Categories
Technology

Describe the symptoms and damage that each breach can inflict after compromising a system.

To complete this assignment, you will explain the importance of information and system security for individuals and organizations.
As a part of the Week 3 Traveling Through a Network discussion forum, you used ping commands to become familiar with networking. Explain the type of attack(s) that can be executed using ping commands.
In addition, select two of the following computer security incidents to discuss in more detail:
Security holes/vulnerabilities
Computer viruses
Email spam
Phishing
Password cracking
Social engineering
In your paper
Explain why computer systems are vulnerable to each kind of threat.
Describe the symptoms and damage that each breach can inflict after compromising a system.
Propose at least two recommendations for protecting a computer system or network from each type of security breach.
Support your statements with evidence from your sources.

Categories
Technology

Is the problem an individual level problem, an organizational problem, an industry problem, or a social problem?

Create a problem statement. Your problem must come from a critical issue that must be addressed, otherwise negative consequences will occur or continue. In most cases, scholarly citations within the past 5 years are required to support the problem you will investigate.
Articulate a concise problem statement. Include appropriate published or relevant primary sources to document the existence of a problem worthy of doctoral level research. Follow these steps:
Present the general issue grounded in the research literature that leads to the need for the study.
Clearly describe and document the problem prompting the study. Include appropriate published or relevant primary sources to document the existence of a problem worthy of PhD doctoral-level research. Be sure to consider the following: What perspective is represented? For example, is the problem an individual level problem, an organizational problem, an industry problem, or a social problem?
Consider the theories relevant to predict, explain, and understand the problem.
To identify and articulate a problem, consider the potential negative consequences to the field or stakeholders if the proposed research is never conducted.
Support your assignment with at least five scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.
Length: 1-2 pages, not including title and reference pages
The Topic should be Cyber Security Professionals and skillset and talent. Certain skils cannot be taught. Please review teh attached document to get an idea of my previous paper.

Categories
Technology

How can you use GIS analysis (ArcGIS Pro) to quantify the change of land covers by fire, the extent and how much in statistical numbers?

How can you use GIS analysis (ArcGIS Pro) to quantify the change of land covers by fire, the extent and how much in statistical numbers? Please do not be broad with reply

Categories
Technology

What I need added is the charts or graphs that each stage has on its directions.

Attached is actually a completed paper for the project for stages 1-3. What I need added is the charts or graphs that each stage has on its directions. For example in Stage 1 instructions there are 2 tables that need to be added to the paper under stage 1 (the stage 1 instructions have the examples and where to place them please DO NOT include the grading rubric table). I need this repeated for stage 2 and 3 as well please. The paper doesn’t have to be touched, I just need the tables added in.
I also attached the case study in case you wanted to review it.
Thank you!

Categories
Technology

Hook―How do you establish a connection with your audience so you can get them to “buy into” the idea?

##2 parts to this##
—Part 1 answer the questions on the TedTalk worksheet after watching the two short ted talk videos. Only about 1 page for answers
Ted Talk link—-https://www.ted.com/talks/gabe_zichermann_how_games_make_kids_smarter/transcriipt?language=en
#Second Link– https://www.ted.com/talks/jane_mcgonigal_gaming_can_make_a_better_world?language=en
#############
**Part 2**
Using the format familiar to anyone who has viewed various TED Talks, you will create an impassioned speech that you will use to inform―and perhaps more importantly, persuade―naysayers about the impacts of video games (on students, society, the world at large, etc.).
When you put your speech together you need to follow this format:
1. Hook―How do you establish a connection with your audience so you can get them to “buy into” the idea?
2. Explain the Current Problem―What exactly is the current environmental challenge, what do your peers need to understand about it, and how does impact present and future ecosystems.
3. Share the Current Solutions―What solutions are currently available, how do they work, and what kind of difference can they make?
4. Closing―Reconnect with the audience and close with a passionate call to action.
Students are encourages to think about the following when they are preparing:
· Who is in your audience?
· How can you use humor in your speech?
· What visual will help get your point across?
· Your information must rest on accurate data.
You should be able to answer all of these within your talk, so use them to develop a scriipt for yourself before you begin recording (no fancy background necessary – just take care to have it be as clear a space as possible.

Categories
Technology

Based on the background reading material and your own research, prepare a YouTube video presentation to describe the process of creating an information security risk management procedure.

Based on the background reading material and your own research, prepare a YouTube video presentation to describe the process of creating an information security risk management procedure. Your presentation should be organized in the following way:
Identification, classification, and prioritization of information security risk
control mechanism that could be taken and the strategic options to mitigate and control information risk

Categories
Technology

How do we effectively infer characteristics of situations and usefully supplement them with technology?

nswer the following questions using the course materials as a guide. You can also do additional research.
If users need help for a frequently used interface function, what does this suggest about the system?
How do we effectively infer characteristics of situations and usefully supplement them with technology? In other words, how do we observe situations?
How do the principles of affective computing and context-aware computing provide the designer and user with the proper navigation aids for a particular system or site?

Categories
Technology

Will the ledger and consensus mechanism deliver the security, salability and speed audiences require?

our idea for the company is a business which uses blockchain technology to verify various credentials for multiple end users 1) A employee, 2) an employer and 3) post-secondary institutions and industry institutions (CFA,FRM,CPA etc). This would include post-secondary transcriipts, past work experience, and industry accreditations that are only relevant to specific countries. As a private business, OUR fintech company would establish global partnerships with post-secondary institutions to provide software as a service (SaaS) with integration for publishing of transcriipts (end user 1), and charge employee’s who wish to use our service to verify past work experience (end user 2).
please help me write the below points about the value of the Crypto Asset :
1.Will the ledger and consensus mechanism deliver the security, salability and speed audiences require?
2.Is Zooko’s triangle of centralization, security, scalability considered?
3.Analysis of Ledger and its public/private use by using McKinsey’s 2×2 matrix
4.Is there a 3rd party opinion from an E&Y, D&T, Accenture, etc. from any consulting firm.
if you need more information, please let me know and thank you for our time.

Categories
Technology

Using a graphical program of your choice, create a flowchart or diagram of how the system is architected based on the information given.

PLEASE SEE ATTACHMENT!!
Project Submission Steps
Scenario
You are a Security Analyst for a toll road authority (TRA) in a major city. The TRA is about to undergo its yearly IT audit, and you have been asked to make sure everything goes well and that there are no audit findings.
The TRA has eight toll road plazas with multiple lanes. Three lanes are for vehicles with prepaid toll tags. The other three are for drivers paying in cash. In addition, there are several on ramps and off ramps with toll tag sensors that automatically debit the customer’s account when the vehicle passes through.
All toll plazas and ramps are equipped with cameras that record vehicles passing through them. They also take pictures of each vehicle’s license plate in case the driver does not have a toll tag. The pictures are then examined by advanced imaging software that determines the plate number, identifies the name and address of the driver associated with that vehicle, and sends a bill to that address notifying the driver of the charge, along with instructions on how to pay it (this is a drastic oversimplification of how the toll violations process actually works, but for the purpose of this project it will suffice).
1. Using a graphical program of your choice, create a flowchart or diagram of how the system is architected based on the information given.
a. LucidChart and Draw.io are two free flowcharting options that should suffice.
2. Assume there are firewalls protecting the network perimeter and that only port 443 is being allowed to the web servers. Also assume that the web servers are located in a DMZ, the WebLogic servers are on the internal network, and
WebLogic server connections come only from proxied web server requests.
NOTE: The toll violation process is NOT in scope for this exercise.
3. Creating a test plan to assess the following:
● Web site security. There are some concerns about some of the fields not being properly coded.
● WebLogic servers. One of the servers was the victim of a “coinminer attack” last year due to an unpatched vulnerability. This attack impacted the availability of the server by causing the CPU utilization to spike past 70%There is tremendous concern, therefore, around the effectiveness of the patch management process. In addition, some WebLogic Server configuration data (and some of the applications, including JSP and HTML pages guarded with WebLogic Server acls) are stored in clear text on the file system. A user or intruder with read access to files and directories can easily defeat any application security established with WebLogic Server authentication and authorization.

Categories
Technology

What python code would you use to filter your data by your stated parameters?

When do you think a time to filter your data would be important. Give me a real world example. What python code would you use to filter your data by your stated parameters? For example (do not use this example), During the current COVID-19 crisis, your boss may want you to filter by date or results.