Linux bash shell script

 

Write a Linux bash shell script that should take an IP address as an argument from the command line and ping to that address. The script should output the result of the ping as either reachable or unreachable depending on the result of the ping. Two example outputs of the script may look like as below. Take the screen shot of the script itself and the outputs of the running script for 8.8.8.8 and 23.23.23.21 to submit.

 

————1——

$ ./yourname_script.sh 8.8.8.8

The IP address 8.8.8.8 is reachable

—————2————-

$ ./yourname_script.sh 23.23.23.21

The IP address 23.23.23.21 is not reachable

Cloud Computing and Digital Forensics

1.) Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least Four sources. Use the  Research Databases available from the Danforth Library  as your first choice. 

Include at least 4 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?.

If true, what then is the most useful information collected from these devices in an investigation?

 Explain in minimum 250 words 

Discussion: IT Security – Phishing

 

You arrive at work, open your email, and see this:

Employment Opportunity!!!

This Job is currently recruiting. A Job that will not affect your presents employment or studies, fun and rewarding. You get to make up to $300 weekly, I tried it and i made cool cash, If You are interest you can visit their website at http://getacoolJobreallyfast.work to apply and read more about the job.

Best Regards,
Human Resources and Benefits
Pyramid Placement Agency
5555 Fifth St.
Anytown, US 11111
HR&[email protected]

There are many things in this example that let you know this is not a real opportunity for employment, but more likely an opportunity for someone to gain access to your computer and your company’s private information. However, real-world attempts are not always this obvious and can take many forms. Social engineering, phishing, malware, spoofing, hacking, and card skimming are all risks to our personal and business information.

In your discussion post, consider the scenario presented here, or a real-world example of phishing, as you respond to the following:

  • Describe indicators you can use to identify a phishing email.
  • Explain the importance of employee knowledge concerning phishing attempts.
  • Provide several recommendations for information security practices that could be implemented to limit the risks and impact of phishing emails.

When responding to your peers, provide an additional suggestion for an information security practice they did not identify, and explain how your suggested practice would deter or reduce the impact of phishing within the company.

To complete this assignment, review the Discussion Rubric.

C++ / Python

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

security measures

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Spr1.4

 Assignment 1

According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):

· Data acquisition: Gathering the raw material

· Data examination: Identifying physical properties and meaning

· Data transformation: Enhancing your data through modification and consolidation

· Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:

· Daily full server backups with hourly incremental backups

· Redundant array of independent disks (RAID) with periodic full backups

· Replicated databases and folders on high-availability alternate servers

Answer the following question(s):

Which backup strategy would you adopt? Why?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

java Raptor

Part 1 Your finished flowchart should get an air temperature from the user for each of five days. It should then display

  • the average temperature for the five days,
  • the highest of the five,
  • and the lowest of the five.

To complete, you will need to do the following:

·         Initialize the variable in main that needs to be initialized (you don’t need to initialize the variable that will hold the user’s input). In getHigh, initialize the two variables that need to be initialized.

  •  Add a call to the subchart getHighest Test your flowchart and make sure it works.
  •  Create a subchart called getLowest, put in the proper steps and call it from main.
  • Create a subchart called getTotal, put in the proper steps and call it from main.
  • Create a subchart called getAverage and call it from main.
  • Create a subchart called displayOutput where you display the required output in a user friendly way.

See printed directions for a possible extra credit item.

Rubric on which you will be graded:

Item

Possible Points

Raptor flowchart runs without errors and produces correct output

60

Internal documentation identifies programmer and date; filename includes the programmer’s last name

5

Subcharts created where required

10

Loop used correctly

5

Selection structure used correctly

5

Output contains information required without any unnecessary information. The output contains text to explain to the user what is being displayed

Assignment Needed

 Due is 48hrs

Describe what the Internet of Things means and how this interconnectedness of smart devices will affect how we live and work. Do you foresee any positive and/or negative effects from this infrastructure based on billions of devices that will be collecting and exchanging data daily? Provide at least one example of a smart device and how it can be applied to the Internet of Things.

  • A minimum of 3 to 5 paragraphs.
  • Must include at least one source (a journal, periodical, article, etc.) from a Broward College Library database (Library Resources).
  • Must include a Work Cited page for the source material.
  • Must be submitted as a .docx (Microsoft Word) file and in APA format

Business Intelligence Week 5 Assignment

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below.  

  1. Survey and compare and possibly test some text mining tools and vendors. Start with clearforest.com and megaputer.com. Also consult with dmreview.com to further identify some text mining products to explore and even test?
  2. Survey and compare and possibly test some Web mining tools and vendors. Identify some Web mining products and service providers that could potentially be useful in a work environment you may want to be part of.
  3. Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
  4. Search online to find vendors of genetic algorithms and investigate the business applications of their products and even possibly test them where applicable. What kinds of applications are most prevalent and why?

 Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.

Describe the technologies, hardware, and software used within the information technology field using visio to create a diagram that identifies the networking equipment needed to enable the workflow between these employees.

 

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

  • Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
  • Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
  • Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

  • Describe all hardware components, including peripherals, needed to create the systems
  • Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:
    • Operating systems
    • Applications such as:
      • Office automation products
      • Security products
  • Describe security measures needed to support this system. Security measures could focus on:
    • Access
    • Administration and user passwords
    • Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.