Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Policy, Legal, Ethics and Cmplc

 

Research Project Proposal

The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. Do not zip your submission.

Respond helpfully to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Wtite to help them focus and say something that you think would help them say something that would be valuable.    You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested

Strategic Management

Read the attached case study answer the questions at the end of the text in a 2 and a half page paper (excluding title and reference pages) include at least three peer-reviewed sources found.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. 

Organization that adopted Cloud Computing

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements: The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 5 pages in length with the content excluding Title and reference page. The Title and Reference pages do not count towards the page count requirements.

Please refer attachment for the rubric scoring guideline.

CIS 373

 

This assignment consists of two parts. 

Part One

Your client is interested in how you will structure the website. Before you begin to write the HTML for your pages, it’s a good practice to create a storyboard that outlines your ideas for colors, font sizes, placement of images, hyperlinks, and sections on each page. Your storyboard and file structure should outline your homepage, inside pages, navigational scheme, and where you plan to add your form. This is a high-level design that you will be adjusting and changing throughout the quarter. You do not need to write this in HTML! In fact, it will save you time if you develop your storyboard in Word, PowerPoint, or Visio first, so you can make adjustments based on feedback.

Here are some online resources to help you think through the process:

Part Two

Based on your storyboard, you will begin to create your file structure for your site. It is never a good practice to keep all your files in the same folder.

For example, if you are developing a site that sells clothing for men, women, and children, you might have one folder for all the pages that house men’s clothing, another for women’s clothing, and so on.

You can create this portion in Word, indicating where each of your HTML pages will be located, as shown in Section 2.4: Links in Your Text.

Requirements

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Create a storyboard for a website.

CSCI 397 ICSCIS paper on Advantech – WebAccess (SCADA)

TOPIC- Advantech – WebAccess (SCADA)

OVERVIEW

A key objective of any academic program is the refinement and reinforcement of strong communication skills. 

The same ability of a cyber security professional to compile information and present findings, observations, and recommendations in a clear, 

concise, and understandable manner is equally important. 

It is for these reasons that a requirement exists for the successful completion of this course to perform research centering on a 

specific automation vendor and their industrial solution offering and compile a paper summarizing the findings in a form of security assessment.

The paper will focus on selecting a company and one of their industrial control system offerings. 

Solutions are often aligned to specific industry sectors and customer bases. These solutions should be understood to then look at vulnerabilities

that have been disclosed targeting these systems. Equally important is the impact to the business operations of the end-user or asset owner should 

any of these vulnerabilities be exploiting – either intentionally or accidentally.

It is essential to evaluate the unmitigated risks associated with these vulnerabilities and develop a recommended list of actions that would help the asset 

owner in mitigating some of these risk in order to improve the operational integrity of their cyber-physical systems.

1-The paper shall be at least five (6) and no more than ten (10) pages in length excluding figures, tables, and references. 

2-The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between 

3-lines with 0.5″ indentation on first line of paragraphs. 

4-The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

5-All tables and figures shall be captioned and specifically referenced in the body of the document. 

6-All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

7-No more than two (2) citations shall be from Wikipedia

8-At least two (2) references shall be from United States government sites (e.g. CISA, NIST)

9-At least two (2) references from vendor web (html) or printed (pdf) material

10-At least two (2) references shall be from independent sources including but not limited to

   News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)

   Industry Publications (e.g. Automation, ISSSource, Control)

   Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)

   Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

 Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis

     20% = Organization

     20% = Development and Support

     10% = Style

     20% = Mechanics

     10% = miselaneous

 

The term research paper should be logically divided into sections that follow sound research paper style and address each of the following areas. 

You are free to organization the paper and presentation as appropriate,

 however a template has been provided for both the paper and presentation to help start the initial paper structure.

The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper shall address and develop each of the following items:

1-System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets

2-Communication protocols used by the system

3-Industry sectors that use the system

4-Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages

5-Potential or actual impact of the vulnerabilities discovered to the industry sectors served

5-Cyber security measures taken by the vendor to secure the system

7-Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Reference links

https://icscsi.org/library/#osint

https://us-cert.cisa.gov/ncas

https://icscsi.org/library/#news

https://training.icscsi.org/mod/resource/view.php?id=2568

building an AI machine/Deep learning applicationPart 1 – Following is the link of the Project and Dataset :https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

 Part 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data…

[9:28 PM, 12/10/2020] Mohammed Monroe: Part 1 –

Following is the link of the Project 

1. Iris Data Set

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

                                                    (OR)

building an AI machine/Deep learning applicationPart 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2016/06/quick-guide-build-recommendation-engine-python/

https://grouplens.org/datasets/movielens/100k/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

prolog questions

Please do the following exercises in The Art of Prolog, Second Edition and submit a ZIP file consisting of your submission files.  There should be a separate file ending in .prolog or .pl for each section.  (Keep in mind that the .pl file extension unfortunately conflicts with Perl, a language that is far more popular than Prolog; this is important when dealing with syntax highlighters and other text editor and IDE features.)  Please make sure that your solutions run in SWI-Prolog in order to receive full credit.

Section 8.2 (p. 153-154): i, ii

Section 9.2 (p. 173): i

Section 10.1 (p. 179): i, ii

Section 11.1 (p. 195): i, ii, iii

Section 11.3 (p. 202): i, ii

link to the book:  Go to https://mitpress.mit.edu/books/art-prolog-second-edition and click “Open Access” and click “Download PDF”