paraphrase 270 lab report + turnitin.com report.

This is a lab report not a regular paper. I just need this to be paraphrased to show under 10% on turnitin.com. Thanks.

The purpose of this lab is about how to properly configure a pfsense firewall for a server,

how to implement Network Address Translation (NAT), creating a Common Address

Redundancy Protocol (CARP), and creating a Virtual IP and implementing firewall rules. The

purpose of a firewall to protect your internal network from any malicious threats that are out

there on internet.

There are a multitude of settings on a pfsense firewall, part of this lab was to create the

Common Address Redundancy Protocol (CARP) Virtual IP and attach that public address to the

Wide Area Network (WAN). In order for these effects to take place you have to manually apply

the changes on the top tight side tab. After this step you have to use the Network Address

Translation (NAT) feature on the firewall in order to be able to attach that internal IP to the

Outside IP.

The second part of this lab was to create a rule that allows traffic to pass from the public

network to the private network. You have to create several rules in order to make this work, the

internal network is not usually routable but by using NAT you are afforded that ability. The rules

set in place permits certain traffic that you specified to be able to access the public but not vice

versa.

Ultimately using any firewall will make any environment more secured. This will also

involve making sure you are using the firewall as a security device. Just because you have a

firewall doesn’t mean you are protected. You have to make sure you do your due diligence and

configure the firewall to your specific environment needs.

Case Studies II and Cyber Responses

Provide (3) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2. Additionally, answer the question on DISCUSSION 1 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

It has been gone over in the school’s given curriculum, but one instance of a cyber attack that I feel is very important to mention is the success of Stuxnet. While Iran was building what the United States intelligence determined was a nuclear arsenal, the United States and Israel were working in a conjoined effort in building an extremely sophisticated worm – with the purpose of setting back the Iranian nuclear arsenal financially and at least a couple of years. At the time, this was considered groundbreaking levels of technology for a worm, and it was very successful. Stuxnet was unleashed, and centrifuge tubes needed for nuclear construction began spinning erratically, with some becoming damaged while others self destructed entirely. It’s estimated that over two thousand centrifuges were destroyed, and that it set Iran back around two years of progress, and more importantly, valuable economic power to re-purchase the centrifuges. Crucially, if more centrifuges were purchased, it could help confirm the presence of the heavily suspected nuclear facility, enabling potential further action or sanctions onto Iran. 

– DANIEL

RESPONSE 2:

Reported by the Department of Justice (2018), the series of intrusions involving the Fancy Bear Hack Team which include what has been referred to as the DNC hack resulted in an investigation conducted by the FBI. The objective of the agency was to determine the identities of assailants, mechanisms of intrusion and associated actors which in this case comes down to the Russian state through military actors.

In the same DoJ report, the officers of Russia’s Military Unit 26165 researched victims later targeted in a spear-phishing campaign using proxy servers and maintaining command and control infrastructure for the deployment of malware as a mechanism of penetration. From here, the investigative cyber response transitioned to a legal format where officers identified in this unit were charged in a court of law.

Importantly and what is hopefully now common knowledge is that these operations aren’t standalone, and have been emphatically stated to be part of a larger series of Russian cyberespionage and subversion operations which continues now.

Bibliography

Department of Justice. 2018. U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations. Retrieved from: https://www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and.

-JOSHUA

DISCUSSION 1:

Evil Corp, which is known to be a cybercrime organization, is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB) (McCullagh et al., 2006). I can add that, in the United States, precisely in New York, the FBI secretly installed software on two key members of the Genovese crime family’s cell phones, converting them into “roving bugs” that could be remotely activated to eavesdrop in on discussions in a room, even if their owners had switched them off.

However, despite the indictment of its top members in the United States, Evil Corp is still operating in the hacking business, but it may have transitioned into corporate spying services. This organization has stolen masses of dollars from unwary banks. One is the South Korean banks (Allyn, 2019). In the year 2011, hackers used a compromised laptop of an IT support contractor to obtain access to systems belonging to Nonghyup, a South Korean bank. The malware erased vital data on over 100 servers within the network, preventing millions of clients from accessing their accounts and ATMs for three days. Backup files for disaster recovery were also corrupted. I also agree that in another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts.

QUESTION: So you bring up a great point about Russia.  Why are we not doing more?  Why is the United States Government not holding Russia accountable?  Is holding 12 Russian’s responsible enough?

itco425u2ip

 

Assignment Details

Assignment Description

This week, you will identify which components and interfaces will be included in the System Integration Project, and you will discuss the advantages and disadvantages specific to your project.

You are now progressing with laying out the framework for your System Integration Project. It is important that you identify and develop requirements for all of the major components and interfaces that should be included in this project.

Assignment Guidelines

For this week’s assignment, you will be developing the Requirements Specification for this integration. You should use all of the tools available to you to elicit requirements (such as one-on-one interviews with all major stakeholders, surveys, artifact reviews, joint requirement specification meetings, and so forth).

  • New Content (Week 2) 
    • Requirements Specification
      • Describe the process you used to elicit the requirements.
      • List of all of the stakeholders and their roles.
      • Describe of all components and interfaces, including a schematic that depicts them (such as the various layers of integration).
      • Provide detailed and measurable functional requirements.
      • Provide detailed and measurable nonfunctional requirements.
      • List assumptions for the scope of the project.
      • Discuss the pros and cons of proceeding with the project while giving consideration to the requirements you have defined.
  • Make sure that the document is in APA format.
  • Submit the document for grading.

PH -6

 

Question #1. Go to the Website https://toxtown.nlm.nih.gov/sources-of-exposure

Then, on the Sources of Exposure section. There, you would be able to see the source of exposures. Pick one Sources of Exposure the most interest to you and click on the link to open the interactive reference. Choose a location and provide a review of the different type of environmental concerns and chemical contaminants. Note: Be sure to explain the source of chemical exposure, as well as any strategies to minimize or eliminate exposure.

Question #2. Go to the Website       https://www.epa.gov/superfund/search-superfund-sites-where-you-live Links to an external site.   Links to an external site.and and then select Virginia. Choose one of the Superfund sites on the list and provide a brief summary of the site. Discuss any noted community involvement in the discovery or cleanup of the site. Note: Be sure to include a discussion of remediation strategies, as well as the current stage of cleanup at the site.

HINT : Go this website
https://www.epa.gov/superfund/search-superfund-sites-where-you-live

and then select Virginia

Flower Catch Game through SpriteKit

 The challenge of this game is to collect as many as flower with the vase (catcher). Flowers fall down from the top of the screen and user will move the vase and collects flowers. In the above figure the dashed line arrows show possible movement directions of the components. In the game no dashed line will be shown. The game scene runs in gravity. The flower will be left from randomly chosen X points (Y is fix) from the top. User can swipe vase only to the right and/or left to collect them. Once the vase touches a flower, then a score is made, and that particular flower disappears with a sound (for example, http://soundbible.com/1536-Stapler.html). User will be granted 60 sec to collect as much as flowers. On the top-right corner of the game, show the remain time and score. Make sure that not many flowers will release at the same time. You may adapt a strategy to release flowers in a discrete way, such as one flower will be release every 2 – 5 seconds from random coordinates. Make sure that flower and vase sprites are not so small and/or big. A typical size for a flower is 64×64, and for vase image is 100×100. Game ends after 60 seconds, shows the score and a restart button a new game. 

Discussion

 

Topic( Minimum 300 words):

–  What is the impact of rapid environmental changes on organizations? 

– Minimum two references. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index.

Credit Card Management System

 

ITEC 630
Information Systems Analysis, Modeling, and Design
Individual Project Assignment
Purpose
The purpose of the individual system analysis and design project is to demonstrate student’s ability to
apply the knowledge learned in this course to a real-world project.
Topics Suggestions
1. The system analysis and design project must be realistic and it will be done using techniques covered
in this course. The list of topics suggested for this project is as follows:
a) Ticket purchase system (airline, train, cruise, concert, or others)
b) Internet shopping sites (clothing, shoes, books, music, or others)
c) Local real estate agency system
d) Rental system (car, video, or others)
e) Warehouse management system
f) Student record system
g) Banking system
h) Insurance purchase system (life, medical, homeowner, or others)
i) Credit card management system
j) Library circulation system
2. The above list is meant to be suggestive and if you have an idea about a specific topic, please consult
with your instructor early to determine if it is suitable for the course.
3. You have to select and submit the project topic for instructor’s approval by the end of Week 2.

Project Deliverables
The project requires students to perform three phases: (a) requirements analysis, (b) system and database
design, and (c) a project plan. Note that in the phase 3, students are required to use the MS Project
software for their project schedule.
The deadline for the Individual Project can be found in the schedule section of the class syllabus.
The following layout format covering a title page and all three phases is recommended for the project.
Title page (project name, author, and date)
Phase 1: Requirement analysis
A. Problem definition
B. Issues
C. Objectives
D. Requirements
E. Constraints
F. Description of the proposed system
G. Logical model design
1. Data flow diagrams
 Context diagram
 Diagram 0
o Diagram 1 (Diagram 1 is optional)
 Descriptions of processes in each diagram
2. Descriptions of outputs/inputs/performance/security or controls
H. Specific requirements, if any (interface, operational, resource, performance, etc.)
Phase 2: System and database design
A. User interface
Design an overall user interface consisting of screens, commands, controls, and features to
enable users to use the system.
1. How data will be input to the system?
 The physical layout for each input
 The input design and procedures
2. How data will be output from the system?
 The physical layout for each output
 The output design and procedures

B. Data design
Develop a plan for data organization, storage, updating, and retrieval.
1. Database design
 Database tables with their attributes should be presented
 Primary key(s) should be identified in each table, if any
 Three steps of normalization should be included.
2. Entity-relationship diagrams
3. Data file storage and access
C. System architecture
Determine the architecture of the system as Web-based interface, client/server architecture,
Internet/Intranet interface, network configuration, etc.
Phase 3: Project plan
A list of tasks or activities needed for implementing the proposed system
Estimating completion time and costs
A project schedule for performing those activities (Gantt charts or PERT charts)
Note that there is no other required software package except the MS Project software in this ITEC-630
course. As a result, you are only required to use the MS Project software to handle the scheduling part of
the project and for other parts, you can use any word editing software or any drawing tools software.

3 Discussions and 10 Multiple choice Questions attached

1.2 

Because of the housing bubble, many houses are now selling for much less than their selling price just two to three years ago. There is evidence that homeowners with virtually identical houses tend to ask for more if they paid more for the house. What fallacy are they making?

Discussion 2.1

Children in poor neighborhoods have bleak outlooks on life and do not see much gain to studying. A recent experiment is paying children in poor neighborhoods $100 for each “A” they earn in a six-week grade reporting cycle. How does this affect the children’s behavior?

Discussion 2.2

Probably the most important source of capital is human capital. For example, most medical doctors spend years learning to practice medicine. Doctors are willing to make large investments in their human capital because they expect to be compensated for doing so when they begin work. In Canada, the government nationalized the health-care system and reduced doctors’ compensation. Is this a form of post-investment hold-up?

Exp19_Excel_Ch10_ML1_Dow_Jones

 

Exp19_Excel_Ch10_ML1_Dow_Jones

 

You are an intern for Hicks Financial, a small trading company  located in Toledo, Ohio. Your intern supervisor wants you to create a  report that details all trades made in February using current pricing  information from the Dow Jones Index. To complete the task, you will  import and shape data using Power Query. Then you will create data  connections and visualizations of the data.

Use   Get & Transform tools to import and transform Table 0 located in the file   e10m1Index.txt. Split the company column using space as the delimiter at the   left-most occurrence. Rename the respective columns Symbol and Company. Remove the columns Change, %Change, and   Volume. Name the table Dow and load it to the existing worksheet.
   Hint: Get Data is located on the Data tab in the Get & Transform Data   group.

Name the worksheet Current_Price.
   Hint: Double-click the worksheet tab to edit the sheet name.

Use Power Query to import trade   data located in the workbook Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv.    Before loading the data, if necessary use the Power Query Editor to  remove   the columns that contain NULL values. Split the company column  using the left   most space as the delimiter and rename the respective  columns Symbol and Company Name.
   Hint: Get Data is located on the Data tab in the Get & Transform  Data   group. Click Edit on the Import window to load the Power Query  Editor. 

Rename the worksheet Trades.
   Hint: Double click the worksheet tab to edit the sheet name.

Add the Dow table and the Exp19_Excel_Ch10_GRADER_ML1-TradeInfo   table to the Data Model.
   Hint: Manage Data Model is located on the Data tab in the Data Tools group.

Use Power Pivot to create the   following relationship:
 

  Table
Exp19_Excel_Ch10_GRADER_ML1-TradeInfo
 

  Field
Symbol
 

  Table
Dow
 

  Field
Symbol
 

  Hint: Relationships is located on the Data tab in the Data Tools group.

Use Power Pivot to create a   PivotTable with the  EXP19_Excel_Ch110_GRADER_ML1_TradeInfo Date field as a   Filter, Last  Price as a value, and the Dow table Company Name as Rows.
 

  Hint: Power Pivot is an Excel add-in that must be loaded. Power  Pivot can be   loaded by accessing COM add-ins in Excel options. Once  loaded, the Power   Pivot tab is located on the Office ribbon.

Create a Clustered Column   PivotChart based on the PivotTable that compares the trading price of Apple   and Coca-Cola stocks.
 

  Hint: PivotChart is located on the Analyze tab in the Tools group.

Add the chart title Trading   Comparison,   apply Accounting Number Format to cells C4:C5, and name the worksheet Price_Comparison.
   Hint: Chart elements can be added or edited on the Design tab in the Chart   Layouts group. 

Delete Sheet 1, if necessary.
 

  Hint: Delete is located on the Home tab in the Cells group.