hand-out” you would submit to upper management if you were giving your video presentation in person. Include a title page containing the title of the assignment, your name, the professor’s name, the course title, and the date. Please contact your professor if you have any questions about the assignment requirements. For more information on Network Access Control read this: https://en.wikipedia.org/wiki/Network_Access_Control
[SOLVED] Data Mining Technologies
For this project, select an organization that has leveraged Data Mining technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Data Mining to overcome their challenges. The paper should include the following sections each called out with a header. Company Overview: The section should include the company name, the industry they are in, and a general overview of the organization. Challenges: Discuss the challenges that limited their profitability and/or competitiveness and how they planned to leverage Data Mining to overcome their challenges. Solution: Describe the organizations Data Mining implementation and the benefits they realized from the implementation. What was the result of implementing Data Mining? Did they meet their objectives for fall short? Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success. For more information on Data Mining Technologies read this: https://en.wikipedia.org/wiki/Technology_mining
[SOLVED] Workstation Protection
Workstation Protection Reading – Chapter 20 and 21 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 For more information on Workstation Protection read this: https://en.wikipedia.org/wiki/Workstation
[SOLVED] Denial of Service
Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_05_projects_Jones.doc) The computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this module and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology. After reading the information presented in this module and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies systems. Denial of service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this module and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security threat. What is the relationship between DDoS and IoT devices? Discuss. After reading the information presented in this module and other sources, write a one-page paper that lists three antivirus software applications; include one advantage and one disadvantage of each. Which one do you recommend for the student lab mentioned in Project 1? What are the bases for your recommendation? Is antivirus software alone sufficient to protect the security of a network? Why and why not? After reading the information presented in this module and other sources, write a one-page paper that identifies three companies (in addition to those mentioned in this book) that are using biometric security measures for authentication. Why has each company chosen this alternative over other security measures? What are two advantages and two disadvantages of biometrics as a security measure? After reading the information presented in this module and other sources, write a two-page paper that offers five recommendations for improving the security of online transactions. List two companies that provide preventive measures for e-commerce sites. What are included in their offerings? What are the costs? When you purchase from online businesses, how do you know that a Web site is secure? For more information on Denial of Service read this: https://en.wikipedia.org/wiki/Denial_of_Service
[SOLVED] Common Rule
The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the Universitys institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article. Please answer the following questions in your main post: What are the main issues that the article addresses? What is the Common Rule? How is this issue related to information systems and digital privacy? At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. For more information on Common Rule read this: https://en.wikipedia.org/wiki/Common_Rule
[SOLVED] Threat Actors
Step 6: Examine and Identify Known AttributesAttribution is often difficult, if not impossible, to identify. One reason isthe anonymity afforded by the internet. Another reason is the potentialsophistication of malicious state actors and nonstate actors who arable to disguise themselves and/or exploit an innocent and oftenunknowing computer user to achieve their goals.Attribution is desired because knowing who is behind an exploit canprovide insight into the motivations, intentions, and capabilities ofthreat actors. Understanding attack vectors used by threat actorsprovides key insights that help to build stronger defenses and constructbetter policy management.To complete your vulnerability assessment, you will need to first do thefollowing:? From the attack vectors identified in the previous step, determineif attribution is known for the threat actor (e.g., name of nationstate, nonstate and/or hackers and threat actors) most likelyinvolved in exploiting each weakness.? Categorize the threat actor(s) based on attribution for previousexploits, likely targets, and rationale(s) for targeting/exploitation(e.g., profit, political statements, extortion, etc.).In the next step, you will compile your findings from the past few stepson a spreadsheet.Step 7: Submit a Vulnerability Assessment SpreadsheetFrom the results of Steps 4, 5, and 6, develop and submit aspreadsheet that includes the following:? characterization of current and emerging vulnerabilities andthreats? identification of the attack vector(s) employed against each? your assessment (high, medium, or low) of the impact thevulnerability could have on your organizationMake sure to address security architectures, including components,specifications, guidelines, standards, technologies, etc. Also considerinternational threats and attack vectors. This assessment will beincluded in your final presentation.Submission for Vulnerability AssessmentPrevious submissions0Drop files here, or click below.Add FilesIn the next step, you will consider ways to address the vulnerabilitiesand threats identified.
[SOLVED] The Security Issues
Active Directory: If they are segmented within each physical location, having the additional domains would definitely make sense. In terms of some of the problems with the security issues, what ways can we effectively deal with that? Could this add too much complexity to manage for a smaller group?
[SOLVED] Chomp
The code in project2 is for a program that plays a simple game called Chomp. The programmers of this project have opted to package some of their code in a module called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated. The steps necessary to produce this program are: Run the command csplit chomp.adt “/Split Here/” and copy the resulting file xx00 to cookie.h. Run the command csplit chomp.adt “/Split Here/” and copy the resulting file xx01 to cookie.cpp. Compile cookie.cpp to produce cookie.o. Compile mainProg.cpp to produce mainProg.o. Link the the .o files to produce an executable program named playChomp Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch. _________________________________________________ I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile: all: cookie.h cookie.cpp playChomp cookie.o mainProg.o cookie.h: chomp.adt csplit chomp.adt “/Split Here/” cp xx00 cookie.h cp xx01 cookie.cpp playChomp: cookie.o mainProg.o g++ -o playChomp cookie.o mainProg.o cookie.o: cookie.cpp g++ -c cookie.cpp mainProg.o: mainProg.cpp g++ -c mainProg.cpp However, I am receiving this error code: Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed: csplit chomp.adt “/Split Here/” 1372 8632 cp xx00 cookie.h cp xx01 cookie.cpp g++ -c cookie.cpp g++ -o playChomp cookie.o mainProg.o is there anything that I can do to fix my makefile? For more information on Chomp read this: https://en.wikipedia.org/wiki/Chomp
[SOLVED] CEO Technology
Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc. Define each of the maturity stages and performance dimensions. What are the key concepts from each section? For more information on CEO Technology read this: https://en.wikipedia.org/w/index.php?search=CEO+Technology&title=Special%3ASearch&go=Go&ns0=1
[SOLVED] Thematic
I would like you to fix my thematic paper. Also, I want my paper to have full 3 pages ( not include title and citation paper). Must be APA 7 edition, time new roman, 12 front, and double space. For more information on Thematic read this: https://en.wikipedia.org/wiki/Theme
Use Promo Code: FIRST15