sqlmap – Database

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

* Use the five paragraph format. Each paragraph must have at least five sentences. Include an interesting meaningful title.

 * Must include 3 different articles, at least one quote from each article. Use the Research Databases available from the Danforth Library, not Google.  

* Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign (No plagiarism)

* Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

* Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

Strategic planning

  

Just as quickly as new technology is developed, hackers find new ways to disrupt operations. As a result, security is an ongoing endeavor in all organizations. Strategic planning can help organizations be prepared to address new daily threats to information security. Moreover, many of today’s organizations are adopting virtualization as a way to reduce their footprint in hardware costs and to improve their backup system capabilities at the client and server levels. At the same time, virtualization poses security risks that organizations need to consider as part of their strategic planning process.

integrate at least two quality, academic resources (in addition to your textbook) on the role of strategic planning in mitigating information security threats, including those associated with virtualization. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology. 

As you write this post, keep in mind your current organization’s or a previous organization’s strategic planning for information security, its infrastructure, and its training.

Please respond to the following in a post of at least 200 words:

  • Justify the importance of strategic planning to an organization’s information security.
  • Identify and describe the topics to be included in strategic planning for information security.
  • Specifically describe the security threats associated with virtualization.
  • Explain how strategic planning can help to mitigate the security threats associated with virtualization.
  • Provide full citations and references, formatted according to APA Writing Standards.  

Project part 1

  

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and provide an introduction to the      plan by explaining its purpose and importance. 
  2. Create an outline for the completed risk      management plan. 
  3. Define the scope and boundaries of the      plan. 
  4. Research and summarize compliance laws and      regulations that pertain to the organization. 
  5. Identify the key roles and      responsibilities of individuals and departments within the organization as      they pertain to risk management. 
  6. Develop a proposed schedule for the risk      management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

  

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

  

  

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point,      double-space
  • Citation Style: Your school’s preferred style      guide
  • Minimum 2 pages per task  

devops

Using DevOps tools such as GIT & GIT HUB, Docker, Jenkins

Need Roles and Responsibilities

Need to implement DevOps tools such as GIT & GIT HUB, Docker, Jenkins, Need Steps for the same

 Microservices Architecture, 

3 Micro applications 

One Front end User panel, Angular4 Project 

All the data is served from REST using 2 SpringBoot Applications 

One SpringBoot application for usernamangement 

One SpringBoot application for report generation 

Entire Admin Panel is made of Spring MVC 

In this project, we used REST publishing and consuming. 

Third party REST api was used to get general Aircraft data using trail number. 

  

We used 3 micro services, one for Angular user Front end, and one for another SpringMVC with springboot for admin module, third one being springboot application publishing REST Api which are used by first 2 micro services. For REST API documentation we used Swagger2, swagger-ui.html to display html documentation of the api. 

We used Hibernate as JPA implementation for Data Access layer. 

For REST API authentication we used OAuth2 , where 2 tokens are created when u pass username and password for the first time. For all other api calls u pass the authentication token.0

Software -8

 What is Risk Management? And provide at least one example of project, product, and business risks. 

Data Classification

Data Classification (100 points)

Consider the iris flower dataset, which includes information about different variations of iris flowers. (The data can be accessed at Kaggle.com.) Create a Jupyter notebook file that includes the following:

  1. An explanation about different classes that already exist in the dataset.
  2. Python code that builds different data classifiers (at least two) using the different classification algorithms, trains those classifiers using the training data, and displays their accuracy results.
  3. Python code to run those classifiers on the test data and compare their results and accuracy. Discuss the reasons for different accuracies.
  4. A summary of the results and your findings.

Important Notes:

  • Submit only one .ipynb file that includes all the code and be sure not to submit any other file format.
  • Be sure to include a clear explanation before each step you do in a markdown cell in the file.
  • Be sure to include your name, the date, your class section and the name of your program at the top of your file in the first cell of the file (markdown cell).
  • Be sure to add a table of contents at the second cell in the file (markdown cell).
  • Comment your source code and describe your code to someone who may be viewing it for the first time.
  • Your code should be executable and use meaningful variable names

Compliance Within the Workstation and LAN Domains

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

1. Briefly discuss how the concept of workstation domains figure into your organization’s security policies, please list your references

2. Briefly discuss how the concept of LAN domains figure into your organization’s security policies, please list your references