Need tomorrow. Need x code project file coded with swift programm
Need tomorrow. Need x code project file coded with swift programm
All the instructions on the file that has been uploaded. You have to use swift programming language to complete the assignment please
Please Refer word document attached below and cover the chapter1 outline on ethical hacking according to points mentioned in word document, need in next 12hrs
Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:
Table 1. Kamehameha Educational Offerings.
GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information
The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.
Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:
· Each of the facilities has three floors:
· The first and second floor of each building requires 150 network connections each
· The third floor of each building houses a data center and requires 75 network connections
· The Honolulu location requires additional network connections for failover purposes
· The Hilo location will be the primary data center and house redundant database servers
· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)
· A constant connection between the three locations, carrying at least 75 Mbps of data
· All servers at all locations must have redundancy
· Protection from intrusions is required and should be documented
· A plan to verify security and failover measures is required
· Submission: Using the free tool, daw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:
Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates
Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.
One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:
· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:
Table 2. Example Network Diagram Callout Box.
CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010
· Any necessary hardware
· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
· Annotate the following values for each of the Sites:
· Network ID
· Useable Range
· Subnet Mask
· CIDR Value
· Broadcast Address
· All devices require hostnames complying with the following naming conventions:
· Routers: Rx; where x is the site number incremented by a value of 1 for each router
· Switches: Sx; where x is the site number incremented by a value of 1 for each switch
· Servers: SRVx where x is the server number incremented by a value of 1 for each server
· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
· management vlan
· production vlan
High availability
When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:
Figure 2. Draw.io ‘Export’ as Function to PDF
How Will My Work Be Evaluated?
1.1.3: Present ideas in a clear, logical order appropriate to the task.
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
10.1.1: Identify the problem to be solved.
10.1.2: Gather project requirements to meet stakeholder needs.
10.1.3: Define the specifications of the required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
1) Assignment 1 ( 2 Pages )
Post-Assessment:
Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.
Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession.
Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent.
Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.
The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America.
The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.
Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:
1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.
1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.
1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences.
Academic Integrity/Plagiarism
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.
Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.
Reference
Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier.
2 ) Assignment 2 ( 2 Pages )
Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.
Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.
Case Study
Case Example inspired by a case in (Casey, 2011)
A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.
Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document.
Question 1 – Following the Cybertrail
Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response.
Question 2 – Following the Cybertrail
By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?
They are three assignments and they are all related to each other. The topic I want it to be about is “Adopt a pet” web application. The application is about being able to adopt a pet using a web application. The requirements of the assignments are attached below. and each assignment I have in a folder and with it will be documents you reference from according to the requirement to the question itself. And also there is a folder called templates and this folder has templates that you can use for the assignments.
Discussion :
Carefully review and use either of the book options below as a reference for various aspects of analytics.
After reading and analyzing content from book references and or from outside research, select “one” of the research options below and respond.
Discussion Expectations
Please make sure to proofread your post prior to submission. They should be well written and free of grammatical or typographical errors.
Knowledge and skills paper:
Graded Assignment: Knowledge and Skills Paper
Paper Section 1: Reflection and Literature Review
Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10. This section of the paper should be a minimum of two pages.
Paper Section 2: Applied Learning Exercises
In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below. Important Note: Dot not type the actual written problems within the paper itself.
Important Note: There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.
Paper Section 3: Conclusions
After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward. This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.
Paper Section 4: APA Reference Page
The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.
Paper Review and Preparation to submit for Grading
Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!!
Important Reminder: Assessment of discussion boards and other writing assignments account for 75% of overall grading and below are how grades will be assessed for this assignment:
I have attached the problem statement and all the required details inside the document. I need it done by 10/09 4pm EST.
I need a presentation and a R script as the solution.
1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Week 8 Written Assignment
Topic: After conducting independent research using at least three sources not used in the class write an essay that forecasts future impact of the Internet as its role in society continues to evolve. You should point out new issues if you foresee them.