Using Kali VM to scan Metasploit 3 Machines with multiple tools and reporting results.

 

Here we will be scanning with Metasploit and using 2 scanners and one of your own choice.

Remember scanners are located under auxiliary/scanner

  • TCP Scanner – 10 points
  • use auxiliary/scanner/portscan/tcp
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • UDP Probe – 10 Points
  • use auxiliary/scanner/discovery/udp_probe
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • Scan of your choice – 10 Points
  • Review the scanners and choose at least 1 scanner to scan both of your metasploitable machine with. Remember one is Linux and the other is Microsoft so not all scanners work with both.
  • Capture the returned information – cut and paste and add it to your report

Rubric:

  • Captured returned results from tcp scanner for both machines – 10 Points
  • Captured returned results from udp_probe scanner for both machines – 10 Points
  • Captured returned results from for both machines – 10 Points

Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 
Once you find the article, you will read it and write a review of it.  This is considered a research article review.
Your paper should meet these requirements:

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Unit 4 DB: Website for Both U.S. and Offshore Sales

Your friend John was very happy with the valuable information that you provided him in the last unit’s discussion and decided to hire you as an IT consultant.  John and his wife Pam were on a trip to Europe last summer.  Pam made a few of her sauces and appetizers for a renowned restaurant in Portugal.  She received positive feedback from a chef at the restaurant.  Pam and Michael thought that they could sell these items both in the U.S. and overseas.  What advice would you give them to consider when developing a website for onshore (U.S.) sales, as well as some European countries (for example Italy, Spain, Portugal, and France)?

In response to your peers, please discuss the cultural, legal, and other challenges to implementing international information systems.

1 page apa format 

Résumé IT specialist

I was wondering if anyone could spruce up my résumé to make it the most appealing to employers, I need a résumé that will blow out at least half of the competition

Week 1

Q.1 Course name:  MBA Capstone — Simulation Edition 

 what are your expectations for this course? Highlight one or two areas you expect to learn from this course. You must make your first post by Wednesday, and respond to one of your classmates. Posts must be on two separate days. 

Q.2 Write a Reply 

 First and foremost, I anticipate that this course will have real-world applications. I am aware that CAPSIMS simulations are used to teach students how to make better decisions about what to give up and what to do when it comes to solving problems. For instance, when it comes to making a profit, what is the best course of action to take is to give something up. In order to prevent overlooking even a minor piece of information, it’s necessary to comprehend the mechanics of the complete process as well as the value of teamwork inside your firm. In order to succeed, I anticipate teamwork, commitment, and ongoing communication. This is howthe  business operates in the real world.

Security Threats in Healthcare

Based on the example provided. Please provide a problem statement in todays healthcare industry. Cybersecurity risk / Plan of Action based on these. 5 to 7  Page document with 20 Referenced per review artcilesoday’s

The title is Virtual Machine

 

The Team CTF tests cyber skills in 10 categories, and each category has one question. You and each of your team members are required to solve one problem for this CTF competition. Divide the problems between team members. Use the table below to determine which of your team members will be attempting each problem.

You only need to do one problem per person and are not required to solve all the problems. Use the table below. No two students should be selecting the same category for their final PowerPoint presentation. Categories will be selected on a first-come, first-serve basis. Post your selection in the discussion. Any disputes over a category selection should be resolved with assistance from your instructor.

Final

 This week, answer the following questions in an essay format:

  1. How does data and classifying data impact data mining?
  2. What is association in data mining?
  3. Select a specific association rule (from the text) and thoroughly explain the key concepts.
  4. Discuss cluster analysis concepts.
  5. Explain what an anomaly is and how to avoid it.
  6. Discuss methods to avoid false discoveries.

This assignment should take into consideration all the course concepts in the book.  Be very thorough in your response.  The paper should be at least three pages in length and contain at least two-peer reviewed sources. 

Text-

1. Information Technology and Organizational Learning 

2.  Introduction to Data Mining 

Threats

 

The PCS working group has been a smashing success and the team members have already formed better inter-department communications. The customer Security Director from the Istanbogus Ministry of Defense has requested a threat briefing explaining the top risks to his new system. As the CISO you have your ideas but would like to get the opinion of the working group members.

Describe at least three different categories (human and non-human) of threats from your Unit research. Explain how each category presents risk to information systems. Make a case for the top threat to the missile defense system for each category and give an example of how that threat might be realized in a real compromise of the system. Discuss some of the factors that play into the assessment of system threats. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other described threats and if you feel they are greater or lesser risks to the system.