I need abstract introduction body and literature for above topic
2 Assignments (Malware Attacks and Online Interactions)
Assignment #1
Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.
Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.
Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.
Complete the following in your outline:
- Provide details of the malware.
- Identify the exploited vulnerability and its attack vector.
- Analyze the vulnerability to determine 2 risks of this malware.
- Outline step-by-step instructions on how to resolve the malware attack.
Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines.
Note: You will use content from this #1 assignment as part of the #2 Signature Assignment
Assignment #2
Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.
In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.
Include the following information in this section:
- Describe 2 threats this interaction poses on the company.
- Provide step-by-step instructions on how to mitigate each interaction.
Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines.
Combine This assignment #2 with your revised assignment #1 –
Apply: Malware Attacks sections of your Playbook
Cite at least 2 resources to support each assignment.
Format each assignment according to APA guidelines.
c++ Data structure
online quiz with time limit
CS
This assignment provides you an opportunity to practice
- writing programs using Button, FlowPane, Stage and Scene.
- writing programs using Font and Text classes, Text methods, Stage and Scene.
- writing programs using ImageView, Button, Pane, Stage and Scene classes, and how to create and register event handler.
Directions
Please solve three (3) programming problems related to the content presented in Chapters 14 and 15 in your text. You can find the programming problems in the attached file (Module 7 Programming Problems Worksheet.docx (Links to an external site.)). For Programming Problem 3, you will need the card files (card.zip (Links to an external site.)).
- Download the worksheet and save it as Mod7-Worksheet-Programming-Last-First.docx. For example, Mod7-Worksheet-Programming-Smith-John.docx.
- Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
- Create a new folder and name it as Mod7-Java-Programming-Last-First, for example, Mod7-Java-Programming-Smith-John.
- Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod7Problem#.java, for example, Mod7Problem1.java.
- Copy data file(s) used for your program and/or output file into the folder. In this module, make sure to include image files/folder in the folder.
- Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
- Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
- Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.
Submission
- Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted seperately.
- Submit the following two files as attachments by clicking the Submit Assignment button above.
- Mod7-Java-Programming-Last-First.zip (including .java files, data files, and image files/folder).
- Mod7-Worksheet-Programming-Last-First.docx.
Assignment-Application Security
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- Describe operating system hardening
- Define it
- Why is it done?
- What steps are usually done in a Windows environment?
- Describe system restoration methods and procedures
- Define it
- Why is it needed?
- What tools and approaches are recommended?
- Describe network security controls
- Define it
- Why is it needed?
- What steps, tools, and policies are used to secure networks?
- Describe incident response teams and the role of evidence
- What are incident response teams and why do they exist?
- How does evidence collection relate to incident response teams?
- Discuss evidence
- Describe why evidence is collected,
- How it should be collected
- What can happen if it is collected or handled in an inappropriate way
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
Assignment 2
Answering questions
Active Directory Recommendations , Course Subject : Application Security
Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:
1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?
2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?
3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?
4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
No plagiarism
Wireless Netwok
First Section
In a 350- to 500-word essay, address the 4 questions.
Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.
On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi.
In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.
Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:
1. A brief description of the problem with the current wireless network
2. The benefits of global/industry standards vs. proprietary standards
3. What types of problems exist with mixed standards
4. A plan to correct the problems with the current wireless network
__________________________________________________________________________________
Second section….
1. PROJECT SCOPE –
Project scope
2. FEASIBILITY STUDY –
Objectives of the Network:
1. Secure Service – What is the main objective of this network?
2. Integration and Updates –What needs to be done to get the current network up-to-date?
3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc.
4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?
5. Scalability – How will the network be able to adapt to change?
Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?
Design Assumptions – State the assumptions for unknown factors that could affect the project.
Equipment Needs and Proposed Budget
Support and Software Deployment 2.0
Please respond to the following:
- Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?
1000 words
Write in 500 words for at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.