Briefly discuss why it is important to have anti-virus software installed on your computer. Discuss how the software has helped to keep your computer secure.

Briefly discuss why it is important to have anti-virus software installed on your computer. Discuss how the software has helped to keep your computer secure..

anti-virus software

Briefly discuss why it is important to have anti-virus software installed on your computer. Discuss how the software has helped to keep your computer secure.

number 2 250 wrds apa

Is car hacking a reality or a myth? Here is a short clip from the movie After the Sunset (http://youtu.be/vgIncjqT3VE)—can this really happen? From an authentication perspective, what can you do to help prevent car hacking from occurring? This exercise asks you to think critically about the authentication and account management concepts in this unit and then apply them to a potential threat such as car hacking.

Briefly discuss why it is important to have anti-virus software installed on your computer. Discuss how the software has helped to keep your computer secure.

What Are The Physical Security Protocols That You Are Required To Follow And Explain The One You Find Most Annoying?

What Are The Physical Security Protocols That You Are Required To Follow And Explain The One You Find Most Annoying?.

Physical Security Protocols

  1. What is your practical experience with Physical Security Protocols?
  2. In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying?
  3. What do you hope to gain from this weekend’s residency session, that you can apply to your future career?

What Are The Physical Security Protocols That You Are Required To Follow And Explain The One You Find Most Annoying?

Assessing Information System Vulnerabilities And Risk

Assessing Information System Vulnerabilities And Risk.

System Vulnerabilities And Risk

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.

There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  3. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Assessing Information System Vulnerabilities And Risk

Use the following case study of two Universities and their attempts to protect against Laptop theft

Use the following case study of two Universities and their attempts to protect against Laptop theft.

Facility Security Plan

  1. Use the following case study of two Universities and their attempts to protect against Laptop theft
  2. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.154.8259&rep=rep1&type=pdf
  3. Submit a Facility Security Plan that would have helped prevent this organization from experiencing this failure
  4. Submit at least 6 but no more than 10 pages double spaced
  5. No photos or graphs
  6. Reference all sources used
  7. You may submit a second review if you change your mind after submitting the first review, but only the last attempt will be graded
  8. You may use the following guidelines as a template for the content of you FSP(Facility Security Plan)
  9. https://www.dhs.gov/sites/default/files/publications/ISC-Facility-Security-Plan-Guide-2015-508.pdf

Use the following case study of two Universities and their attempts to protect against Laptop theft

The Case for Cloud Applications in Industry from an IS Perspective.

The Case for Cloud Applications in Industry from an IS Perspective..

Cloud Applications

In late 1996 the management of Hershey decided to implement IT in its operations. They started a project named Enterprise21. For this project SAP’s R/3 ERP software, Seibel CRM software and Manugistics SCM software were selected. IBM Global Service was there to facilitate the integration of the selected systems. At that time the recommended time for the implementation of the process was almost 4 years, but the management of the company demanded the completion in 2.5 years. The approach of Big Bang was asked to be used instead of a phased approach in which the implementation process was supposed to go through different steps and phases to reach completion.

Prof Comment: Where did this information come from?

 

There were multiple problems that started to arise in the operations of the company. These included the problems in the processing of orders, fulfillment of orders and the shipment process. The company was not able to meet the deadlines they set for delivery by themselves. These delays caused a lack of credibility and that translated into financial damages soon. The inventory level increased to a dangerous level because of these delays. The failure in the implementation process was announced by the company in the market that caused the decrease in the stock prices of the company. The overall financial damage that the company had to face was hundreds of millions.

Prof Comments:No citations??

 

References:

Chapman, W. (2018). Engineering modeling and design. Routledge.

Kapp, K. M., Latham, W. F., & Ford-Latham, H. (2016). Integrated learning for ERP success: A learning requirements planning approach. CRC press.

Ptak, C. A., & Schragenheim, E. (2016). ERP: tools, techniques, and applications for integrating the supply chain. Crc Press.

Prof Comments:Not APA formatted – books are not scholarly

The Case for Cloud Applications in Industry from an IS Perspective.

What is a DoS attack:How does it work?

What is a DoS attack:How does it work?.

DoS attack

  1.  What is a DoS attack? How does it work?
    Your response should be a minimum of 100 words.
  2.  Explain what a computer worm is and how it functions.
  3. Your response should be a minimum of 100 words.
  4.  Explain what a botnet is and how it is used.
  5. Define and distinguish adware and spyware. Give an example of each.
  6. Outline the history and development of computer viruses.
  7. How should virus writers be classified? Can they all be classified the same way? Why, or why not? Give specific examples.
  8.  What is a Trojan horse virus?

What is a DoS attack:How does it work?

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified..

IT professional

1.  Summarize all three (3) articles in 600 words or more in APA format with reference

2. Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

Discuss at least 3 different concepts presented in the articles. As an IT professional, how would you apply the three (3) concepts you identified.

Give the SQL to create a constraint to the TIMETABLE table to restrict the possible venues to the following 5: Main Group Fitness Studio, Indoor Cycle Studio, Mind and Body Studio, 25m Lap Pool, Warm Water Pool.

Give the SQL to create a constraint to the TIMETABLE table to restrict the possible venues to the following 5: Main Group Fitness Studio, Indoor Cycle Studio, Mind and Body Studio, 25m Lap Pool, Warm Water Pool..

SQL

a. Give the SQL to create the INSTRUCTOR table. Choose appropriate data types.  None of the attributes should be allowed to be null. Include the primary key constraint.

b. Give the SQL to create the TIMETABLE table. Use appropriate data types, and include the primary key and foreign key constraints. Referential integrity should be set such that if an Instructor is deleted from the database, any sessions that she or he is running will also be deleted.

c. Give the SQL to add your own record to the INSTRUCTOR table. Include your name and email, and make up appropriate entries for your Biography and Specialty.

d. Give the SQL to create a constraint to the TIMETABLE table to restrict the possible venues to the following 5: Main Group Fitness Studio, Indoor Cycle Studio, Mind and Body Studio, 25m Lap Pool, Warm Water Pool.

e. Give the SQL to record the fact that all the sessions of the CycleMax class have increased their number of places by 5. (Note: you don’t need to add any actual data to run the query, although you may do so if you wish.)

Give the SQL to create a constraint to the TIMETABLE table to restrict the possible venues to the following 5: Main Group Fitness Studio, Indoor Cycle Studio, Mind and Body Studio, 25m Lap Pool, Warm Water Pool.

Data Loading: When our program starts, it loads all the original data from the data source into our dictionary’s data structure. The data source file is opened once and closed once per run. It must be closed as soon as possible

Data Loading: When our program starts, it loads all the original data from the data source into our dictionary’s data structure. The data source file is opened once and closed once per run. It must be closed as soon as possible.

Data Loading

Our satisfied clients are back to ask us to implement another interactive dictionary. Our dictionary takes input from users and uses the input as search key to look up values associated with the key. Requirements:

  • –  Coding: No hard coding, https://en.wikipedia.org/wiki/Hard_coding .
  • –  Data Source: a text file, Data.CS.SFSU.txt
  • –  Data Loading: When our program starts, it loads all the original data from the data source into our dictionary’s data
    structure. The data source file is opened once and closed once per run. It must be closed as soon as possible. It must be
    closed before our program starts interacting with users.
  • –  Data Structure: Use existing data structure(s) or create new data structure(s) to store our dictionary’s data. Each keyword,
    each part of speech, and each definition must be stored in a separate data field. Do not combine them such as storing
    three parts in one String.
  • –  User Interface: A program interface allows users to input search keys. This interface then displays returned results. Our
    program searches the dictionary’s data (not the data source text file) for values associated with the search keys.
  • –  Identical Output: Our program’s output must be identical to the complete sample run’s output: ASMT02_PC_Run.pdf
    1. Program Analysis to Program Design, 10 points
      In 1 full page, please explain the following in detail:
      ▪ Your analysis of the provided information and the provided sample output. Compare to the ASMT 01 Java version. ▪ What problem you are solving. How it is different from that of ASMT 01.
      ▪ How you load data from the data source. What the steps are. Why these steps.
      ▪ Which data structure(s) you use/create for your dictionary. And why.
    2. Program Implementation, 25 points
      ▪ Does your program work properly?
      ▪ How will you improve your program? ▪ Sample run (not the complete run):

Data Loading: When our program starts, it loads all the original data from the data source into our dictionary’s data structure. The data source file is opened once and closed once per run. It must be closed as soon as possible

Cryptanalysis And Code Breaking

Cryptanalysis And Code Breaking.

Code Breaking

Go read through Kali Linux materials regarding code breaking.  See Category: Password Attacks and select an application and write at least four sentences how this item can be used for password attacks.  There are over 30 software applications detailed at https://tools.kali.org/category/password-attacks.
Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.Crowbar (formally known as Levye) is a brute forcing tool that can be used during penetration tests. It was developed to brute horse some protocols in a different manner according to other popular brute forcing tools. BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.DBPwAudit is a Java tool that allows you to perform online audits of password quality for several database engines. The application design allows for easy adding of additional database drivers by simply copying new JDBC drivers to the jdbc directory.hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL ).

Cryptanalysis And Code Breaking