Emerging threats_6.1

Research Paper: 

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • The answer should be a minimum of 4 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Sorting – Java Coding Assigment

 

 

*** To do this assignment you are not to use any of the Collections API, or any 
   pre-implemented sort routines in Java. ***
In this assignment you are required to make use of the sorting routines in chapter 8 of you text book. You must ask the user to select which sorting routine he/she wants to use out of those routines implemented in the book (Insertion Sort, Shell Sort, MergeSort, or QuickSort). Based on the user input, you need to call the corresponding routine.

You are required to write one main program that will read in any number of integers and store it in an array of ints (not an ArrayList). What you need to do first is to ask the user what sorting routine he/she would like to use. Then you need to ask the user how many integers to be entered as input, and then ask the user to input that these integers.

Your program will store these integers into an array of integers first. Then your program is supposed to remove the duplicates out of this array by first sorting the array (using the user-specified sorting routine), and then removing any duplicates. Your program must not copy these elements into another array to remove the duplicates, the duplicates should be removed in place which means in the same array. Also, you must sort the array first before you start duplicate removal.

Once your array (the same array you started with) has only unique numbers, your program should print out the array followed by a list of all the numbers that were duplicated.
The numbers that were duplicated can be stored into another array.

--------
The following would be a sample scenario of running your program:

Make your choice of a sorting routine first. Then continue as follows:

Enter the number of integers: 10
Enter the 10 integers: 7 9 8 1 9 24 23 24 9 8

The resulting array is: 1 7 8 9 23 24
The numbers 8, 9, 24 were duplicated in the input.
--------

The only file that is to be submitted is a Main.java (or Assg6.java) and no other file.

Best of Luck

Discussion

 The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program. 

Cloud computing_31_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.

Please include the reference and citation. Need by 11/01 11:00 am.

Cloud Computing Discussion 10

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Standalone quotes will not count toward the 3 required quotes.

Python Assignment

  airports = [{‘name’: ‘Cincinnati’, ‘altitude’: 2000, ‘code’: ‘CVG’}, {‘name’: ‘Chicago’, ‘altitude’: 1800, ‘code’: ‘OHA’}, {‘name’: ‘Indianapolis’, ‘altitude’: 1700, ‘code’: ‘INY’}]

1. Given the “airports” list above, create 3 lists, one of the airport names, one of the airport altitudes and one of airport codes using for loops… using list comprehensions…using another technique

2. Given the 3 lists from #1, combine them back into a list of dictionaries using the most efficient technique you can think of

3. Given the “airports” list above, find the total combined altitude using for loops… using the sum() function… using the reduce() function.

PLEASE PROVIDE PYTHON 2.X/3.X CODE FOR SOLVING THE EXERCISES ABOVE.

database management

IFB105 Database Management

Project – part A

Project overview

The IFB105 project gives you an opportunity to apply concepts and skills you acquired in the unit to a realistic database design scenario and reflect on the data requirements of an organisation.  

The submission is divided into 2 parts due at different times during the semester. These parts will cover:

  1. Design of a database
     
  2. Creation and use of a database  
     

The task for part A

In this part, you will:

  1. Design an ORM conceptual schema for a business domain based on sample reports required for that domain.
     
  2. Map a different ORM schema to a relational database schema.
     

.please there are several task on the file uploaded ..

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.

Article Summary

 

– Find 2-3 recent peer-reviewed articles (within the past 3 years) that  ‘closely relate to Impact of Mobile Computing on Businesses’  

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.