Research Project

Windows Hardening Recommendations

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

 Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

 Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

 Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

 To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

 Internet access

 Course textbook

Submission Requirements

 Format: Microsoft Word (or compatible)

 Font: Times New Roman, size 12, double-space

 Citation Style: APA

 Length: 2 to 4 pages

Self-Assessment Checklist

 I addressed all issues required for the summary report.

 I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

 I followed the submission guidelines.

project managnment

  

1. Identify the Inputs, Outputs, Tools, and Techniques of each of the Knowledge Areas and Process Groups.

2. Describe the relationship between Knowledge Areas and Process Groups.

3. Include detailed speaker’s notes for each slide.

Additional Requirements

· Written communication: Ensure written communication is free of errors that detract from the overall message.

Module 2: Online Discussion: CRM and Social Networking

 

In this module, you were introduced to CRM, a software that helps companies manage their customer relationships.  To that end, mobile CRM has grown in popularity.  For example, you must receive emergency alerts on your cell phones. CRM is the basis of this type of communication.

From the perspective of the customer, name a few approaches to mobile CRM that you would welcome to receive and some that you would not.

From the perspective of the company, what are the challenges of implementing mobile CRM targeted to customers? 

Next, find out how CRM systems are integrating social networking technologies to improve customer relationships.  Search social networking sites such as Facebook, Twitter, and YouTube to identify how a specific company of your choice is using social media to interact with customers. Share your findings.

Share your answers to these prompts in your initial post. Then scan your classmates’ threads and reply to at least TWO classmates whose answers interest you most. In your reply, comment on what you like about his/her sharing. Further the discussion in a direction you deem appropriate.

a. This class should have 2 attributes, declare it, don't forget those fields/attributes need to be private b. Create 2 constructors,

 

1. Create a new file called Fraction.java

2. In this file, create a class Fraction. 

a. This class should have 2 attributes, declare it, don’t forget those fields/attributes need to be private

b. Create 2 constructors,

i. One constructor without any parameter. This constructor will initialize the first attribute to 0 and the second to 1.

ii. The second constructor will have 2 parameters that will initialize the 2 attributes of the Fraction class.

c. Create a getter and a setter for each private fields.

d. Create 4 methods, addition, subtract, multiply, divide.  Don’t forget to declare those methods public so every objects can use  them. Since those methods needs to be called by an instance of the class  Fraction, what do those methods need to achieve the  addition/subtraction/multiplication/division of TWO fractions. The 4  methods need to return a brand NEW fraction result of the addition/subtraction/multiplication/division of the 2 fractions. a/b + c/d = a/b – c/d = a/b * c/d = a/b / c/d 

e. Create a method properFraction,  that has no parameter. This method will return a whole number and  modify the original Fraction to a proper Fraction. For instance:

   Fraction f1 = new Fraction(7,2);// f1-> 7/2
   System.out.print(f1.properFraction());// output: 3, f1->1/2
   Fraction f2 = new Fraction(2,5); // f2-> 2/5
   System.out.print(f2.properFraction());// output: 0, f1->2/5

f. Create a method toString that will return a String made with the 2 attributes with the following format “4/3”.

3.  In the Main.java file, create 3 Fractions with different values. Test  the addition/subtraction/multiplication/division and the properFractions  methods.

Data Representation and Association Analysis

Q1. Read: Ch. 6 &7 in the textbook: Data Representation and Interactivity

Textbook: Kirk, Andy.  Data Visualization: A Handbook for Data Driven Design

Data representation and interactivity are important aspects of data visualization.  Review the text by Kirk (2019) and note at least three storytelling techniques.  Note the importance of each and the advantages of using these techniques.

Q2. Read Ch. 6 in the textbook. Association Analysis: Basic Concepts and Algorithms

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What are the techniques for handling categorical attributes?
  2. How do continuous attributes differ from categorical attributes?
  3. What is a concept hierarchy?
  4. Note the major patterns of data and how they work.

Q3. Read Ch. 7 in the textbook. Association Analysis: Advanced Concepts 

Textbook: Tan, Pang-Ning. Introduction to Data Mining

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

Select at least two types of cluster evaluations, and discuss the concepts of each method.

Answer all three questions in 250 words each. Follow APA 7 Guidelines. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Windows

 

Conduct research on a topic related to the security of Windows operating systems.

Topic

  • Research security tools related to securing the Windows Operating System (Desktop or Server)

 

Deliverables:

Written Paper (8-13 pages)

  • Title Page – containing:
  • Subject Title
  • Student’s Name
  • Course Number and Title, Instructor’s Name
  • Citations in APA format (use the attached guide)