Project

 

You are a data analyst working for a major bank. Over the past 10 years, the bank has invested a considerable amount of money in the use of big data analytics. The bank is considering ceasing financial support of this program. In a 10-page report, evaluate the impact that big data analytics has had on the banking industry and why it is important to continue investing into this program. Key areas to consider are the following:

  • Fraud detection
  • Marketing
  • Credit risk management

Vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words.

10p1

4-5 pages and must include minimum 5 scholarly references. The page requirements listed below apply to the project and not the final capstone. It important that students follow the capstone format/subheadings for both proposal and capstone. Questions concerning APA format,

Computer Science 505 assignment 7

Business Case: Red Star National Hospital system has 4 hospitals (H1, H2, H3, and H4). They need your service to establish a new data communication Network.  

The location of  H1: Fairfax, VA  

The location of   H2: Dallas, TX

The location of   H3: Los Angeles, CA

The location of  H4: Columbus, OH

WIDE AREA NETWORK REQUIREMENTS (EXPECTATIONS)

  • Hospitals must be connected to each other based on given extranet data rate requirements
  • The patient files will be located in the main hospital (H1) and shared with all computers within the system using the file transfer applications.
  • Here are the given expected data rates between hospitals

EXTRANET DATA RATE REQUIREMENTS

Requested data speed from H1 to H2

10 Gbps

Requested data speed from H1-H3

8 Gbps

Requested data speed from H1-H4

80 Mbps

Requested data speed from H2-H3

12 Mbps

Requested data speed from H2-H4

2 Mbps

Your team will be developing the WAN network design. Prepare your recommendations by covering the following section.

Question 1 Draw the block diagram and clearly indicate the network topology you would prefer to connect all four Hospital sites. You may use USA Map to draw a network diagram. Download USA Map from the web, place the nodes on the map and then draw the topology.   You must insert the picture of the WAN network diagram into your MS word document 

Question 2 All four sites will have a 90Mbps connection to the internet. In the WAN diagram you developed in question 1, incorporate the connection to the internet and provide the new diagram.  You must insert the second diagram/picture of the Network diagram into your MS word document 

Question 3 What type of WAN service (s) would you recommend leasing for each connection to fulfill the Data Rates expectations? You should prepare a table and write WAN service for each connection among the hospital sites 

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Wk 2 – Apply: Case Study: Appliance Warehouse – Use Case Analysis

  

Assignment Content

  1.     Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

    For this week’s assignment, be sure to refer to the Appliance Warehouse Resources: Organizational Staffing document and the Organization Chart created in Week 1.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 4-7 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create a 3- to 4-page document (to submit in Blackboard) that includes the following:
    • Business Case Investigation
    • Identify 4 employees you would interview to support your business analysis. For each employee, state the topic(s) you will use for questioning. The interview topics and responses will be used to influence your future design.
    • A possible use case diagram for making an appointment and verifying parts availability
    • Identify the users of the system and requests into and out of the system.
    • Implementation resources needed for the project
    • Identify people and hardware. Human resources may include internal or external resources.

Netlab 4

 

Complete Netlab 4 and submit your lab summary here.

NETLAB 4. A. Web Pen-Testing. 

  1. Scanning with Nikto. 
  2. Setting up Burp Suite. 
  3. Building a site man with Burp Suite. 
  4. Brute forcing a Web Application. 

NETLAB 4. B. Client Side Exploitations. 

  1. Hooking Web Browsers with BeEF Framework 
  2. Clients Exploitation with BeEF Framework. 

NETLAB 4. C. ARP Spoofing And MiTM Attacks.

  1. ARP Spoofing with ettercap. 
  2. Capturing web usernames and passwords 
  3. Maniputaing HTTP images. 
  4. Manipulating Java scripts. 

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

  

Project Description:

Your job at the Chicago Health Inspection Agency has been fun and challenging. You have been making daily updates to the Agency’s database with the help of your boss, Anne Serdifone. The database tables may already be normalized; however, you need to examine the tables to verify this. Based on your understanding of the rules of normalization, you decide to recommend some design changes to the database.

     

Start Access. Open the   downloaded Access file named Exp19_Access_Ch09_HOEAssessment_Food_Inspections.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

Anne has asked you to review the   table structure to see if any changes should be made. You decide to apply the   rules of normalization to the Inspections table.
 

  Open the Inspections table in   Datasheet view. Look for repeating groups in the Inspections table. The   Violation field has multiple values separated by bars. This qualifies as a   repeating group. This information has been added to a new table and will be   removed from this table. For simplicity’s sake, the information for   inspection violations has been preloaded to a table called Violations, so   removing the Violation field from the Inspections table is required to   conform to 1NF.
 

  Switch to Design view. Click the row selector   for the Violation field and click Delete   on the Home tab in the Records group. Click Yes when asked for confirmation, and switch to Datasheet view.   Click Yes when prompted to save.

 

After you remove the Violation   field, you will examine the Inspections table and convert to second normal   form. Examine the Inspections table and notice there are multiple Inspections   with Dominick Cortez as the Business Owner.
 

  Switch to Design view for the Inspections table. Business Owner is determined   by Business ID and are attributes of the business, not a specific inspection.   Fields will need to be removed to satisfy 2NF. In a real-world scenario, you   would need to create a separate table for this information, but the   Businesses table is provided so you do not have to perform data entry.
 

  Examine the Inspections table. Click the row   selector for the Business Owner field and click Delete in the Records group of the Home tab, clicking Yes in response to the warning.
  You deleted this field because it is not functionally dependent on the entire   primary key. Save the Inspections table. Switch to Datasheet view.

 

The final step to improve the   Agency’s Inspections table is to convert to third normal form: The value of a   non-key field cannot be functionally dependent on the value of another   non-key field.
 

  Look for any non-key field values in the Inspections table that are   functionally dependent on another non-key field value. Facility Type ID   (non-key) is functionally dependent on Business ID (non-key). If you know the   Business ID, you can determine the Facility Type ID, which will help you   determine the Facility Type. A table named Facility Types already exists.
 

  Switch to Design view in the Inspections table. Delete the Facility Type ID field, clicking Yes in response to all warnings you   receive. You delete the Facility Type ID field because it is functionally   dependent on the Business ID field and therefore is not allowed in the   Inspections table. Normally, this would then require you to set up a new   table, but as you already have a Facility Types table, you can simply delete   the Facility Type ID field. Note that this may not always be the case.
 

  Switch to Datasheet view, saving the table. The table now meets 3NF criteria.   Close the Inspections table.

 

You will now create   relationships for the tables in the database. Due to the changes you made to   the design, you will add relationships to ensure the database functions   correctly.
 

  Click the Database Tools tab and   click Relationships in the   Relationships group to show the Relationships window. Click Show Table. Click each table and click Add. Once you have added all five tables, click Close to close the Show Table dialog   box.

 

Drag the Inspection Type ID field from the Inspection Types table to the   Inspection Type ID field in the Inspections table. The Inspection Types and   Inspections tables are related by the common Inspection Type ID field. Select   the Enforce Referential Integrity   and Cascade Update Related Fields   options. Click Create to create   this relationship.

 

Repeat the steps to connect the   Businesses and Inspections tables via the Business ID field.

 

Repeat the steps to connect the   Businesses and Facility Types tables via the Facility Type ID field.
 

  You may also notice the Inspections and Violations tables are not yet linked.   You are leaving these tables unlinked intentionally as you want to discuss   the contents with your supervisor.
 

  Save the relationships and close the Relationships window.

 

Select the Inspections table, and create a basic report using the Report   tool. Save the report as Inspections Report. Close the report.

 

Select the Violations table and create a report using the Report tool. Save   the report as Violations Report. Close the report.

 

Click the Create tab and click Navigation   in the Forms group. Select the Horizontal   Tabs option. A new Horizontal Tabs navigation form displays. Drag the Inspections Report from the   Navigation Pane to [Add New].

 

 

Add Business Report, Facility   Types Report, Inspections Types   Report, and Violations Report,   in that order to the navigation form.

 

Switch to Form View and click each tab to test the form. Save the   navigation form with the default name and close the form.

 

To simplify the look and   functionality of the database, you will hide the Navigation Pane and set the   Navigation Form to open automatically when the database is opened.
 

  Click the File tab, click Options, and in the Access Options   dialog box, click Current Database.   Scroll to the Navigation section of the dialog box and deselect Display Navigation Pane. The   Navigation Pane will now be hidden from view.
 

  In the Navigation Options, click the arrow next to Display Form: and select the newly created Navigation Form. Click OK   to close the dialog box. Click OK.
 

  The Navigation Form will now display upon opening the database. Save and   close the database. Re-open the database to test the changes. The Navigation   Form should display upon opening the database and the Navigation Pane should   not be visible.

 

Save the database. Close the   database, and then exit Access. Submit the database as directed.