Python Pcap

Please read whole document carefully because there are some restrictions on python libraries. it says which to use and which not use.

Vulnerability Process and Assessment Memo

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Lesson 5:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Research Paper on Operational Excellence

how to improve company operations using SAAS legacy to  – cloud computing models(SAAS) – benefits of SAAS in cloud.

Title

how to research

design/methodology/

outcome

list of iteams

introductions

summary

references

Web Application Security

Review the attached slides to summaries  week 1 of 2 and week 2 of 2

 The quantity and quality of new insights from your own independent research/experience

 Adherence to page limits, font, font-size, line spacing, and margins

 Use of at least 2 new references

 Reputation of the reference sources

 Use of in-text citations with matching references and vice-versa

 Appropriateness of the use of the APA format for both in-text citations and references.

Please see the attachment.

Research abstract published quantitative scholarly article

For this week, we will focus on writing a scholarly abstract of a quantitative journal. More information about writing an abstract can be found via the web resource “Writing Scholarly Abstracts.

Directions: Analysis of Research abstract published quantitative scholarly article related to Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning .Each abstract must therefore consist of the following in this order:

  1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
  2. Author Qualifications – name and qualification of each author conducting the research
  3. Research Concern – one paragraph summary of the reason for the overall research topic
  4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research
  5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)
  6. Research Methodology – description of the population, sample, and data gathering techniques used in the research
  7. Instrumentation – description of the tools used to gather data (surveys, tests, interviews, etc.)
  8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

1000 words

APA format needed with references

Please follow above mentioned directions to complete this assignment.

Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0

 Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0

  

Project Description:

The Metropolitan Zoo tracks its animal data in Excel. The organization decides to use a database to organize the data about the animals, their trainers, and the animal exhibits. In this project, you will open an existing database and create a new table. You will import an Excel file containing information about the animals, and query the database to determine which animals need a checkup. You will also create a query to obtain a listing of the animals in each exhibit.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch2_Cap_Zoo.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Create   a new table in Design view. Add the field name ExhibitID   with the AutoNumber Data Type. Add   the caption Exhibit ID.   Set the ExhibitID field as the   primary key for the table. Save the table using the name Exhibits.

 

Add   the following fields and set their field properties as shown:

  

Field Name

Data Type

Field Size Property

Caption

 

ExhibitName

Short Text

15

Exhibit Name

 

Acres

Number

Integer

(none)

 

InitialCost

Currency

(no change)

Initial Cost

 

YearlyCost

Currency

(no change)

Yearly Cost

 

DateOpened

Date/Time

(no change)

Date Opened

 

Show

Yes/No

(no change)

(none)

 

Switch   to Datasheet view and save the table. Add the following records, letting   Access assign the Exhibit ID:

  

Exhibit Name

Acres

Initial Cost

Yearly Cost

Date Opened

Show

 

Asia

2

2000000

300000

1/15/2011

Yes

 

Africa

4

3500000

500000

2/3/2014

Yes

 

The Americas

3

1500000

250000

5/15/2005

No

   Close the table.

 

Import   the downloaded Zoo.xlsx workbook as   a new table in the current database. Using the Import Spreadsheet Wizard,   specify that the first row contains column headings, set the AnimalID field to be indexed with no   duplicates, and set the AnimalID field   as the primary key. Import the table with the name Animals and do not save the import steps.

 

View   the Animals table in Design view, and change the field size for the AnimalID   field to Long Integer. Change the   field sizes for the ExhibitID and TrainerID fields to Long Integer. Save the table. Click Yes in the dialog box indicating that some data may be lost.   Close the table.

 

Begin   establishing relationships in the database by adding the Animals, Exhibits, and   Trainers tables to the   Relationships window. Close the Show Table dialog box. Resize the field lists   so that all fields display. Create a one-to-many relationship between the ExhibitID field in the Exhibits table   and the ExhibitID field in the   Animals table, enforcing Referential Integrity. Select the option to cascade   update the related fields.

 

Create   a one-to-many relationship between the TrainerID   field in the Trainers table and the TrainerID   field in the Animals table, enforcing Referential Integrity. Select the   option to cascade update the related fields. Save and close the Relationships   window.

 

Create   a query using the Simple Query Wizard.   From the Animals table, add the AnimalID,   AnimalType, and DateOfLastCheckup fields (in that   order). Ensure the query is a Detail query. Name the query Checkup List and finish the wizard.

 

View   the query in Design view, and then set the criteria for the DateOfLastCheckup   field so that only animals whose last checkup was before 1/1/2022 are displayed.

 

Sort the query in ascending   order by the DateOfLastCheckup field. Save the query. Run the query, and then   close the query.

 

Create   a new query in Design view. Add the Animals,   Exhibits, and Trainers tables to the query design window. Add the following   fields to the query (in this order):
 

AnimalType

Origin
  ExhibitName
  FirstName
  LastName
  Position

 

Set   The Americas as the criteria for the ExhibitName   field and sort the query in ascending order by Origin. Run the query, and   save the query as Americas Exhibit.   Close the query.

 

Copy   the Americas Exhibit query in the   Navigation Pane and paste it with the name Asian Exhibit.   Modify the query in Design view to replace The Americas with Asia.   Run the query, save the query, and close the query.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

information technology ……4

 Answer the following questions in your own words. to be submitted in 2hours

Question 1: Create a Work Breakdown Structure (WBS) identifying the Tasks Id, Tasks Description, Tasks Duration (Days), and Predecessor Tasks.

Eden Bay is a medium-sized municipality. The town has grown rapidly, and so has the demand for town services. Eden Bay currently owns 90 vehicles, which the town’s equipment department maintains. The fleet includes police cars, sanitation trucks, fire trucks, and other vehicles assigned to town employees. The maintenance budget has risen sharply in recent years, and people are asking whether the town should continue to perform its own maintenance or outsource it to private firms.

In the first part of the case, you planned a preliminary investigation for a new information system that would cut costs and improve maintenance efficiency. Based on your investigation, Dawn wants to move forward, and she asked you to help her present a budget request at the next town council meeting. She suggested the following to-do list: (25 points)

  • First, double-check the cost and benefit data we will need for the proposal (3 days)
  • Then, start two tasks at the same time: send an email message to the Town Council requesting that the proposal be placed on the agenda (1 day), and develop the proposal itself, including all necessary documents and charts (5 days)
  • As soon as the proposal is complete, start work on two tasks at once: print copies of handout material for the meeting (2 days) and develop a PowerPoint presentation (5 days)
  • When the presentation is ready, conduct a rehearsal for the Council meeting (2 days)
  • Finally, when the rehearsal is done and the handout material is ready, help Dawn deliver the presentation (1 day)

 Question 2: Create a PERT/CPM chart, using the WBS above, to determine which task IDs are on the critical path? Note, that you do NOT need to submit your diagram. Only the Task IDs and the Duration of the Critical Path. 

 

Question 4: Use critical path analysis to adjust schedule and resource allocations in response to schedule and budget deviations.

Revise the previous chart using critical path analysis to adjust schedule and resource allocations in response to the following schedule and budget deviations due to a budgetary issue:

  • Bullet #4, When the presentation is ready, conducting a rehearsal for the Council meeting will now take 4 days instead of 2 days.

What are the impacts on the critical path, if any?

 Question 3: Identify a task where you could lengthen the duration without it affecting the critical path.   Please note the task ID # and the new Duration. 

Research report

Need to present a research report on Finger Vein scan/vascular technology with a word count of 70-110 words(not more than the count provided) and should provide a URL reference link too .

Note : NO PLAGIARISM
Tips: It is regarding the security measures we take in order to secure our data.
This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.
Deadline August 25 2022 11:59 p.m.cst