Assin10

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

mod6

 

Module 06 Content

  1. XYZ Technologies had a DDoS (Distributed Denial of Service) attack to their environment yesterday. Your deliverable will include reviewing the incident details document and create a RCA (Root Cause Analysis) report based on this incident. Review the details of the incident below:
    Incident Details: DDoS (Distributed Denial of Service) Attack
    At 2:26 CST the internet facing firewalls peaked at 100% CPU load. This load level caused any additional connection to be lost, giving the appearance that the corporate website and connectivity to the other IoT devices supported by this site to lose connectivity. Initial investigation of the log data showed 1.25 million syn requests by the following external IP addresses:
    1.169.228.122, 5.254.97.84, 27.254.56.45, 37.48.80.165, 37.186.206.134, 41.32.37.226, 42.61.188.34, 103.213.45.145, 111.91.82.161, 151.233.52.209, 168.187.104.130, 186.167.1.54, 190.205.33.163, 213.184.112.102, 217.219.150.126
    In the first 8 minutes, the following remediation techniques were used:

    • The addition of attacking IP addresses to a global block list. Result, a new attacking IP appears with the same number of syn requests.
    • When the website is disabled, the syn requests drop to zero.
    • When the website is brought up in a new location, the syn requests return, and bring down the protecting firewall.
    • Remediation:
      After 8 minutes of complete down-time, a decision was made to disable the site in IIS until an appropriate solution could be implemented.
      At 23 minutes, a recommendation was made to the support team to offload the syn requests to a cloud-based firewall, called incapsula.
      At 42 minutes Incapsula implemented solution with a 30-day free trial.
    • Setup of Incapsula Tool
    • Configuration of primary website within Incapsula
    • Configuration of DNS from original location to Incapsula
    • At 45 minutes the website was returned to functional status, by re-enabling the site in IIS.
      Future State:
      XYZ currently has only 2 websites with public facing addresses. These two sites will be protected by the incapsula tool to offload any future DDoS attempts.
  2. Root Cause Analysis (RCA) Report
    After reviewing the incident above, create a RCA (Root Cause Analysis) report based on this incident. While your report is a technical document, rich in detail, it is your role as the cybersecurity professional to tailor this RCA to meet the expectations of the target audience of non-technical, executive leadership, and customers. Please be sure to address the following:

    • A breakdown of the incident details (Areas Affected, Dates, and Times).
    • Information on the root cause of the incident.
    • Specifics of how the incident was resolved, or if additional steps need to be taken to fully resolve the incident.
    • Preventative measures for future incidents.
    • Be sure to tailor this RCA so that it is rich in detail but does not rely on technical language to meet the expectations of the target audience of non-technical, executive leadership, and customers.
    • Your report should use professional tone and vocabulary, APA format, and proper spelling and grammar.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extensions to the filenames.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Week 14

1.Write at least 500 words discussing the utility of R Server Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.

2.Write at least 500 words discussing how text mining is used in knowledge management. Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.

IT476 week 6

Discussion Questions:

1- Describe first normal form (1NF), second normal form (2NF), and third normal form (3NF) in Database Normalization process.

2- What three data anomalies are likely to be the result of data redundancy? How can such anomalies be eliminated? Explain.

Introduction to Ruby

Introduction to Ruby

You are given a sample memo that contains several e-mail addresses. You are to create a Ruby

program that reads the memo in and outputs an accurate count of domain names found in the

memo. A sample print-out should look something like the following:

Domain Results

                 gmail.com: 3 time(s)

               hotmail.com: 7 time(s)

                 yahoo.com: 1 time(s)

Below are the more detailed requirements:

1.

as your Ruby file.

You will probably need to do some sort of iterating through the words in the memo (see a class

Assume that the memo is located in assignment_two_text.txt file located in the same directory

2.

slide example for finding word frequency). DO NOT USE a Ruby for in or loop construct. This

will automatically bring your assignment grade down by a full grade (A => B and so on).

Each result row should print a distinct (non-repeated) domain name and the number of times it

3.

was counted.

Right-justify each result row (You will need to dig around the String API to see how to

4.

right-justify).

Each domain should include the top-level domain name (i.e. gmail.com).

5.

Sort domain names alphabetically when outputting the results.

6.

Submission Guidelines

1.

directory as your assignmetn2.rb.

Commit both files to your local repo and then push your repo out to your private team repo on

Call your Ruby file assignment2.rb. Download assignment_two_text.txt and store it in the same

2.

github creating a remote branch called assignment2.

You can do one of the following to accomplish #2 above:

3.

Create a local branch called assignment2 ($git checkout -b assignment2) and then push it

out by doing $git push remote_alias assignment2

Work on a master branch in your repo and then do $git push remote_alias

master:assignment2

4.

Feel free to include a README with any comments.

Computer 2

Write a one page answer to this question that includes an example from your personal experience or internet research to support your opinion.

Of the five primary components of an information system (hardware, software, data, people, process), which do you think is the most important to the success of a business organization? 

Research topic introduction

Explain the overall research topic – Cybersecurity in healthcare

Literature gathering process.

The scope and the healthcare sector of the literature review. 

The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. 

After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Individual Assignment and Rubric.docx

 As the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval. Based on your research for Unit 1:

  • Develop the PCS security program charter for the corporate network and satellite offices.
  • Clearly state the CISOs vision including elements of a strong security program.
  • Include information regarding some of the regulations or laws that influence the direction of your security program.
  • Identify the key roles and responsibilities of the various company stakeholders.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College-level writing

Refer to the attached document for the grading rubric. 

research paper

Complete a Team Business Writing Project. This is your opportunity to be creative.  You must work in teams.  Teams will be chosen during the second week of class.

The PROJECT should include the following sections:

·         Title with names of team members and slide numbers each person created; example,

Pat Cowherd (slides 1, 3, 5, 7)

Mickey Mouse (slides 2, 4, 6, 10)

Sponge Bob Square Pants (slides 8, 9, 11, 12, 13)

·         Table of Contents

·         Executive Summary

·         The Problem Statement/Why writing project is being undertaken

·         The Proposed Solution/or the project itself

·         Details

·         Conclusion

           References (sources)

Should include at least 16 total slides; should number each slide; proofread carefully; be consistent with capital letters throughout the presentation; capitalize main words in slide headings or place them in all caps….be consistent; be consistent with periods at the end of phrases.

Include at least three professional references (sources) for your project on a slide at the end of your project presentation.

Examples of Technical Writing Projects:

·         New or revised employee handbooks

·         New web sites for departments or other organizations

·         Reorganized, redesigned, and rewritten web sites

·         Company or organization manuals

·         Ergonomic or safety process procedures

·         How to manuals for all types of products and procedures

·         Research project reports

·         Accident prevention programs

·         Chapters for larger technical manuals

·         Product manuals and guidebooks

·         Company profile guidebooks

·         Other topics by permission

Once your project is uploaded, a program called Turnitin will analyze your submission for plagiarism.  Submissions with more than 40% will not be accepted!  If your submission is greater than 40%, you have  the option of removing your submission, reworking the paper, and resubmitting again.  This can be done as many times as needed until the due date has passed for this Graded Assignment.  Once the Assignment is graded, it CANNOT be resubmitted for a better grade. Team members who do not assist with creating the presentation will receive a substantial grade penalty.

wireless Networking

 

  • Case Study: Interference on WLANs:
    • Unlicensed bands are parts of the radio spectrum that are available nationwide to all users without requiring a license. However, a drawback is that, because there are no licenses, there can be interference between devices. Use the Internet to identify a list of devices that can interference with WLANs in either the ISM or UNII bands.
  • Case Study: Impact of Propagation Behaviors
    • Absorption, reflection, scattering, refraction, and diffraction can all have an impact on RF signal strength. Using the Internet, identify at least three objects or types of materials in each of the five categories that can impact RF signals. Next, research how much the impact is in terms of loss (either dBm or mW).
  • Case Study: Attenuation
    • Attenuation is not limited to wireless LANs, but can also affect wired LANs as well. Research the types of attenuation that can impact wired networks. How can attenuation be measured on a wired network compared to a wireless network? Which is more difficult to uncover? Why? Write a one-page paper on your findings.

 

Writing Requirements

  • APA format, 3–4 pages in length (excluding cover page, abstract, and reference list)