Title SQL Queries

  

Title : SQL Queries

45. SELECT Prod_SKU, Prod_Descript, Prod_Type, Prod_Base, Prod_Category, Prod_Price

46. SELECT Emp_Fname, Emp_Lname, Emp_Email

47. SELECT Emp_Fname, Emp_Lname, Emp_Phone, Emp_Title, Dept_Num

48. SELECT e.Emp_Num, e.Emp_Lname, e.Emp_Fname, sh.Sal_From, sh.Sal_End, 

49. SELECT DISTINCT e.Cust_Fname, e.Cust_Lname, e.Cust_street, e.Cust_city, e.Cust_state, e.Cust_ZIP

50. SELECT e.Emp_Num, e.Emp_Lname, e.Email, e.Emp_Title, d.Dept_Name

51. SELECT b.Brand_Name, COUNT(p.Prod_SKU)

52. SELECT Prod_Category, COUNT(Prod_SKU)

53. SELECT prod_base, prod_type, COUNT(Prod_SKU)

54. SELECT Brand_ID, SUM(Prod_QOH)

55. SELECT b.Brand_ID, b.Brand_Name, ROUND(AVG(p.Prod_Price))

56. SELECT dept_num, MAX(Emp_Hiredate)

57. SELECT e.Emp_Num, e.Emp_Fname, e.Emp_Lname, MAX(sh.Sal_Amount)

58. SELECT c.Cust_Code, c.Cust_Fname, c.Cust_Lname, SUM(i.Inv_Total)

Cyber Security

6-8 page PPT on Cybersecurity in Networking (must include Introduction, Importance, Cybersecurity objectives, conclusion, and reference section)

Include at least one figure or one table in the presentation and format in APA style, Highlight your knowledge of technology by including some transition and some animation

Follow the 7×7 rule:  No more than 7 bullets per slide, and no more than 7 words per bullet. (Any further explanation needs to be put in the Notes Pane)

4 Scholarly References 

Cyber sec

Prepare a two-page briefing paper (5 to 7 paragraphs) that provides background information about the European Union’s approach to privacy. Your target audience is the IT Governance Board for Red Clay Renovations. Specifically, you should explain the following concepts / practices:

  • Privacy by Design
  • Right to be Forgotten
  • Right to be Informed

Your briefing paper must also identify and recommend 5 or more best practices for privacy protection that Red Clay Renovations should incorporate into its IT security policies. At least two of your recommendations must come from the European Union’s privacy mandates.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

response due 5/19

RESPOND TO THE POST BELOW ON HOW YOU FEEL AND COME UP WITH THREE QUESTIONS AS WELL.

 

“Large-scale denial-of-service (DoS) attacks”

For this discussion, I selected the malicious activity of denial-of-service (DoS) attacks. A DoS attack is a method of disrupting the functionality of an organization’s network or system (Morris, 2021). This is executed to prevent normal users from accessing the resources of that network, which places the network in a position where services are unavailable. A recent example of a large-scale DoS attack would be the attack targeting Amazon Web Services (AWS) in 2020. In this attack, advisories targeted a user through connectionless lightweight directory access protocol reflection (Nicholson, 2023). Essentially, leveraging external servers to significantly increase the amount of data being transmitted to the target’s IP address; upwards of 70 times (Nicholson, 2023). This specific attack greatly impacted AWS, as an example noting that the largest cloud provider can be attacked and rendered nonoperational, as this attack lasted for 72 hours.

The scalable solution is a specific countermeasure AWS put into place to counter DoS attacks. In configuring your virtual infrastructure to be scalable, your resources can expand when the demand increases and consolidate when the demand decreases. This is done dynamically, making for a proactive way of ensuring DoS attacks have a smaller window to target. An additional countermeasure would be configuring a web application firewall for cloud resources. This would enable a mechanism to monitor “good” versus “bad” traffic, thus limiting your attack surface. Overall, the ultimate countermeasure is planning and being proactive with expected behavior. If organizations can conduct analysis and establish what the baseline of traffic looks like, they will be able to get ahead of suspicious behavior and limit the potential for DoS attacks.

References:

Morris, E. (2021) Dos vs. ddos: Which attack is more dangerous and why?, Cybrary. Available at: https://www.cybrary.it/blog/dos-vs-ddos-which-attack-is-more-dangerous-and-why (Accessed: 15 May 2023).

Network Design Paper UMUC

       

Network Design Paper UMUC has recently acquired a building in Frederick,  Maryland. This new building will house some administrative offices, lecture rooms, library, and computer labs. Building dimensions: Length: 240 Feet Width: 95 Feet Height: 30 Feet The 40-year-old two-story building has the following existing layout: There will be six computer labs that will be used for instruction. Each of these labs will have 21 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 5 computers for Library staff. There are five lecture classrooms in the building. Each of this room will have a computer for instructor’s use. Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use. Equipment Inventory Workstation Placement Number of Workstations Users Total WS 6 Instructional Computer labs 21 WS Student and Instructor 132 WS (based on 20 WS for students and 1 WS for instructor on each lab) Student Computer Lab 30 WS Student 30 WS 5 various offices 5 WS Staff 5 WS Admission office 5 WS Staff 5 WS Library 10 WS Student 10 WS Library 5 WS Staff 5 WS Server Staff To be determined by students Network Connecting Devices IT Staff To be determined by students Printers To be determined by student Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: • Student-accessed computers should be on separate network from the staff-accessed computers. • The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor. • Security is very important for UMUC as we have to protect students and employees data as well as any intellectual property that UMUC has on the servers and computers. • The network has been assigned the 10.15.0.0 network address for all computers and devices. For Internet routing use 191.1.1 network address. • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area. Submission should include (in no more than three pages, excluding diagrams and references): Network Addressing: 1. Define the subnet (based on: rooms, floor, department, or other criteria). 2. For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. Physical Network Design: 1. Define the topology that will be used. 2. Select the appropriate network media to use. 3. Select the appropriate network connecting devices to use. 4. Physical layout of the computers on the floor plan. 5. List of additional servers or network devices needed to implement the network. 6. Justifications for your network design (number 1 – 5 above) You will be evaluated on your ability to o Implement appropriate IP addressing scheme o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment o select and justify appropriate topology such as star, bus, or ring for your network o select and justify of your selected network equipments o select and justify appropriate network services to meet network requirements o select and justify security implementation for the network o use proper grammar, formatting, network terminology, and reference citations Feel free to use any drawings or attachments, and assume any number of computers or users (not when provided here). You will be graded on the basis of right media, topology and knowledge of network concepts. Grading Rubric Criteria 0-59% 60-79% 80-89% 90-100% IP Addressing 30% Student fails to demonstrate adequate subnetting knowledge Student demonstrates some knowledge of subnetting Student demonstrates proper subnetting for the network but failed to provide all IP addressing information needed Student demonstrates proper subnetting for the network and provide all IP addressing information needed Network Requirement 40% Student fails to design proper network to address the given scenario Student misses some critical network design and/or misses on the justifications Student designs a network that address most of the requirement and are able to justify some of the design Student designs a network that met all requirements and are able to justify the design Network Technical Knowledge 20% Student does not have grade