Android studio Project
Remote Access Risks Responses
Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
Virtual Private Networks (VPN) may be getting more utilization over the last year and half than ever before. Simply because it seems more and more people are teleworking due to COVID 19. Some types of VPNs are Point to Point Tunneling Protocols (PPTP), OpenVPN and Secure Socket Tunneling Protocol (SSTP). All of these VPNs are utilized for the purpose of creating a secure tunnel or linkage from a private network to a public network. This enables the user to send and receive data as if they were connected to a private network.
PPTP is one of the oldest versions of a VPN, due to it being one of the oldest versions it is also considered one of the more vulnerable VPNs. The PPTP does offer quicker connection speeds than some of the other VPNs, but lacks some of the more secure features of modern modems. The OpenVPN has grown in popularity as it is deemed almost unbreakable due to it’s strong encryption and authentication. Lastly, the SSTP is popular due to it being compatible with most Microsoft applications. The downside to the SSTP is it is proprietary property and developers do not have the underlying code. However, this may not be a downside to Microsoft or Microsoft users as it could help enhance the security of the VPN.
Though VPNs are a means to secure data on a public network, anything that touches the internet is vulnerable to being hacked. Some of the techniques used to circumvent VPNs are, malicious ads (bait and switch), login credentials and DDOS attacks. Malicious ads can carry malware, if users are not able to identify the fraudulent add before clicking the add, malware could be loaded onto the machine. Log-in credentials can stolen and used to connect to a VPN, again this is up to the user to secure their data, if users are careless with their passwords, VPN security can be circumvented. Lastly, DDOS attacks can be utilized against VPNs, however depending on the type of VPN utilized a DDOS attack could be thwarted, but it is a technique utilized by havers.
Overall VPNs are effective at thwarting most attacks to a network and are encouraged for use.
V/r
Jeff Cannon
https://www.technadu.com/can-vpn-be-hacked/45630/
https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols
RESPONSE 2:
Virtual Private Network (VPN) allows for a private network connection over the Internet. VPNs creates a secure tunnel for the transmission of network traffic. There are two types of VPNs: remote access and site-to-site.
Remote access VPN allows users to connect via a secure VPN tunnel to access a private networks services and resources while off-site. Remote VPNs also serve to bypass regional Internet restrictions by routing your connection using a different patch where those restrictions do not exist.
Site-to-site VPN or router-to-router VPN is used by larger companies that have satellite office in different locations. Site-to-site VPN allows those satellite locations to connect to other sites within their network structure.
Although VPNs are used to establish a secure connection over the Internet, they are still subject to security risks depending on the type of encryption algorithm used to secure the connection. Encryption of these tunnels can be broken is there are known vulnerabilities or if the encryption key is accessed by a bad actor. The success of stealing encryption keys uses multiple tactics like trickery, computing power, time dedicated to breaking keys, and behind-the-scenes persuasion (VPN Mentor, 2021). Another existing vulnerability for VPNs tracing of your location based on IP leaks via your web browser during the transmission network traffic.
-Claudia
References:
Geeks for Geeks. (10 April 2019). Types of Virtual Private Network (VPNS) and it Protocols. Retrieved 18 August 2021 from https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/
VPN Mentor (27 Jun 2021). Can VPNs Be Hacked? We Did The Research, Here’s the 2021 Guide. Retrieved 18 August 2021 from https://www.vpnmentor.com/blog/can-vpns-hacked-take-deeper-look/
Portfolio
discuss a current business process in a specific industry.
Note the following:
-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy.
Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
Note the pros and cons of the technology selected.
Note various factors the business should consider prior to deploying the new technology.
BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY
TOPIC 5: Mobile App Planning and Design
Assessment Description
The purpose of this assignment is to execute key steps in the mobile app planning and design process and to explain how mobile technology and apps can be used to drive business results and create competitive advantage.
Part 1 – Review How to Build a Mobile App Requirements Document
Before working on the assignment, review the “How to Build a Mobile App Requirements Document,” located in the topic Resources, to learn the process of designing a mobile app. https://clearbridgemobile.com/how-to-build-a-mobile-app-requirements-document/
The PowerPoint presentation you will create for this assignment should include the following:
- Business requirements, mobile app objectives, and product vision statement.
- Target audience and user journey.
- List of features.
- Monetization model.
- Product and technical specification.
- Platforms for which the app is being developed.
- Maintenance and upgrade requirements.
- Dependencies, assumptions, constraints, and submission.
- Explanation of how the app could create a competitive advantage for the organization.
- Discussion on how tenets of servant leadership and conscious capitalism can be applied to the project to use business as a force for good to improve society and help communities prosper.
- Documentation of sources: correct citation of research references in APA reference format.
Part 2 – Choosing a Sustainable Development Goal
One of the key principles of the Colangelo College of Business is that business is a force for good to improve society and help communities prosper. For this assignment, consider the GCU’s “Statement on the Integration of Faith and Work,” located in the topic Resources, and the tenets of servant leadership, conscious capitalism, and the sustainable development goals described in “Measuring Progress Towards the Sustainable Development Goals,” also located in the topic Resources.
Select a sustainable development goal from the list of sustainable development goals located in the topic Resources. Choose a goal that you would like to promote. Here is the list of sustainable development goals:
- End poverty in all its forms everywhere.
- End hunger, achieve food security and improved nutrition, and promote sustainable agriculture.
- Ensure healthy lives and promote well-being for all at all ages.
- Ensure inclusive and quality education for all and promote lifelong learning.
- Achieve gender equality and empower all women and girls.
- Ensure access to water and sanitation for all.
- Ensure access to affordable, reliable, sustainable and modern energy for all.
- Promote inclusive and sustainable economic growth, employment, and decent work for all.
- Build resilient infrastructure, promote sustainable industrialization, and foster innovation.
- Reduce inequality within and among countries.
- Make cities inclusive, safe, resilient, and sustainable.
- Ensure sustainable consumption and production patterns.
- Take urgent action to combat climate change and its effects.
- Conserve and sustainably use the oceans, seas, and marine resources.
- Sustainably manage forests, combat desertification, halt and reverse land degradation, and halt biodiversity loss.
- Promote just, peaceful, and inclusive societies.
- Revitalize the global partnership for sustainable development.
Part 3 – Creating the PowerPoint Presentation
Imagine that your company is partnering with the United Nations to plan and design a mobile app as part of an initiative to fundraise and increase awareness about your selected sustainable development goal.
Create a PowerPoint presentation (10 slides minimum) that includes the following:
- Outlines the development plan and design specifics of the mobile app.
- Explains how the app can be used to drive business results and create business as a force for good.
- Includes speaker notes to provide details about the content of each slide.
- Includes discussion of the importance of business being a force for good to improve society and help communities prosper.
- Includes how the tenets of servant leadership and conscious capitalism can be applied to the project to ensure this is appropriate.
Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.
Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style.
General Requirements
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.
paper on data and privacy in social media
write 25 pages on data and privacy in social media
references should be 50 and done by both a footnote and Harvard (each one on a separate page)
OPERATING SYSTEM -9
Week 9 Assignment:
- Describe the CIA security concepts as related to operating systems. (Confidentiality, Integrity, Authentication, Authorization, and Availability.)
- From the list, describe three common methods used to exploit weaknesses in an operating systems, and describe ways to mitigate these risks. (Spoofing, deception, man in the middle, back door, Trojan Horse, rootkit, etc.)
Submit a two to three page paper in APA format.
Week 7 Assignment
Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.
However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.
So, I am attaching a couple research papers. Please check out them out in which can be found in the Supplemental Materials folder.
Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime.
I would like you to read these papers – who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.
Instructions
Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you have a preference for the other models and if so what is your preference and why? Note – there are NO right or wrong answers here. I value your insights. No more than 2 pages please
Application title: Mobile Phone Purchase
Application title: Mobile Phone Purchase
Purpose: This windows application calculates the cost for a mobile phone from the Mobile Phone Store.
Program
Procedures: From a windows application, a buyer selects a mobile telephone for purchase. The buyer also can elect to buy a charger for the particular phone. A buyer is either in the store or is buying over the internet. The program calculates the cost of the phone and charger purchased.
Algorithms, Processing, and conditions:
1. The consumer enters their last name, street address, and zip code. If buying over the internet, the buyer also enters an email address.
2. The buyer selects a phone from a list of phones.
3. The user can select the type of charger from the list of chargers.
4. Based on the phone and charger selected, the program calculates the total cost.
5. The total cost for a store purchase must include 7.75% sales tax. No sales tax is included for internet sales.
6. An internet sale generates a shipping charge of $28.00.
7. The types of phones an their costs are: Blasstur 451: $279.81; Elecque 9801: $193.71; Gainlet 3: $328,44; Nomadic 2900: $253.72; Querta 332: $479.36.
8. Three types of chargers are available: Auto: $63.92; Mobile: $42.66; Desktop: $27.31.
9. Write a comma-delimited text file to record each sale. The text file should contain the user last name, zip code, phone choice, charger style, and total cost.
Notes and Restrictions:
1. Validate data the user enters using accepted standards.
2. In-store is the default of buyer.
3. The Email label and text box does not display unless the user is an Internet buyer. An Internet buyer must enter an email address.
Comments:
1. The picture shown in the application has been inlcuded. Its name is cell phone.jpg.
2. The program should use a three-tiered structure with presentation, business, and persistence classes.
USE CASE DEFINITION
1. The user views the opening screen
2. the user enters last name, street address, and zip code
3. The user selects a phone from the phone choice list and, if desired, a charger from the charger style list.
4. The user selects either In-store or Internet as the type of buyer. If an Internet buyer, the user must enter an email address.
5. The user clicks the Calculate Cost button.
6. The program displays the cost of the sale.
7. The program writes a record of the sale in a text file.
8. The user can click the clear form button to enter another sale.
Other notes: I need an event planning document and the entire VB project
Disaster Recovery Plan
Create a disaster recovery
plan for a fictitious business with the following characteristics: is an urgent care clinic, contains 4 doctors 10 nurses and 2 nurse practitioners, are open 7 days a week 18 hours per day, and the primary service is to treat patients.
Mgmt of information systems Research paper 3
How do we manage systems and describing the system development life cycle.