Just looking for an old html/css project thats multiple pages that you may have done in the past. no need for anything new just an old project done for yourself/someone else is good. preferably one with a header with difference choices to open the different webpages.
IR Plan Review
We will be focusing on reviewing an incident response plan. Some organizations treat these as sensitive and secret. Others post them online for anyone to read. In this exercise, you will be making use of a publicly posted one. Do some Internet searches to find a suitable incident response plan. Download it and submit it as part of your submission work.
For the next part of your work, you will be reviewing that plan and comparing it against the NIST 800-61 guidelines (Links to an external site.). Focus on section 2.3.2 Plan Elements. In your submission, compare your chosen plan against the elements in the NIST document. Document which sections are included, which are missing, and which are additional. State, in your opinion, whether the missing sections are impacting the effectiveness of the plan and whether the additional sections are adding value to the plan.
Parameters
- The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
- Use APA for citing references and quotations
cyber security
Differentiate between IDS and IPS.
erlang program
Write an Erlang program that counts the word frequencies in the file assign3-part2.txt. Erlang uses a list of tuples as a hash table. Write four Erlang functions.
- This function has a string file name parameter and returns a list of words in the file. Open the file with
file:open
. The file lab3-part2.txt was written in a text editor as one line, soio:get_line
will read the whole file.string:tokens
will separate it into words. Its second argument specifies all the delimiters.file:open(lab3-part2.txt”,read).
L1= io:get_line(S, '').
- This function has two parameters, a string word and a list of tuples, and returns a list of tuples with the word added appropriately. Each tuple is a word key and a frequency value. The
lists:keyfind
method will find a tuple if it exists and return false if it does not. If the word is not found uselists:append
to add a tuple with the word as key and1
as the frequency. If the word is found uselists:replace
to replace the tuple with a new tuple with frequency increased by one. - This function has a list of words as parameter and returns a hash table of tuples of words and their frequencies. The
string:to_lower
method will make a word lower case to provided the desired case insensitivity. Use thelists:foldl
method to build the answer using the function2
. - This function outputs the final hash table sorted by frequency from high to low using the
lists:sort
function. Its one parameter is the file name. It uses functions3
and1
.
COMP247 Data Communications
COMP247 Data Communications
Assignment 2, 2014: Network Technologies
Objectives
These are the areas that will be tested:
Wireless network technologies
Wide Area networking technologies
Internet Access Technologies
Backbone Technologies
Note
All assumptions must be stated clearly in your answers.
The explanations you provide do not have to be long, concise is preferred to wandering. They do need to present your case clearly.
Questions
1. Wireless Networks [10 marks]
Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.
(b) [3 marks] Which WiFi flavour (a, b, g, n, ac, ad, or other) would you recommend for this new installation? Discuss the options and justify your choice. [Up to 200 words]
(c) [3 marks]Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice. [Up to 200 words]
2. Backbone Networks [10 marks]
A backbone network can be constructed as a switched backbone, a routed backbone or a VLAN backbone. Each of these approaches has its advantages and disadvantages.
(a) [6 marks] Discuss the advantages and disadvantages of each approach. [Up to 400 words]
(b) [2 marks]Describe an example of a situation where a switched backbone would be preferred. [Up to 150 words]
3. WANs [10 marks]
Now! Electronics has four stores in the Sydney region (Hornsby, Penrith, Campbelltown, City) connected in a star topology by leased T-1 lines to its head office in North Ryde.
(a) [2 marks] Sketch the existing WAN, showing the stores, head office and the leased lines.
(c) [2 marks]Describe an example of a situation where a VLAN backbone would be preferred. [Up to 150 words]
(b) [1 mark] What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]
(c) [3 marks]A new stock management server is to be installed to track stock in all four stores – all sales will be reported to this server as they happen. Some members of the development team want to install this new server in head office, while others want to install it in the city store because that store has 40% of the total sales. Which option do you prefer and why? [Up to 200 words]
(d) [4 marks] Now! is planning an aggressive expansion strategy with offices and stores in each Australian state. Compare the merits of expanding the existing T-1 based WAN with moving to a new MPLS-based WAN. [Up to 200 words]
Mobile device security
- One of the greatest risks of a mobile device is the loss or theft of the device. Review the list of things that can be done to reduce the risk of theft or loss. Include what you can do once a device is lost.
300 words
Create aSimple Cat Facts application
Create an application that allows the user to search for different cat breeds and to get information about them. The application must use the Cat API (https://thecatapi.com/) – specifically read the documentation (https://docs.thecatapi.com/) for information about how to get an API key, and how to use the API. You can get the free API key and use it for this application without any issues
You will use the data returned as JSON from the Cat API to list the breeds of cats available through the site in a drop-down (known as a Spinner in Android development). Once the breed is selected, the API may be contacted again to obtain the image of the cat, if one exists. You should keep the spinner in a fragment near the top of the app.
The fragment near the bottom of the app should contain an ImageView, and multiple widgets/views for displaying text about the cat. In addition to displaying the image of the cat, you should show information such as the name, temperament, and origin. The image view and other widgets for the breed information could be kept inside a ScrollView.
Note: Use the Fragment + ViewModel template in android studio to start this assignment.
Language: Java or Kotlin
Current Affairs Report
Instructions:
Please write an analysis report about a recent Cybersecurity breach (Solarwinds, Colonial Pipeline Ransomware or any other recent attack). The report must be written using your own analysis, please answer the following questions:
1- What type of attack was launched?
2- What was compromised or breached?
2- How was the attack accomplished if known?
4- Your own analysis and feedback about the attack?
Submission Instructions:
The report must be at least 4-5 pages not including the cover and reference pages and must follow the APA style. You must include at least 3 references. 100% original work. NO PLAGIARISM
CISCO homework Using Cisco Packet Tracer 6.2 Only Due in 14 hrs
CISCO homework Using Cisco Packet Tracer 6.2 Only
Analyzing the Logic of an Article – Popular Journal Article
- Read The Miniature Guide to Critical Thinking: Concepts and Tools.
- Read chapters 6–14 (pp. 27–55) in Everybody Writes.
- Locate a popular article (neither an academic article, nor an industry/trade journal article) suitable for your ADP research focus or a business-related topic that is of interest to you.
- Complete the template in its entirety, answering each question fully.
- Place the complete APA reference at the top of the first page.
- Include your full name in the header of the template. No cover page is needed when placing your name in the header.
- Refer the attached Scholarly or Academic Journal Articles(PDF document) document.
- Refer the attached Template for Analyzing the Logic of an Article(Word document).
For this assignment, you will locate and download a popular journal article to analyze the author’s use of logic.
References
Evaluating information sources. (n.d.). What is a popular source? The University of British Columbia. https://guides.library.ubc.ca/EvaluatingSources/ScholarlyPopular(new tab)