Week 12 Research Paper

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PPT slides for Team Management course

Course: Team Management

Need three PPT slides on below topic. 

– List and describe a negative team process for any team. 

Text Book: chapters 4, 17 and 13. 

“Group Dynamics for Teams, 6th edition by Daniel Levi and David A Askay”

db

 Use a customer order form and follow the bottom-up database design  approach. Please include the website URL and an image of this form. 

  1. Find all the attributes on the form.
  2. Establish the dependenci es (determinants).
  3. Group attributes that have a common determinant into an entity type; name it.
  4. Find directly-related entity type pairs.
  5. Determine the connectivity for each pair.
  6. Draw the ERD.
  7. Review the ERD and update to be in 3NF if ERD from step 6 is not in 3NF.

No plagiarism

Two-Factor Authentication

we are going to set up Duo. Duo is a commonly used second-factor authentication mechanism used by many entities, even the university. It allows a user to register their cell phone to their account and either type a rotating six-digit number or push a prompt to their cell phone. Duo also includes a free tier that allows you to create up to 10 users.

1. Create an account using your university email here:

Use your own name for Company. Verify your email by clicking the link, and then choose a password. Next, install the Duo app on your smartphone and scan the QR code to link your administrator account to your smartphone. If you don’t have one, you can set one up with any phone number.

2. Next, we will set up two-factor authentication to log in to our virtual machine. Follow the directions here to get started (you just did Step 1 above):

3. Screenshot your successful login through Duo prompt (after /usr/sbin/login_duo echo ‘YOU ROCK!’), and stop at that point. You can continue following the directions to set up two-factor authentication on the login if you desire, but at this point, we have proof of concept.

For your submission, include:

  • A screenshot of successful Duo login from the command prompt
  • Your thoughts on the benefits of adding a second factor of authentication to the system login. Is the inconvenience worth the security gain?

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations
  • See the assignment rubric below for more details 

Internet Research Assignment #1: Cybercrimes

Ransomware attacks on the United States, state and local governments since 2013 and are increasing at an alarming rate. Research ransomware attacks on three federal or state jurisdictions, with one of them being the City of Baltimore.

For this assignment, you are to describe ransomware, what impact did these attacks have on the three jurisdictions in terms of cost and lost revenue, did these municipalities pay the ransom amount demanded or did they try and recover from the attack without paying the ransom. If so, how much did the data recovery cost the municipality, and lastly, what would you do if you were the governor or mayor of this ransomware attack…pay or not pay.

This paper should be at least three pages long, double spaced, with your name, date, and title included as a header, page numbering in the footer in the form of page x of y, and have references cited per APA formatting guidelines. You must use a minimum of five references and none of them can be Wikipedia.

INT 2681 LAB 2….lll

 

  1. complete Netlab 2 and submit your lab summary here.

    NETLAB 2: A. Reconnaissance With Hping/ Creating and Installing SSL Certificates. 

    1. Using hping as an ICMP utility 
    2. Using hping for port scanning. 
    3. Create a Self Self-signed certificate 
    4. Configure Apache SSL File. 
    5. Testing SSL Certificate. 
    6. NETLAB 2: B. Vulnerability Scanning With Openvas. 
    7. OpenVas initial Setup 
    8. Scanning with OpenVas 
    9. Customized Scanning with OpenVas 
    10. Which other tools can be used for vulnerability management? 
    11. NETLAB 2. C. Network Analysis/VNC As A Backdoor. 
      1. Capturing Traffic with tcpdump 
      2. Analyzing Traffic with Wireshark 
      3. Using TightVNC 
      4. Reversing VNC Connections 
    12. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files  
  3. SafeAssign accepts files in .doc, .docx, .docm, .ppt, .pptx, .odt, .txt, .rtf, .pdf, and .html file formats only. Files of any other format will not be checked through SafeAssign.
  4. Plagiarism Tools I agree to submit my paper(s) to the Global Reference Database

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

WK9

Download The Attachment and Message Me Please for Detailed Instructions

Dq

Need all discussions in individually page as a separate doc 

Discussion 1 :