Impacts of IT to the society
Information Security Incident RESEARCH SCENARIO
RESEARCH SCENARIO
ABC Services Ltd (‘ABC’) is a global financial services provider. To comply with local regulatory frameworks, they operate offices around the world, most of which have a legal requirement to store their Know Your Customer (‘KYC’) information in on-site servers.
One of these servers, located in Lebanon, was recently infected with a variation of malware called ransomware, which has prevented ABC from accessing their local KYC data by encrypting it with a secret key. The threat actor behind the attack left behind a file on the server that demands a ransom for the return/decryption of this data.
Once they became aware of this incident, they instructed their local IT team to bring the server offline to mitigate the risk of the malware spreading across their network. They also activated their business continuity plans to minimize disruption to their core business, which involved recreating the servers from backups taken over a month ago.
ABC approached YOU to help them answer several questions, specifically:
What type of ransomware was used?
How is the ransomware typically delivered?
What is the likely profile of the original developers of the ransomware?
What is the likely profile of a threat actor using this ransomware?
Are there any known methods of decrypting the data encrypted by the ransomware?
What is the likelihood that the ransomware has exfiltrated data?
What additional information would you require to investigate whether the threat actor has exfiltrated KYC data?
They have provided you with a sample of the ransomware and asked you to carry out a preliminary investigation. The sample they provided contains the following key information:
Info.exe (the ‘executable’) – this is the file name of the ransomware that was used to encrypt ABC’s data.
[email protected] and [email protected] – these email addresses are provided in the ransom note left as a text file on the client’s systems, as a means of contacting the threat actor.
.no_more_ransom – this file name suffix is present on files encrypted by the ransomware that affected your systems and data.
Your Task
Please research and prepare a written summary of findings to answer ABC’s questions in an MS Word report. While you will certainly have to make assumptions about the situation, we will expect you to be able to explain and answer above questions at a high level about some of the key technical concepts involved in your findings.
Examples of topics you may consider including in the report are:
RDP, asymmetric encryption, brute forcing, and phishing. Please be sure to capture the key findings from your research into the malware as well as the potential implications of this incident for ABC.
Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
Please write a 350 words essay
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.
What do I Know About Where I Live?
For this discussion, you are to use the following website: https://www.census.gov/acs/www/data/data-tables-and-tools/data-profiles/2017/ (Links to an external site.)
- On the landing page, type in the name of your state, and then the name of your city or place.
- Click on “Get Data Profile”.
- On the new page, you will see links to 4 sets of information on your area:
- Social
- Education
- Housing
- Demographic
- Choose any two variables you think might be related and find them by using the links to the related set. In the tables, locate the variables you chose to work with. For example, you could use the number of rooms (in a house) under Housing and household incomes and benefits under Economy.
- Find the values for each of your two variables for several years. For example, you might use the number of rooms and household income for the years 2012- 2017.
- Use Excel to make a scatterplot and to find the correlation coefficient. You should then have 6 points on the scatterplot, one for each year.
Share your scatterplot and correlation coefficient in your post and use them to address the following in your discussion post:
- Why did you think a relationship exists between the two variables you chose?
- Based on the Excel scatterplot and output
- State what type of relationship exists: Negative, positive, or none.
- Describe the relationship in words including what happens to one as the other changes. For example, as the number of rooms in a house increases, does the family income increase as well?
- Does the statistical information you obtained support or refute your alternative hypothesis that a relationship exists?
- How?
- If you did not find a relationship, why do you think that is?
- What is the value to knowing there is a correlation between the variables? For example, what businesses might flourish in a wealthy area?
- Would another variable better explain the relationship?
- How might the city use such information to make improvements? For example, if you found a relationship between crime and poverty would it make sense to make addressing poverty a priority?
- Can you conclude that one variable is causing the other? Why or why not?
QUANTITATIVE Journal Article Review
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)
Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References QUANTITATIVE Journal Article Review – SUBMIT HERE
Answer the following questions
- Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
- Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
- Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
- Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
- Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.
Linux Implementation Proposal: Client Response Memo
Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:
- How will security be implemented in the Linux systems—both workstations and servers?
- End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?
- The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?
- Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?
- How does software installation work on Linux? Can we use existing Windows software?
- How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?
The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.
Template
Go2Linux, Inc.
Provide a brief summary of your recommendation
of a specific version of Linux. Explain how your choice meets the business need of Faster
Computing, Inc.
each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this
assignment you will provide technical details for Information Technology personnel.
and any acronyms explained on first use (e.g., Secure Shell (SSH)).
·
How will you implement security in the Linux systems?
o
Servers to Linux. Ho
w will users authenticate? What technologies will be used? What
kind of access controls will be used?
o
multiple factors? For passwords, what policy(ies) will you recommend? needed> o needed> o applications may run on the network? · End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as email/web browsing work? How would they work with their previous Microsoft Office files? o Conduct research to determine the available options. o consider the impact to initial configuration (bookmarks, extensions, plugins) needed> o continue to open/edit/save office docs in the Linux environment. You should provide at least 2 alternatives. · The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows? o should include the location of specific Linux log files. o compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to stop processes, including the corresponding commands. · Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option? o o · How does software installation work on Linux? Can we use existing Windows software? o you automate updates? o if at all. · How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types? o do anything “different”? What underlying technology will need to be implemented? as needed> Warm regards, Go2Linux Linux Deployment Manager References to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.> Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ Encryption. [Accessed December 1, 2019]. Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed December 6, 2019]. … and so on …
Analyzing and visualization data – Research paper
Research Paper topic : Exploratory Data Analysis and Visualization for Restaurants E-Commerce Data (Using Tableau tool)
Instructions : The research paper dives into the analysis and visualization of big data sets focusing on the Restaurants E-commerce Domain. Tableau will be the choice as it stands to be one of the efficient data visualization tools as compared to others specifically in the restaurants E-commerce Domain. The paper will help answer some of the frequently asked industry questions to solve business problems. The paper will describe how Tableau will support platforms used for Big data such a NoSQL.
–> At least 1500 words
–> APA must and should
–> At least 6 references (4 of them must be scholarly peer reviewed articles)
–> All references must be current since 2015
–> Paper must be clearly explained and visualized how tableau is used to visualize the data with examples and the restaurant’s are impacted due to covid.
Simple Excel projects
Please contact me if you are good in word, powerpoint and excel. These are simple projects that has an instruction file and a pre- made file. All you have to do is follow the steps and edit the pre-made file. I have total 11 projects. I am attaching a sample file.
computing
File submission: Final project – Project-based learning
Objective of the activity Through this project the student will demonstrate the mastery of skills in the use of productivity applications MS Word 2016, MS Power Point 2016 and MS Excel 2016.
Instructions
Access the following link. final project.docxPreview the document
Deliverable The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund).
Activity value 82 points
Basic review resources Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages WD433 –WD676 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages PPT409 – PPT647 Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages EX433 – EX684 Tutorials for modules III – VIII Supplemental review resources Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b (Links to an external site.) Universia Colombia. Retrieved from https://noticias.universia.net.co/en-portada/noticia/2015/03/13/1121434/9-consejos-buena-presentacion-power-point.html