Cybersecurity

 

Lake Point Consulting Services

Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

National Meteorological Services (NMS) offers in-depth weather forecasting services to airlines, trucking firms, event planners, and other organizations that need the latest and most accurate weather forecasting services. NMS has discovered that their forecast information, which was being sent out as email attachments to its customers, was being freely distributed without NMS’s permission, and in some instances, was being resold by their competitors.NMS wants to look into encrypting these weather forecast documents, but is concerned that its customers may find decrypting the documents cumbersome. The company also wants to provide to their customers a level of assurance that these documents originate from NMS and have not been tampered with. NMS has asked LPSC to make a presentation about different solutions, and BPSC has asked you to help them prepare it.

  1. Write a paper about encryption and the different types of encryption. Include the advantages and disadvantages of each.
  2. Include your recommendation regarding meeting their needs for encryption, and
  3. Create a memo communicating the actions you believe would be best for the company to take.

Excel Chapter 6 Grader Project – Delta Paint | Exp19_Excel_Ch06_CapAssessment_Delta_Paint

     

12

Enter   the reference to the net profit formula in the correct location for a   two-variable data table.

 

13

Complete   the two-variable data table in the range E25:K45. Use cell B6 as the Row   input cell and B4 as the Column input cell. Format the results with Accounting   Number Format with two decimal places.

 

14

Apply   a custom number format to make the formula reference appear as a descriptive   column heading Wages. Bold and center the headings and substitution   values where necessary.

 

15

Create   a scenario named Best Case, using Units Sold, Unit Selling   Price, and Employee Hourly Wage (use cell references). Enter these values for   the scenario: 200,   30,   and 15.

 

16

Create   a second scenario named Worst Case, using the same changing cells.   Enter these values for the scenario: 100, 25, and 20.

 

17

Create   a third scenario named Most Likely, using the same changing cells.   Enter these values for the scenario: 150, 25, and 15.

 

18

Generate   a scenario summary report using the cell references for Total Production Cost   and Net Profit.

 

19

Load   the Solver add-in if it is not already loaded. Set the objective to calculate   the highest Net Profit possible.

 

20

Use   the units sold as changing variable cells.

 

21

Use   the Limitations section of the spreadsheet model to set a constraint for raw   materials (The raw materials consumed must be less than or equal to the raw   materials available). Use cell references to set constraints.

 

22

Set   a constraint for labor hours. Use cell references to set constraints.

 

23

Set   a constraint for maximum production capability. Units sold (B4) must be less   than or equal to maximum capability per week (B7). Use cell references to set   constraints.

 

24

Solve   the problem. Generate the Answer Report and Keep Solver Solution.

 

25

Create   a footer on all four worksheets with your name on the left side, the sheet   name code in the center, and the file name code on the right side.

 

26

Save   and close Exp19_Excel_Ch06_Cap_DeltaPaint.xlsx.   Exit Excel. Submit the file as directed.

Unix/linux

2. Assume that you are hired as the Network Administrator for a small company. The 4 current employees have 3 Windows computers and 1 Mac computer. However, the business is growing and hiring 10 more employees. The business owner wants to set up file and print sharing for the employees, and set up a web server to sell their products on the Internet. Would you suggest implementing a Windows based network server or a UNIX/Linux based network server? Of course you must explain your suggestion if you want to receive full points for this question. 

3. It would be difficult for a user to tell the difference between a UNIX server and a Linux server if all they were doing was typing commands. 

True 

False 

4. True or False. The Courts in the United States have determined that UNIX and Linux are the same thing as far as Intellectual Property rights are concerned. 

5. When you connect to the UNIX server and run a UNIX command such as ls, where does the code 

for the ls command run, on your PC, or on the UNIX server? A. UNIX Server B. PC 

6. DOS has a tree structured file system for every logical disk. What is the maximum number of 

tree structures or top level directories in the UNIX file system ? A. 1 B. 1 for every physical drive C. 1 for every drive partition or physical drive D. 1 per device (drive, optical disk, thumb drive etc.) 

7. What key(s) or character(s) do you have to use to get out of the man page utility? A. exit B. x C. q D. Q 

8. What will be returned if you type: apropos delete user A. Every man page that has the word delete OR the word user B. Every man page that has the words delete AND user. Either word can be anywhere on the line. C. Every man page that has the exact phrase “delete user”. The words must be in that order, with 

just one space between them. D. A portal to another dimension will open 

9. What would you type to see all the files in the current directory? 

10. Assume you are in your home directory. What UNIX command do you use to see a listing of all the files in the directory /usr/lib ? 

11. While a directory may seem empty because it doesn’t contain any files or sub-directories, you will always see two items if you use the command to see all files. What are the names of these two items, and what are they? 

12. What you would type on the command line to move to the directory above the current 

directory? 

13. What you would type on the command line to move to your home directory? 

14. What you would type on the command line to move to the directory /etc/rc.d ? 

15. What you would type on the command line to move to a subdirectory of the current directory named junkDir? (You can assume that junkDir exists.) 

16. What is wrong with cat? That is, why do you typically use more or less instead of the cat command? A. It only works on files that have 10 or fewer lines. B. It only works on files that have lines that are 40 characters or less. C. It only works on files that have an extension of “.txt” D. The cat command sends the entire file to the display. This makes it cumbersome for files 

that are longer than a single screen. 

17. In WinSCP, which protocol should be used to connect to the CBC UNIX server? A. FTP B. SFTP C. SFTP (allow SCP Fallback) D. SCP 

18. True or False. UNIX follows the same 3 letter file extensions as Windows. That is, it uses .exe, .doc, .jpg etc. 

19. When you use the DOS COPY command you can assume many defaults. In fact you can leave the name of the destination blank, and DOS will assume that the destination is the current directory. Will the UNIX cp command work if you leave the destination blank? A. Yes. The cp command will assume you want to copy to the current directory. B. No. You must specify a destination. 

20. What is the difference between rmdir and rm –r ? A. The rmdir command will recursively delete any sub-directories and files while rm –r will not. B. The rm -r command will recursively delete any sub-directories and files while rmdir will not C. There is no difference, neither will recursively delete any sub-directories and files D. There is no difference, both will recursively delete any sub-directories and files 

21. When you delete a file using rm, how do you get it back out of the trash if you change your mind? A. Go to the trash folder in your home directory and move or copy the file. 

B. Use the undelete utility C. Run rm -recover filename, where filename is the name of the file you want to 

restore D. There is no trash and no way to recover the file without using special recovery software. 

22. Why can’t normal users, that is a user that is NOT an admin or superuser, change their user id (uid)? A. They CAN change it by using the usermod command B. The uids must be assigned in sequence, and only the admin knows which uid should be the 

next to use C. This would cause security issues as any user could impersonate any other user by simply 

changing to their uid D. The user may try to use a uid that has already been assigned and this would cause the OS to 

crash. 

23. Explain the difference between how umask and the chmod command affect your permissions? A. There is no difference B. The umask command only affects files that already exist, while chmod changes your 

default permissions C. The chmod command only affects files that already exist, while umask changes your 

default permissions D. The umask command only works in symbolic mode, while chmod only works in binary 

mode E. The umask command sets permissions for directories, while the chmod command sets file 

permissions. 

24. Can you set your default file permissions to 644 and at the same time have your default directory permissions set to 744? Why or why not? 

25. Say you had a file named q19 that had permissions of -r-xr-x—- What command would you use If you wanted to change permissions on q19 to -rwxr–r– (You must include the command name and the arguments to the command.) 

tsakoCross-Out

26. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to see details such as the file permissions for testfile if you ran ls –al testsub? A. Yes B. No 

27. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to cat testfile ? A. Yes B. No 

28. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to execute testfile ? A. Yes B. No 

29. Say you have a subdirectory named testsub, which has permissions of drw——- Also assume that there was a file in testsub named testfile that had permissions of -rwxrwxrwx. Would you be able to cd into testsub ? A. Yes B. No 

30. Which of the following is NOT a requirement for making your umask changes permanent? A. You must add the source .login command to your startup script B. The umask command must be in your .login file C. The .login file must be in your home directory D. You must have read and execute permissions on your .login file 

31. Users with an account on a UNIX system can edit some of their own information in the /etc/passwd file, even though they do NOT have write permission. A. True B. False 

32. Assume you are in vi in command mode. What happens if you hit the i key? A. You will change to input/insert mode and the cursor will move to the beginning of the 

current line. B. You will change to input/insert mode and the cursor will move to the end of the current line. C. You will change to input/insert mode and the cursor will move to the right of the current 

character. D. You will change to input/insert mode and the cursor will stay where it is. 

33. Assume you are in vi in command mode. What happens if you hit the A key? A. You will change to input/insert mode and the cursor will move to the beginning of the 

current line. B. You will change to input/insert mode and the cursor will move to the end of the current line. C. You will change to input/insert mode and the cursor will move to the right of the current 

character. D. You will change to input/insert mode and the cursor will stay where it is. 

34. In vi, what key(s) do you hit to change from input/insert mode to command mode ? A. i, a, I, A, etc. B. C. D.  

35. Assume you are in command mode. What the vi command(s) would you use to delete or cut the current line? 

36. Assume you are in command mode. What the vi command(s) would you use to replace the current character? 

37. Assume you are in command mode. What the vi command(s) would you use to force vi to quit w/o making any changes, even though you have edited the contents of the buffer A. :q B. :q! C. 😡 

D. :x! 

38. Assume you are in command mode. Write the command you would use to have vi display line numbers. 

39. Assume that you are in vi. What would you expect to happen if you typed the following: :-5,+5 s@^tony@Tony@ 

(You should be able to look at this and determine what will the command is saying. If you want to test this you will should create a text file with at least 20 lines, and put the word “tony” on every line. Some of the lines should have “tony” as the first word on the line, but it should not be the first word in other lines. Position yourself about halfway through the file before running the command.) 

40. Explain this step by step: This question requires you to perform the following hands-on tasks on your account on the CBC Linux server. Make sure and follow the instructions very carefully, especially the last instruction. I will only check for a file named “all.done”, so if you name your file something else you will not receive credit for this question. 

Also remember that if the Linux server supports FTP (WinSCP), you can always move the file to your Windows PC or Mac, perform the tasks, then copy the file back to the Linux server. 

A.Copy the file /home/test2.txt to your home directory. 

B.Remove all of the tab (^I) characters. (Hint: it may be easier to do this if you can see the tabs.) 

C. Edit the file and add two lines at the top of the file which contain your name (on the first line) and the “Geek In Training” (on the second line). 

D. In the first 30 lines, change all occurrences of the phrase “WWW” to the phrase “Santa Claus is coming to town”. 

E.From line 30 to the end of the file change all occurrences of the phrase “WWW” to the phrase “Que pasa”. 

F.Add the line “FIN” to the end of the file. 

G.Save the file with the name: all.done 

41. Explain this step by step: This question requires you to perform the following hands-on tasks on your account on the CBC Linux server. Make sure and follow the instructions very carefully, especially step 2. I will only check for a file named “executeTest”, so if you name your file something else you will not receive credit for this question. 

A. Create a file on the PC (use any editor), which contains the following two lines: 

echo “I love UNIX” 

date 

B. Save the file as plain text with the name: executeTest 

C. Move the file to your account on the UNIX system 

D. Give yourself, your group, and the world execute permissions. You can add other permissions if you wish. (Hint – to test this try running the file by typing ./executeTest. If you get the “Permission Denied” error message then something is wrong. If you see “I love UNIX” followed by the current date then you have execute permission.

Research Paper – Article Review Qualitative in course – inferential statistics in decision making

Please write an Article review qualitative on inferential statistics in decision making. Please find attachments for requirement

QUALITATIVE Submit Article Reviews Here

You will review qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)Please use APA formatting and include the following information:

Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?

Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?

Study Findings and Results: What were the major findings from the study? Were there any limitations?

Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)

References

Requirements:

I need this Qualitative research analysis.

Cloud Apllications

  

Some organizations are moving their business applications to the cloud to reduce their infrastructure costs. In some instances, organizations use web applications, which introduces security challenges.

EULA

Identify one EULA that you have entered into. We are each parties to many of them, whether from an application, mobile app, software or hardware (printers, for example, include EULAs). In your Initial Post, describe the EULA or provide a link to it (many are quite long, so copy-paste may burden the Discussion), making sure that others can access it for review. Discuss at least two terms or clauses in the contract that are vague, and give at least two possible interpretations of each. How might the interpretations favor the manufacturer/vendor/owner of the product or service covered under the EULA? How might they favor you as the consumer?

500 words. APA format needed.

Discussion 11- Initiating Project

  1. Define and provide one example each of a known known, known unknown, and unknown unknown you have encountered on previous projects. Which of the these would be addressed during planning phase? Which would be the basis for listing on a risk register? Why?
  2. To help identify risks, what are some questions a project manager could ask when reviewing the project charter and WBS? Why would these be the questions to ask?

Your post must be substantive and demonstrate insight gained from the course material. 

Text-

Title: Contemporary Project Management 

ISBN: 9781337406451 

Authors: Timothy Kloppenborg, Vittal S. Anantatmula, Kathryn Wells 

Publisher: Cengage Learning 

Publication Date: 2018-02-08 

Edition: 4th

computer forensic

Research the use of computer forensics in court cases and choose one case. Write about 400 words about the case (summarize it in your own words – no copy and paste) and how digital forensics was used in the case.

This assignment is about the use of computer forensics in cases that reached the court. Research the use of computer forensics in court cases and choose one case. Write about 400 words about the case (summarize it in your own words – no copy and paste). Briefly write about the case, include basic information such as the name of the case and the year (exampe: Daubert vs. Merel Dow Pharmaceuticals 1993), the subject of the case, and how digital forensics was used in the case.

Software Methodology

1- Describe the purpose and difference of structure diagram and behavior diagram for UML application and development.

2- a. Why we need Component based design for software system developing? Is that a must or there are substitute approaches for developing software systems?

    b. Explain why it is easier to develop automated unit tests than automated feature tests.

3- What’s the difference between distributed and web-based software system design?

4- Is web-based design a must for most of software engineering system development?

5- Why it is essential to use a code management system when a team of developers is involved in creating a software system? What are the benefits of using a code management system if only a single developer is involved?

****A simple explanation is required. Each question should be one paragraph. One paragraph should be 5-8 sentence.