Linux bash shell script

 

Write a Linux bash shell script that should take an IP address as an argument from the command line and ping to that address. The script should output the result of the ping as either reachable or unreachable depending on the result of the ping. Two example outputs of the script may look like as below. Take the screen shot of the script itself and the outputs of the running script for 8.8.8.8 and 23.23.23.21 to submit.

 

————1——

$ ./yourname_script.sh 8.8.8.8

The IP address 8.8.8.8 is reachable

—————2————-

$ ./yourname_script.sh 23.23.23.21

The IP address 23.23.23.21 is not reachable

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

Legal Reg, Compliance, Invest

For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Discussion

 

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

  • Begin with an description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
  • Draw from the assigned readings (and independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

case study

 

Please read the Scotiabank case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the success factors in the Scotiabank-Kabbage partnership?2. Under what conditions is the same model applicable?When will the Scotiabank-Kabbage model not work?3. Under what circumstances should Scotiabank seek fintech partnerships?4. Identify a sector (e.g., international payments, blockchain, lending or wealth management) and a geographic market where a fintech partnership would create value for Scotiabank, and explain why.5.Based on your answer to question 4, what recommendations would you make to Scotiabank’s executives for a three-year plan, choice of partner, reason for the partnership, and suggested procedure (i.e.,what partnership model to follow)?6. What challengers is Scotiabank facing in the blockchain sector? What are the implications for the bank’s blockchain partnership strategy?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

Deployment and Maintenance: Test script Word document and test execution report

 

ASSIGNMENT DESCRIPTION

You are working as the software tester for a large travel company. Your company is planning to launch a new Web site that allows users to book their travel online. Please follow the steps below to set up the application on your computer:

  • Step 1: Click here to download the WebTours 1.0 .zip file.
  • Step 2: Go to the C: drive, and unzip the file.
  • Step 3: Click here to download the strawberry-perl-5.10.1.0 MSI file, and install it on your computer.
  • Step 4: Click on the Web Tours folder, and click StartServer file (near the bottom of the folder). Please do not close this file while the test is running.
  • Step 5: Click here and follow the steps.

You need to perform the following tasks as part of your assignment:

  • Click here to open the Tutorial Scripts.zip file.
  • Create at least 4 test specifications.
  • Each test specification section should have at least 3 test cases.
  • Each test case should contain the following:
    • Description
    • Test Steps
    • Expected Results
    • Actual Results
      • Execute each of the test cases, and update the Actual Results column
  • Create a test script execution report for your leadership team. Click here for a sample report.

Please submit your assignment.

References

Helping Testers. (n.d.). Test scenario case status.

Requirements: MAXIMUM

Core Solutions of SharePoint Server 2013 and Policy

 

Assignment Content

  1. The director of Information Technology (IT) has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for you to provide an example of a policy statement that reflects work you do in IT administration.

    Research the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective.

    Consider the following:

    • How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs
    • Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week
    • Write a 1- to 2-page example of a policy statement using Microsoft Word. Complete the following in your document:
    • A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least 2 types.
    • At least 2 cultural or global political considerations for sharing services (e.g., privacy rights)
    • Your opinion regarding any IT choices that seem to transcend culture
    • At least 1 example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance
    • A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”)
    • Cite any references to support your assignment.

      Format your assignment according to APA guidelines.