zeux attack

   

Module 05 Course Project – Zeus Attack

As indicated previously, XYZ has been infected with Zeus. Zeus has spread throughout the inside network, and it is your job to monitor and figure out how it is spreading and what you can do to prevent it from spreading further.

In a Microsoft Word document, write a minimum four to five (4-5) page proposal in which you:

1) Determine how you are going to monitor your network.

2) Describe the tools you plan on using (at least two).

3) Describe what techniques you plan to use for the following:

· Determine what the malware is doing to your network.

· Determine how the malware is spreading.

· Determine how you will protect your network in the future.

Discussion Question

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the iOS platform. 

To participate in the Discussion, respond to the Discussion prompt by Day 3. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates by Day 5 in one or more of the following ways: 

  • Complete the Week #4 Discussion by the assigned due date.  Late assignments will not be accepted. 
  • This is a required assignment and is worth 50 points.
  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.
  • Use this link to access the Discussion Board

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

SE491: Software Construction week 1 Dic

Week 1: Discussion

In your own words, what is the difference between a flow chart, a pseudocode, and a program? Why does a programmer need to know all three of them?

You are required to make at least two comments on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments.

Article writing

Discuss game theory and how artificial intelligence is used in video games.  Provide examples and visual representations. 
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.

Review the article

For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

It is an objective evaluation.

Link – https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4