Cyber Security Phishing Playbook

Need a Cyber Security Phishing Playbook ( Incident Response guide ) 

 A Playbook in cybersecurity is usually referred to as a manual or set of  instructions that can be referenced to follow specific processes and  procedures depending on workflow and circumstances.  The term playbook  is probably borrowed from use in sporting events where teams will  practice specific plays in order to execute them with higher degrees of  efficiency during critical times.  The following is an example of  cybersecurity playbook that is open source found here

https://www.isecom.org/Open-Source-Cybersecurity-Playbook.pdf

heres a example of a Phishing playbook

 https://github.com/counteractive/incident-response-plan-template/blob/master/playbooks/playbook-phishing.md 

PYTHON FUNCTIONS

 

Part 1

Encapsulate the following Python code in a function named my_sqrt that takes a as a parameter, chooses a starting value for x, and returns an estimate of the square root of a. 

while True:
     y = (x + a/x) / 2.0
     if y == x:
          break
     x = y 

Part 2

Write a function named test_sqrt that prints a table like the following using a while loop, where “diff” is the absolute value of the difference between my_sqrt(a) and math.sqrt(a). 

a = 1 | my_sqrt(a) = 1 | math.sqrt(a) = 1.0 | diff = 0.0
a = 2 | my_sqrt(a) = 1.41421356237 | math.sqrt(a) = 1.41421356237 | diff = 2.22044604925e-16
a = 3 | my_sqrt(a) = 1.73205080757 | math.sqrt(a) = 1.73205080757 | diff = 0.0
a = 4 | my_sqrt(a) = 2.0 | math.sqrt(a) = 2.0 | diff = 0.0
a = 5 | my_sqrt(a) = 2.2360679775 | math.sqrt(a) = 2.2360679775 | diff = 0.0
a = 6 | my_sqrt(a) = 2.44948974278 | math.sqrt(a) = 2.44948974278 | diff = 0.0
a = 7 | my_sqrt(a) = 2.64575131106 | math.sqrt(a) = 2.64575131106 | diff = 0.0
a = 8 | my_sqrt(a) = 2.82842712475 | math.sqrt(a) = 2.82842712475 | diff = 4.4408920985e-16
a = 9 | my_sqrt(a) = 3.0 | math.sqrt(a) = 3.0 | diff = 0.0 

Modify your program so that it outputs lines for a values from 1 to 25 instead of just 1 to 9. 

You should submit a script file and a plain text output file (.txt) that contains the test output. Multiple file uploads are permitted.

Your submission will be assessed using the following Aspects.

  1. Does the submission include a my_sqrt function that takes a single argument and includes the while loop from the instructions?
  2. Does the my_sqrt function initialize x and return its final value?
  3. Does the test_sqrt function print a values from 1 to 25?
  4. Does the test_sqrt function print the values returned by my_sqrt for each value of a?
  5. Does the test_sqrt function print correct values from math.sqrt for each value of a?
  6. Does the test_sqrt function print the absolute value of the differences between my_sqrt and math.sqrt for each value of a?
  7. Does the my_sqrt function compute values that are almost identical to math.sqrt (“diff” less than 1e-14)?

CS701 Module2 Assignment

CS701 Module2 Assignment  

General Rules for Homework Assignments 

• You are strongly encouraged to add comments throughout the program. Doing

so will help your facilitator to understand your programming logic and grade you

more accurately. 

• You must work on your assignments individually. You are not allowed to copy the

answers from the others. However, you are encouraged to discuss approaches

to the homework assignment with your facilitator. 

• Each assignment has a strict deadline. However, you are still allowed to submit

your assignment within 2 days after the deadline with a penalty. 15% of the credit

will be deducted unless you made previous arrangements with your facilitator

and professor. Assignments submitted 2 days after the deadline will not be

graded. 

• When the term lastName is referenced in an assignment, please replace it with 

your last name. 

You are strongly encouraged to add comments into your program!  

Create a new folder named HW2_lastName. Write the following programs in this folder. 

Scenario: 

You decided to release the dove residing in your birdcage. But, you are keen in tracking

the flight of the bird. So, you tied a sensor tag to the poor bird and decided to write a

HTML5 application to monitor its path. Since you neither have the bird nor the sensor,

you decided to simulate the path.  

 

Part 1 – Geolocation (30 Points) 

Using the HTML5 Geolocation API, write the LocationTracker.html and the associated

Javascript file LocationTracker.js. You are free to use the html5.css from the samples. 

The initial rendering of the HTML page is shown below with placeholders for the location

details and the Google map. 

 

 

When the Start button is clicked, get the current position using the Geolocaiton API and

display the initial location in the map as shown below. After the initial location is

displayed, use the setInterval method to invoke your method updateMyLocation every 5

seconds. The Start button is disabled from now on.  

The updateMyLocation method simulates the changes in the latitude and longitude as

follows. Generate two random numbers using Math.random() and divide each by 100.

These two numbers represent the changes in the latitude and longitude. Modify the

current location by adding the latitude value and subtracting the longitude value. This will

make the bird only fly in the NorthWest direction. If you are on the Northern border or the

Western border, feel free to keep the bird over the United States (or your country) by the

appropriate changes to the current location. Update the current location in the HTML and

also draw the path in the Google Map as shown in the following screencast: 

https://mymedia.bu.edu/media/CS701_HW2_Clip1/1_y4orrxvm 

 

 

Part2 – HTML5 Drag and Drop and Local Storage (40 points) 

Democrat and Republican senators voting by their party lines through Drag and

Drop. 

The application presents a list of senators and two areas representing Democrats and

Republicans. The senators are dragged and dropped into their respective areas.  

The initial list is loaded through AJAX from the partyList.xml file (provided in the

samples). Each senator is converted to a JSON object keeping track of the properties

name,  party, and voted (true or false). The list of senators is then stored in local storage.

Whenever a senator is dragged and dropped into their respective area, the JSON object is 

updated as voted and the list of senators is updated in the local storage. When the 

application is loaded, the local storage is first checked. If the data is there, the list of

senators is loaded from the local storage, otherwise the AJAX call is made. 

When the data exists in the local storage and the application is loaded, the senators

already dragged into their respective areas should also be populated. Make sure you test

this case. 

Write the partyWise.html and partyWise.js for the application’s functionality. 

The structure of partyList.xml is shown below. 

The initial screen when the application is loaded is shown below. AJAX call is made to

load the senator list. 

If the application is refreshed, the data should be loaded from the local storage: 

After a few drag and drops, the application looks like this: 

Note that the democrats can only be dropped into the Democrats area. Similarly for the

Republicans. You cannot drag and drop the member already voted. 

If the application is quit and then reloaded, the application should resume from the last

snapshot.

 

Part3 – Web Workers and Local Storage (30 Points) 

Your web application starts 5 web workers (computeWorker.js) and sends the messages

to them to compute the sum of all the integers from the specified start value to the

specified end value. The two values are send as a JSON object having start and end

properties. The web worker computes the sum of all the integers from the specified start

value to the specified end value and sends back the result. The result is sent as a JSON

object having start, end, and result properties. The main web application stores all the

results it receives in local storage. 

a) Show the JavaScript code for computeWorker.js.

b) Show the code for the main web application starting the workers and sending

them the messages. The values send for the five web workers can be (1, 1000),

(1001, 2000), (2001, 3000), (3001, 4000), and (4001, 5000), respectively.

c) Show how you will use local storage to record the results as they are being

received. Use a single key in the local storage and store the results received into

an array. Update the user interface as the results arrive from the workers. 

 

Submission: Export your HW2_lastName folder as a zip file, with the

appropriate index.html for the above files, and upload the zip file to the

Assignment section. 

 

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

security requirements for design and implementation of applications

 What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

WK15 08102021

NOTE: **** post answers in separate documents for each Question

      **** Please follow the instructions to

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Exp19_Access_Ch4_Cap – Farm Conference 1.0

 

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_Cap_Farm.accdb. Grader has automatically added your last name to the   beginning of the filename. Save the file to the location where you are   storing your files.

Create   a form using the Form tool based on the Presenters table. Change the title in   the Form Header to Enter/Edit Presenters.

Reduce   the field value control widths to approximately half their original size (to   approximately 3.6″). Delete   the subform.

Sort   the records by LastName in   ascending order. Save the form as Edit Presenters.   Close the form.

Open   the Location Information form in Layout view. Apply the Stacked Layout   control to the form. Save and close the form.

Create   a new report based on the Exhibits   with Presenters query using the Report Wizard. Select all available   fields, choose to view the data by Presenters, ensure that FirstName,   LastName is the only grouping level, use Date as the primary sort field in   ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule.

Apply   the Integral theme to this report only. Save the report.

Modify   the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last   field (appearing to the right of LocationID). In Design view, ensure that the   left edge of the field is at the 8.5-inch mark on the ruler, and then return   to Layout view.

Change   the title of the Presenter Schedule report to Schedule by   Presenter.

Change   the sort so the StartingTime is a   secondary sort field (that is, so that the first sort is Date, and the second   sort is StartingTime). Save and close the report.

Create a new labels report based on the Presenters table. Use the Avery USA 8660   label template. Accept the default font options, and set the labels up so the first and last name appear on the top line, the Address on the second line,   and the City, State, and ZipCode appear on the final line. Your first label   should look like this:
 

Shannon Beck
368 Graham Avenue
Graham, KY 42344
 

  Do not add any sorting. Name the report Presenter Mailing   Labels.   Close the labels.

module 5

Half a page

Locate a case study that describes how a honeypot was used—successfully or not—in an attempt to catch an intruder.  Be resourceful!!