Project

 

This is the first of a series of five sequential assignments (the course project) in which you will act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design. A venture capital group has funded this innovative start-up.

The CEO has given you 60 days to deliver an information technology project plan in anticipation of the company relocating to a new facility. Since this is a start-up company, currently no building or technology infrastructure exists to support the business. All information technology (hardware and software) must be implemented in a hosted solution, an on-site solution, or a hybrid model. The CEO expects you to integrate different technologies from a variety of partners and incorporate industry best practices to develop the company’s technological systems.

Additional background on the hypothetical companyCompany InformationCurrent StatusGrowth Projections (over next two years)Facility TypeNew facility is a two-story standalone building–Number of Employees1030Revenue$5 million$30 million

This assignment consists of two parts:

Part 1: Project Plan Inception

You will write a 5–7-page document outlining the project specifics, such as company background information, company business, and an overview of the company’s information systems infrastructure.

Potential Targets Responses

Provide (3) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2 and 3 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I would imagine myself as a state-sponsored actor planning an attack on a fictional country. The target I would select would be the supervisory control and data acquisition (SCADA) systems on national resource companies. I would use weak security on the SCADA systems to infiltrate different industrial systems that control physical switches. I would mimic the attack that happened last week that attacked the Colonial Pipeline gas pipeline going up the east coast (Greenberg, 2021). The difference would be I wouldn’t have put ransomware on the system since I am a state-sponsored actor; I would try to input false information into the PLCs within the network. One example would be to input false information into a pump pushing the gas stating that the pressure of the gas coming out was less than what it should be experiencing. This would cause the pumps to work harder trying to hit the pressure they should be at. Eventually, the pumps would overheat and fail, causing the shut down of the pipelines. This type of attack could potentially cause a disruption of natural resources that the county I am a part of could then sell its own natural resources at a higher cost to gouge the country experiencing the shortage in a specific region that is being affected by the hacking. I would choose a country with relaxed guidelines on infrastructure systems hardening. The hope would be the SCADA systems would be located on an unsecured network that would be easily accessed by spoofing an internal IP address to gain access to local resources. It would be better to ensure deniability since the attack isn’t meant to physically harm anyone but to extort the nation of financial means.

-ANDREW

References:

Greenberg, A. (2021, May 8). The Colonial Pipeline Hack is a New Extreme for Ransomware. Wired. https://www.wired.com/story/colonial-pipeline-ransomware-attack/

RESPONSE 2:

This week i am going to be taking the role of a terrorist organization that is attacking a country to cause the most up roar possible. Since i a a terrorist in this situation the biggest concern for me is to cause the biggest and most server attack I can to this country. Well what is something that most people use on a daily bases and many need to live a functional life in todays world? That would be electricity and attacking the power grid can cause a extremely terrorizing event that leads to many deaths an mass panic across the targeted country. It would take a team of highly skilled hackers and lots of funding to pull off such an attack if it is even possible. Also recruiting of an insider would be the best option to insure the attack is success full. Choosing a insider someone who is in finical debt or can be black mailed would be the best to persuade to be the insider threat. The goal would be to overload and shut down multiple power stations that causes an over load on the entire power grid causing it to crash the entire country’s power shutting it off. If an entire country’s power was shut off the chaos that would follow would be detrimental to the country. There would be many deaths and panic would spread leading to rioting and looting across the country. Essential supplies would be bought up and even stolen as well as an overload for emergency services. The biggest thing that would effect this plan is the amount of security in place to protect the power grid of the country. Since this is such a vital utility it is heavily protected from this exact thing.

-JACKSON

SANS (2001) “Can Hackers Turn Your Lights Off?  The Vulnerability of the US Power Grid to Electronic Attack” from the SANS Institute website:  http://www.sans.org/reading_room/whitepapers/hackers/hackers-turn-lights-off-vulnerability-power-grid-electronic-attack_606 

RESPONSE 3

As a terrorist, I would select military information as a cyber target. To attack the military systems, I would hack into the servers containing important information communicated by the military personnel regarding the country’s security. The technology available for military personnel is very advanced and gives access only to senior security officers responsible for the country’s security. The systems are well automated to detect any potential security threats that might not be authorized to access the information (Jarvis et al., 2017). To have a positive outcome, I would devise a better plan that contains advanced measures than the one available for the military at the moment. I would also use critical servers currently available to hide any form of identity that might expose my identity before completing the task. Better technologies are available that have not been adopted in significant security software, making the military more vulnerable to terrorist threats. The high levels of corruption in major military bases would also be effective in accomplishing my task and finally making a breakthrough in hacking the systems and gaining critical information that the highest-ranking officers should also know. It would be better to ensure the deniability of my attack to avoid future consequences. This would make it hard for the responsible authorities to take any action against my deeds.

QUESTION:  I think your plan would be very successful because even if the cyber attack was not as effective as you hoped for.  The fact that it created confusion, fear, and misunderstanding among the local populace maybe enough.   Would attempt to do this again?  Or look for another target?

How would you describe the factors that determine the tone at the top?

How would you describe the factors that determine the tone at the top?

Primary/Initial post to Discussion Question: 

Your initial post/response to each module’s discussion forum question(s) should be at least 200 words. 

Secondary Responses/Posts to Peer Posts: 

Respond to at least 2 other postings with 100 words each, attached student question, Your primary posting can end with a “tagline” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. In addition, please ensure that you answer all of my questions.

ssembly program

Question 1 (From Chapter 4)
Write an Assembly program that will use a loop with indexed addressing to exchange every pair
of even number of values in an array of size 10 and array will consist ofinteger values. That is,
element i will exchange with element i+1 and element i+2 will exchange with element i+3 and so
on.
So if array has 10 22 30 43 45 34 89 67 33 66 then after exchange, array will be:

22 10 43 30 34 45 67 89 66 33

Make sure you have the following at the top of your Assembly code file. Fill it up accordingly
such as the name of the asm file will be Assignment04.asm
; Program Template (Assignment01.asm)
; Program Description:
; Author:
; Creation Date:
; Revisions:  
; Date:Modified :
Also make sure to document your Assembly code.

What to submit?
TWO files.
1. Copy your program and paste it to a text editor such as Notepad and save file as .txt file
then submit this text file.
2. A pdf file that has your code (copied or screenshot) and output of dumping of your
registers. 

Cyber-Forensics

  

Final essay: 5 pages (not including reference page), well-written, properly cited with Website link, and with plenty of critical thinking applied to this topic:

APA 7 format

– When considering forensic investigations, how do criminal and cyber investigators need to work together? What common investigative techniques are used? How can these two disciplines work together to investigate potential crime scenes?  

Need it by 3 June 2021 6:00pm.

GO16_XL_CH04_GRADER_4E_AS – Joan's Flowers 1.3

GO16_XL_CH04_GRADER_4E_AS – Joan’s Flowers 1.3

  

Project Description:

In this project, you will use a PMT function to calculate a value and then use it in a two-variable data table. You will create named ranges and use them in formulas.

     

Start Excel. Download, save, and   open the workbook named go16_xl_ch04_grader_4e_as.xlsx.   

 

In cell B5, insert the PMT   function using the data from the range B2:B4—be sure to divide the interest   rate by 12,   multiply the years by 12, and display the payment as a positive number.

 

 

Use Goal Seek to change the   amount of the loan so that the payment is $4,200 (4200). 

 

In cell A1, apply the Title cell   style. In A7, type Option #1 Reduce the Loan and then Copy the format from   cell A1 to cell A7. Copy the range A2:B5, and then Paste the Values &   Number Formatting to cell A8. In cell B2, type 425000 to restore the original loan amount.

 

Use Goal Seek to change the   period of the loan so that the payment is $4,200.

 

In A13, type Option #2   Increase Years.   Format the cell the same as cell A7. Copy the range A2:B5, and then Paste the   Values & Number Formatting to cell A14. Display the value in B15 with two   decimal places, and then in cell B3, type 10 to restore the original value.

 

On the Payment Table worksheet,   in the range A2:B4, enter the following row titles and data. Format the   Amount of Loan as Currency with 0 decimals. Format the Interest as Percentage   with 2 decimals.
Amount   of Loan $425,000
Period   (months) 120
Interest   rate (per year) 5.25%

 

 

In cell C8, type 60—the number of months in a   5-year loan. In D8, type 120—the number of months in a 10-year loan. Fill the series through   cell H8. Apply Bold and center the range C8:H8.

 

In the range B9:B16, enter   varying interest rates in decrements of .5% beginning with 7.0% and ending with 3.5%. If necessary format all the   interest rates with two decimal places, and then bold and center the range.

 

In cell B8, enter a PMT function   using the information in cells B2:B4. Be sure that you convert the interest   rate to a monthly rate and that the result displays as a positive number.

 

Create a Data Table in the range   B8:H16 using the information in cells B2:B4 in which the Row input cell is   the Period and the Column input cell is the Interest rate.

 

Copy the format from cell B8 to   the results in the data table. Format cell D16 with the Note cell style as   the payment option that is closest to $4,200 per month.

 

Display the Advertising Costs by   Quarter worksheet, and then apply appropriate Currency [0] cell style to the   range B6:E6 and to the range B18:E18. Apply the Comma [0] cell style to the   range B7:E17, and then apply the Total cell style to the range B18:E18.

 

Name the following ranges: B6:E9   Newspaper_Costs; B10:E14 Digital_Costs; B15:E16 Magazine_Costs; B17:E17 Billboard_Costs.

 

 

Insert a new row 15. In cell   A15, type Designer Podcasts In cell B15, type 1250 In cell C15, type 1525 In cell D15, type 1266 In cell E15, type 1604.

 

Display the Name Manager, click   Digital_Costs, and then change cell E14 to E15. Select the Billboard_Costs, and Edit the name to Signage_Costs

 

Display the Annual Advertising   Costs sheet. Starting in cell B5, use the named ranges to sum the values for   each of the costs and then sum all the costs in cell B9. Apply Currency [0],   Comma [0], and Total cell styles to the appropriate cells.

 

In the sheet tab row,   right-click any sheet tab, and the click Select All Sheets. Display the Page   Setup dialog box, click the Margins tab, and then under Center on page, click   Horizontally. Ungroup the sheets, display the Hothouse Purchase sheet, and   then set its Orientation to Landscape. Document properties should include the   tags payment   table, advertising   costs.

 

 

Ensure that the worksheets are   correctly named and placed in the following order in the workbook: Hothouse   Purchase, Payment Table, Advertising Costs by Quarter, Annual Advertising   Costs. Save the workbook. Close the workbook and then exit Excel. Submit the   workbook as directed.

Course name: InfoTech Import in a Strat Plan

Course Reflection:

During this session, we looked at several topics on Strategic IT planning and strategy

We examined researchers, models, and issues in the area, and as you get closer to starting your own dissertation, you will need to choose a topic in your first dissertation class DSRT-736, so it is essential to start preparing. 

This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics.

Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.

Visit the University of Cumberland’s library, go to the Dissertation Database, and locate an interesting topic on IT atrategy, or examine a model presented this term.

Here are some pointers that will help critically evaluate some viable topics.
• Is the topic attainable for a first-time dissertation student?
• Is the problem rooted in the literature?
• Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
• Is there a theoretical model or framework discussed?
Discuss the topic, the problem the model has been used in the research, and any present findings.

Do not read the entire dissertation, as the abstract and chapter one introduction should give a clear understanding of the research.

Discussion

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 250 words): 

 Business Ethics: Discuss the risks of avoiding confrontation of a problem employee. 

– Minimum two references. 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

Touchstone 4

 

Touchstone 4: Python Journal Project

ASSIGNMENT: For this project, you will learn how to effectively plan, design, develop, and test an original program of your choosing. This program is your choice and it can be as complex as you wish. The goal is to start with an idea for your program and then step through the process of most phases of the development lifecycle to turn your idea into an actual program. This includes planning out the algorithm using pseudocode, coding your program using everything you learned from Units 1-3, and finally testing and debugging your program to make sure it fulfills your intended purpose. Being able to create your own program can be beneficial in any career field. Anything that can be programmed or automated in any industry could make your work a lot easier. Even as a hobby, it can give you a reference point to have a better understanding of how to deal with common issues. Using basic Python to automate menial tasks can save you time and money! Whether you were in this class to learn programming at a professional level or if it’s just for fun, you will benefit from learning coding as a foundation of your technical skills.

For this Touchstone, you will fill out a journal (template link below) which has five sections that correspond to the five steps you will complete for your final project. Use this template to write your journal responses for each section of the project. When you have finished, you will submit this journal as a Word .doc/docx.