cyber security related

Create a Gmail account to be used for encryption. Download and configure Thunderbird, GnuPG, and Enigmail to work with your new Gmail account. Document your findings and observations in a 1200-1500 words with references and following APA writing standards.

Penetration testing research paper

  

Assignment:

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

· What is penetration testing

· Testing Stages

· Testing Methods

· Testing, web applications and firewalls

Your paper should meet the following requirements: Also see: buy a research paper

· At least 5 journal citations from 2017 and later. Make sure to reference the citations.

· Be approximately four to five pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Asset Management

Develop and use information classification guidelines.
Understand information handling and labeling procedures.

it should follow APA citation rules. Please be sure to proofread, spell and grammar check your paper prior to submission. This SyncSession paper should be 1-2 pages long, not including the title page and reference page. Please use Times New Roman, 12 point font. Please double-space your paper.

SECURE CLOUD ARCHITECTURE

Business case:  Bule Sky Airport  ( third improvement) 

As an IT Manager, you were tasked to improve the performance of the local Airport’s (Bule Sky Airport ) Passenger Processing system.  This is to make the Airport more efficient and more secure. 

There are three databases in the Bule Sky Airport Passenger Processing IT system :

1-Passenger database will record and authenticate each passenger in the airport

2-Employee database will record and authenticate each employee in the airport

3-Flight database will record each flight in the airport

After having meetings with the airport owners and managers Passenger and Flight databases and related processing will be moved to the cloud.   

  • Boarding passes will be calculated and prepared on the cloud as well. The final version of the Boarding Pass will be printed on the printers at the airport
  • Flight logs along with the passenger checklist will be calculated and prepared on the cloud. The final version will be printed on the printers at the airport
  • Old Passenger and Flight data will be stored on the cloud (long-term storage)

Employee database and related calculations (calculating the salary and other benefits) will be done on the premises.

QUESTION 1: Write the benefits of “monthly cloud use” for passenger databases and flight databases and the related processing for the given Airport Case.

QUESTION 2: Before you begin the design process (to move Passenger and Flight databases and related processing to the cloud), you have to ensure that you have a complete set of system requirements. Write the Functional requirements and Nonfunctional system requirements

QUESTION 3: While you are designing your cloud-based solution for the airport system, how you would address the following issues related to the long-term operation of the airport?

Passenger Data Backup
Earthquake Disaster Recovery
Performance of Boarding Pass  processing 
Scalability to Accommodate  New Terminals in the Future 
Security of Passenger data

READ BEFORE BIDDING

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.

Business Intelligence

The following are the items to discuss in the paper:

  • What are the five (5) steps (describing each one) for implementing intelligent systems (please review the lecture and PowerPoint for this week for details and assistance)?
  • Provide at least three (3) examples of an intelligent system and what it is used for.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of three (3) references
  • Format your paper consistent with APA guidelines – review the provided PowerPoint, APA Manual, and video for details and assistance.
  • When submitting the assignment, please ensure you are submitting it as an attached MS Word document.
  • please follow APA 7 guidelines

Week 4 Discussion Forum (LO2) (LO3) – 50 points

Define plagiarism in your own words and describe strategies avoid it?  Describe a method of organization that maintains academic integrity and avoids plagiarism.

Post must be 300-500 words; end post with a question OR respond to two peers. Responses to peers should be 100-200 words. (LO2) (LO3)

Essential Activities: 

  1. Reading the required materials for the week will assist you in this forum.

Problem 7- Project Process

Activity I: As part of your company’s effort to select a project management software package, you have been asked to approach several other companies that presently use such packages.

  1. Develop a questionnaire to help collect the relevant information.
  2. Fill out two questionnaires, each representing a different software package.
  3. Compare the responses of the companies and select the best software of the two.

Activity II: Identify two projects in which you have been involved recently.

  1. Describe each project briefly.
  2. Suggest criteria that may have been used to identify the start of the termination phase of each project.
  3. Give two examples of activities that were performed poorly during the termination phase of either project, and suggest measures that might have been taken to improve the situation.

Text

Title: Project Management 

ISBN: 9780134478661 

Authors: SHTUB 

Publisher: Pearson 

Edition: 3RD 17

Write a turtle program that asks the user for a numerical

Write a turtle program that asks the user for a numerical value S and draws eight parallelograms forming the following shape, using at least three colors of your preference: Save your program as eight_parallelograms.py. The input value S represents the long diagonal of each parallelogram, as shown in the image below: All sides are of the same length, which is given by the expression (S2cos(π4)) . The two internal narrow angles are of 45 degrees, and the two wider angles are of 135 degrees. All these dimensions and angles are illustrated in the image below: NOTE: When using Turtle graphics, the angles we use in all turns (i.e., turtle.right and turtle.left) correspond to the outside angle of the turn. That is, if we draw the parallelogram starting at the bottom-left corner, drawing its bottom side first, we will be doing the left turns highlighted in red in the picture above. (The turn angle we need is 180 minus the internal angle of the corner we want to recreate)After drawing a parallelogram, the turtle will be heading in a South Westerly direction. At this point, doing a 180-degree turn will orient the turtle in the correct direction to draw the next parallelogram, as illustrated in the image below: TIP: All parallelograms are identical; they are just drawn in different orientations. So, copy-and-paste can come handy in replicating the actions needed for the 8 parallelograms.