discussion

refer to the attached document:

 

Some thoughts to help you understand:

Think about the basic features of Facebook. Facebook develops features to maximize the amount of social interaction on its site by connecting users to one another whether they want to be connected or not. Review the list of marketing tools currently being used by Facebook (Table 7.2 in the text). Consider the following questions about Facebook and other Social Marketing platforms.

  • Which Facebook marketing tools do students find are the most effective in their personal lives?
  • Do students pay attention to Facebook ads?
  • Are students interested in what their friends buy?
  • Do students trust their friends to recommend products?
  • What kinds of products would their friends’ choices impact?

In C Program. Write functions for the four basic mathematical

  

In C Program. Write functions for the four basic mathematical operations addition, subtraction, multiplication and division. Each function has two numbers as parameters and returns the result. use integers. You do NOT have to do rounding for the division.
Write a program that asks the user for numbers a and b, and then use these numbers as arguments for your functions and print the result on the screen.
The output has to be as follows:
Give a: 11
Give b: 5
11+5= 16
11-5 = 6
11*5 = 55
11/5 = 2

Cisco Passwords

 

Part 1: Type 5 Cisco Password Hashes

To keep your routers, firewalls, and switches secure, they need good passwords. Type 5 Cisco password hashes employ a technique called salting. Discuss password hashes and salting and discuss password cracking tools or websites that can be used to crack Cisco password hashes. Some of the most popular Linux tools are John the Ripper and Hashcat, which are both already included with the Kali Linux distribution. The Windows tool Cain can also crack Cisco passwords. Use the as is choice and the default wordlist that comes with Cain on the password hashes below. You may elect to crack some of them and explain how you did it for part of this discussion. Include screenshots:

$1$mERr$TMFGl3gjZgTURz2zWGujv1

$1$mERr$j2lBkUQmIwqeeIUhzEMH/1

$1$mERr$UeZ8mb786UhNnpZquiKwc0

Part 2: Type 7 Cisco Password Hashes

The Cisco type 7 password is not much better than putting the password in clear text, which is the default if you do not type the command service password-encryption. Discuss password hashes and discuss password cracking tools or websites that can be used to crack Cisco type 7 password hashes. Here is a list of some Cisco password hashes. You may elect to crack some of them and explain how you did it for part of this discussion. Include screenshots.

11280B061F1B583342

532E26010C082B070B6F02

46152908515041

09611E590A565451

023057495B085E226D6E

062B3D0D1C4A0E4A44

Project

In this project, you will create a portion of a threat model for an imaginary system. Real threat models are large and generally involve multiple contributors. For this reason, you will not be writing an entire threat model, but instead will be creating some specific components. While a real threat model would not be done individually, this is an individual effort project. No groups are allowed.

You may choose either of the following two systems to create a threat model for:

–A smart home system, with an Internet connected hub allowing control and automation of lights and other devices in the home.

— An e-commerce web site, allowing online purchasing of products.

— You may also suggest your own scenario, but in this case, you must get permission from the professor before proceeding. Your scenario should be approximately equal in complexity to the two suggestions given.

These scenarios do not have many details specified. Please make reasonable assumptions about how you expect the systems to realistically function. At a minimum, each of the suggested systems has a front end system that has interactions with users, some type of authentication, and interactions with at least one back end server. If you are unsure if assumptions you are making are reasonable, please ask on the project 1 discussion forum.

1) You must create a level 0 data flow diagram that shows the interactions of external entities with a multiprocess. You must create a level 1 data flow diagram, that shows the main flows of data between processes in the system and data stores. You must choose two specific function of the system and create level-2 data flow diagrams for those functions (you will have two different level-2 data flow diagrams). All four data flow diagrams should show trust boundaries.

2)Use CAPEC to find potential threats in your system. For at least two attack patterns listed in CAPEC, find corresponding threats to your system. Each attack pattern may correspond to multiple threats (which you may or may not have already identified using STRIDE). For each threat, indicate the data flow diagram element or elements it affects, the CAPEC attack pattern, and a brief description of the actual threat.

3) Identify threats using the STRIDE method in conjunction with your data flow diagrams. Create a list of additional threats. For each threat, indicate which STRIDE category it fits into, and which element of your data flow diagrams it is associated with. Please include only realistic threats. Do not include several threats that are near duplicates of each other (“infects system with virus X” and “infects system with virus Y” should not be separate items). Threats with differing likelihood or impact should not be grouped. You must identify at least 20 threats, which must include at least one in each stride category.

4) Choose two threats in the system (identified in step 2 or 3) and create threat trees. These trees should each have at least three levels and ten nodes, including “or” and “and” nodes. At least one of your trees must be annotated in some way to help analyze the threat (up to you what annotatoin to use)

5)For at least 5 of the threats you identified, determine the risk associated with the threat. You may use any of the methods which will be discussed in week 6 videos, but your answers should be justified.

PRESENTATION

 

PRESENTATION:

For your main discussion post in Week 8, create a poster, audio-visual aid, or PowerPoint presentation that summarizes the main takeaways from your case study that you feel you should share with your classmates. Get those creative juices flowing and have fun creating, sharing, and discussing your topic with everyone in the classroom! Remember to include citations and references as appropriate. 

Do your best to post early in Week 8 so that there is more opportunity to discuss everyone’s projects. 

6/1 Devotional

The Scriptures encourage we live in honesty, in truth. This applies to work as well as our interactions with friends and family. We should always be practitioners of honesty and ethical behavior. One of our guiding principles should be that we are concerned with the truth. How do we know the truth? Psalm 1:2 says, “But his delight is in the law of the Lord, and on his law he meditates day and night” (ESV). “His delight is in the law of the Lord” refers to our constant, vigilant effort to maintain our integrity.

  1. Review the material in the Getting Started section, including the specific Bible passage.
  2. Be sure to address to the following prompts in your paper:
    1. How might this verse impact your work as an IT professional?
    2. How would you apply the principles of this verse to your personal life as well as professional?
  3. Your paper should be at least 250 words in length.

discussion

 

3 hours; Additional Time for Study, Research, and Reflection: 1 hour

Directions:

Business Continuity (BC) and Disaster Recovery (DR) plans are clear in today’s business environment.

For your initial post this week, identify two Disaster Recovery and/or Business Continuity plans that are now apparent in today’s businesses. Explain why they are used today.

due in 5 hrs

Discussion post week 6

Need a 250-word discussion post for the below question with the URL reference link.

Nascent efforts to financially measure cybersecurity to make sound investment decisions?

Note: NO PLAGIARISM

This question is from a cybersecurity subject so, the matter should relate to cybersecurity.

Discussion 5- Project HR & Stakeholder Mngt

Assigned Readings:

Chapter 7 – Stakeholder Communication

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. How might a project manager communicate differently with a stakeholder as opposed to the rest of the team?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22