Discussion

 After reading chapter 6, analyze the structure of advanced encryption standards and why it makes it so strong.

Linux Implementation Proposal: Training Guide

 

Linux Implementation Proposal: Training Guide

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder. 

Cross-Site Scripting

  • Cross-Site Scripting attack
  • XSS worm and self-propagation
  • Session cookies
  • HTTP GET and POST requests
  • JavaScript and Ajax

Note: Since May 5 2019, the Firefox Add-on “HTTP Header Live” has been disabled by Firefox. Mozilla verifies and signs add-ons that follow a set of security guidelines. The version of HTTP Header Live (v 0.6 – Last Updated April 9, 2018) installed on the VM does not comply with this security guideline, so it was automatically disabled. The issue can be easily resolved by installing the latest version of HTTP Header Live.

Video to help:

https://www.youtube.com/watch?v=sFSq6dsDGzA&feature=youtu.be

Example Budget Layout

Week 4 Project

 

Creating a Budget

In this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.

Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.

Week 4 Project Tips

Please Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.

Scenario

Tom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.

Part I – The Spreadsheet

First, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget.

Example Budget Layout

Part II – The Chart

Once you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Example Line Chart

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project.

Case Study

 Public Sector Case Study In November 2012, South Carolina state officials disclosed a massive data breach at the Department of Revenue. Few details on the breach were disclosed. But it involved exposing more than 3.6 million taxpayers’ personal information records and 650,000 business tax–related records. The breach occurred in September 2012. It’s clear that massive amounts of personal information were stolen. A former top official with the FBI estimated the cost to the state at more than $350 million, based upon past FBI experience, including the cost of offering free credit monitoring to affected individual taxpayers and businesses. 

The root cause of the breach cited in news reports was the lack of mandatory security policies across 100 state agencies, boards, commissions, and colleges and universities. 

All state agencies have some type of computer security system in place. It’s fair to assume they all have some level of security policy in place. But it is clear these policies were discretionary. That meant an approach to information security across state government that was at best inconsistent. Nor did the state appear to have a comprehensive approach to sharing best practices for information security or for coordinating response to these types of data breaches. 

In the case of the South Carolina Department of Revenue, the policies clearly were neither adequate nor consistent. Additionally, reports indicate the source of the hack was in Eastern Europe. The hacker or hackers gained access through a phishing e-mail. Phishing e-mails try to trick a user to open an e-mail and execute a link or program with malware. Security awareness is a strong control that educates users on how to protect themselves from such attacks, including how to recognize such attacks and why not to open suspect links. If a phishing e-mail was a source of the attack, it might be an indication that the security awareness program at this state agency was inadequate  

write a paper not more than 300-400 words on the following

  1. Do you think that the attack could have been prevented? If so, how? Alternatively, if you disagree that the attack couldn’t have been prevented, provide your analysis as well.
  2. What is your takeaway from the attack? And how does it prepared you to prevent future attacks in your organization?
  3. All papers must adhere to APA format. Please, don’t forget to use double spacing, and create in-text citations before making any references.

Bash Scripting – Three easy tasks

Please find the attachments for three tasks listed. Use bash scripting template attached (.sh file) to complete the three tasks. Please add comments wherever appropriate. 

Ask if you have questions, and need anything. 

Thank you!

Discussion about CIA

Write at least 500 words analyzing a subject you find in this article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf 
related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Week 12 assignment

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.