Case Study Analysis

 Read through this description of an actual case and conduct a full analysis of the case study with the attached document.

  • A defense contractor would be expected to take security very seriously, and this company, we will call it Department of Optional Defense (DooD), was diligent about security in every way. The physical location had round-the-clock guards and they had state of the art network security. Their customers require very stringent security measures, including rotating their physical security guards every 6 months. DooD contracted with a third-party company to provide the regularly changing security guards and had requirements for background checks for all assigned security guards. 
  • One of the contracted guards had been on the job for about 2 months when he started bringing his personal laptop to the job. He would hook it up to the company network and tell people that he was studying for his accounting degree at an online school. If someone walked by, they would see spreadsheets and numbers on his laptop and think he was just doing his homework.
  • The guard was well-liked and no one noticed that he was actually hacking into the CFO’s network traffic and he ended up gaining access to online banking IDs, PINs, and transaction information that the CFO had exchanged with the staff. Exploiting weaknesses in the IT infrastructure for the company, the guard was able to initiate bank transfers using the stolen data to multiple accounts. Each payment was fairly high, but not quite high enough to arouse suspicion. The guard was able to maintain his covert theft until his 6-month rotation was over and he was transferred to another company.
  • It was only after the guard had left DooD was it discovered that there had been multiple payments to outside accounts to the tune of a few million dollars. An external auditing company requested more information about these transfers from the CFO, and there was no further information. It took a full investigation well over a year to finally track the guilty guard and bring charges against him. 
  • The investigation found that there were multiple IT-related mistakes. First, IT policies did not require strong pass-phrases from all employees for all transactions. Second, the guard was allowed to connect a personal computer to the network. Access policies should have detected the intrusion and blocked access immediately. Third, there was no system administrative command oversight that would have been able to detect internal hacking. Multiple types of evidence were gathered and analyzed in order to determine the guilty party and the multiple security breaches. 

5s week 9 assignment BS

IN 300 Words,

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Do not copy the work. 

Include references, do not copy paste strictly.

Machine Learning Problem Identification

  

This task is based on your real-world understanding and ability to identify whether a problem can be solved by Machine Learning or not. Identify and fill problems that you feel can be solved with Machine Learning and also mention the difficulty level of solving using Machine Learning, if it can be solved.

PHP,HTML,CSS,SQL

 Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages or however you want to handle it that will allow you to do various queries of your database. You should be able to retrieve and insert data. For extra credit, include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project.
Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database.
The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.
If you have not yet created a home page, create a home page that contains links to each of the web pages you create to access your database. On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database. Some appropriate picture or image should be on the home page that relates to you project. Make your project look as professional as possible. You may want to show it during a interview. 

OE Project

Determine whether there should be Information Technology / Information Security replacement/outsourcing (Use the dimensions of organizational transformation)

Information System (IS) Definition, importance and conclusion ( for Netflix )

Organization here is Netflix

CSCI 457 Assignment 2 – Hexadecimal Calculator

Implement a hexadecimal calculator for iOS.

Requirements:
  • The calculator should support 4 basic arithmetic
    operations: + – * and /
  • The calculator will operate on hexadecimal numbers, not
        decimal numbers 
  • The calculator only needs to operate on unsigned integers
    (i.e. UInt). You do not need to consider negative numbers
    or fractions.
  • The calculator should support the 16-digit hexadecimal
    numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF.
  • The calculator should handle overflow and underflow gracefully. The app must not crash.
  • The calculator should handle division-by-zero error gracefully. The app must not crash.
  • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay.
    Hint:
  • To convert a string to a hex number, use “radix: 16” as an
    argument. For example:
    var s:String?
    s = “1A”
    var intHex:UInt = 0
    intHex = UInt(s!, radix: 16)! print(intHex) // shows 26
    intHex = 90
    s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A
  • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit.
  • Strings may be concatenated by using + operator. E.g. var s1 = “1234”

var s2 = “5”
print(s1 + s2) // shows 12345
You may want to do string concatenation in the action of each digit button.

  • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label.
  • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *.
  • To support different devices and orientations, use stack view, scroll view, or both.
  • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc.
    The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%.
    When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.
    The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing looking, it should be fine.

2 assignments with answers

Hi 

I have two assignments with common answers with students 

and all answers are correct 

So, just I need to change the method of answers 

and add some sentences in the answers 

to become zero (plagiarism)