(1200 Words) Provide >=3 examples of security exploits that have taken place in the last 3 years.

 Provide >=3 examples of security exploits that have taken place in the last 3 years.  In each example, provide the type of attack, technical detail on how the attack worked, what was known about the attacker, the impact of the attack (on both the victim/organization and on technology in general).
 

1200 Words – Exclude references!! 

***no Plagiarism, APA format***

!!!! No money Negotiations after accepting the Bid !!!!!!!

Data Mining

Answer the following questions with reference to the textbook.

Textbook: Introduction to Data Mining by Pang-Ning Tan.

1. How does data and classifying data impact data mining?

2. What is association in data mining?

3. Select a specific association rule (from the text) and thoroughly explain the key concepts.

4. Discuss cluster analysis concepts.

5. Explain what an anomaly is and how to avoid it.

6. Discuss methods to avoid false discoveries.

This assignment should consider all the course concepts in the textbook and follow APA 7 Guidelines.  Be very thorough in your responses.  There should be headings to each question above and an introduction and conclusion. The paper should be 3-4 pages long and contain at least two-peer reviewed sources.

Jan and Kim Levering have decided to

  

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details: They will have an entire floor that has the following: a receptionist area 2 offices (one for Jan and one for Kim) a conference room an office that will accommodate 15 cubes for their consultants a computer room to house their server(s) They currently have 8 Windows XP systems set up in a workgroup They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3–4-page report, you need to do the following: Diagram the network and identify the topology and components: Their existing equipment is as follows: 8 XP systems 1 each in Jan and Kim’s offices 6 systems cubes (1 per cube) 1 Windows Server 2008 (standard edition) system in the computer room 1 printer in the computer room Include the following: IP addressing scheme (use static addressing) subnetting/supernetting subnet mask for phase 1 Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following: illustrations of the server installation process a minimum of 8 Windows Server 2008 screenshots, with detailed explanations descriptions of the settings for the following: server roles naming conventions disk format (NTFS or FAT) joining security centralized versus decentralized administration a discussion of TCP/IP configuration a comparison of settings between workgroup and domain an explanation of typical installation problems/difficulties related to the following: hardware software the network The second phase, to be completed later, will be to expand their network to accommodate additional equipment. The answer should be in a 3-4 page Words Document.

Please answer the following

What is Medicare? Explain the components and financing of each part. What are the problems for Medicare? What are your solutions? 
The  paper should be 3 pages and include the following and must be free of plagiarism 
• Introduce and define the topic (your study group knows nothing about it). 
• Discuss the details of the topic. 
• What are the pros and cons (or support vs opposition)? 
• What is your personal stand on the issue? 
• After reading the briefing paper, a member of your support group should have a general understanding of the issue. 

POS attacks

Point-of-Sale (POS) Attacks

Overview

Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium retail businesses.Read the article If You Shopped at These 16 Stores in the Last Year, Your Data Might Have Been Stolen. Choose two stores from the list and use the Strayer University Library to research the specific attack or breach.

Instructions

Write a 3–5 page paper in which you:

  1. Summarize the selected attacks, providing details on the breaches’ effects.
  2. Identify the common purpose of attacks on POS systems.
  3. Assess how and why these POS systems have become a prime target for hacking groups.
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Integrate into the assignment at least three quality professional and/or academic resources, written within the past five years. 
    • Note: Wikipedia and similar websites do not qualify as quality resources.
    • One of your resources may be the provided article.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for your paper to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Assess the forensics challenges that exist for investigations.

Create the logic for a program that

Create the logic for a program that continuously prompts the user for a number of dollars until the user enters 0. Pass each entered amount to a conversion method that displays a breakdown of the passed amount into the fewest bills; in other words, the method calculates the number of 20s, 10s, 5s, and 1s needed.
 

Impact of Technology

Explain how information technology affects the strategies of the organization in a nursing home.

What other external factors could affect the use of new technologies? 

Explain how technology can impact an organization’s external environment. 

Please use examples to highlight your points.

Computer Architecture Discussion Response

 

Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.

Original Question:  Please conduct your own research on Instruction Set Architecture (ISAs). Look over how they process address memory. Compare the similarities and differences of format, instructions, type of instructions, and addressing modes. 

Peer Response:  

 

Good day, all!

Instruction Set Architecture (ISA) can be described as the interface between a computer’s hardware and software. ISA dictates what a particular computer will support in terms of the computer’s features such as various hardware, I/O devices, registers, processors, etc. For instance, both Intel and AMD can build a processor using the x86 instruction set, but the physical formation of components within the two processors may be completely different. The instruction set simply serves as the basic outline for the computer, but leaves the actual implementation up to the builder. There are several types of ISAs including Reduced Instruction Set Computer (RISC), Complex Instruction Set Computer (CISC), and Minimal Instruction Set Computer (MISC). Each of these architectures consist of different strategies for storing and processing data.

Microprocessors Without Interlocked Pipelined Stages (MIPS) is an architecture which uses the RISC instruction set. It consists of thirty-two 32-bit registers and defines instructions such as Load and Store (for moving data between registers and memory), arithmetic instructions (add, multiply, etc.) and instructions for jumping to control the flow of data. Each instruction in this architecture holds 32 bits, and comes in one of three formats: R-type, I-type, and J-type. Each one begins with a 6 bit operation code which defines what operation is to be performed. R-type instructions also consist of 5 bits for the indices of two source registers, 5 bits for a destination register, 5 bits to define the shift amount, and 6 bits for the function to be performed. I-type instructions are used for immediate values, and J-type is used for jumping operations.

As mentioned above, the x86 instruction set holds some differences compared to the MIPS architecture. It consists of six general purpose registers and two special purpose registers (the stack pointer and base pointer). All registers are 32 bits long. Four of the six general purpose registers hold the ability to divide the register into one unique 16-bit subsection and two unique 8-bit subsections. x86 utilizes data movement instructions (such as mov, push, and pop), arithmetic instructions (such as logical operations, add, subtract, etc.) and control flow instructions (such as jump and compare). x86 allows for memory regions to be declared using labels, which the assembler replaces with 32-bit quantities that specify addresses in memory.

Thanks all and have a great day!

Required to be IEEE format…please follow instructions below as indicated.

Topic: 5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning

Instructions:  It should be of professional quality and be in the format of an IEEE transaction style. Figures must be clear and drawn by you.  Proper citation of references must be embedded in the term paper. All term report should be printed in 8.5x11in format, 10 size, time new roman font, two-column, about 8 pages, left, right, top, bottom margin 1 inch, and contain the following:

  1. Title page.
  2. Abstract (summary of the paper).
  3. Introduction (problem motivation, background materials, related work, summary of objectives and methods).
  4. (i) Description of existing algorithms/protocols for survey papers; (ii) system model, assumptions, and/or formal problem formulation for research-oriented papers.
  5. (i) Comparison among existing algorithms/protocols and discussion on possible improvements/enhancements;      (ii) project results (derivation, proof, justification, or detailed design/simulation) in one or more numbered sections for research-oriented      papers.
  6. Conclusions (evaluation of results, suggestions for improvements, or future work).
  7. References must follow IEEE Transactions format (at least 10 references).Proper citation of references must be embedded in the term paper.
  8. Appendices (if appropriate).
  9. In particular, references used must be clearly cited in your written report at proper locations  

Sample document is attached….

SC_EX365_2021_CS1-3b

 SC_EX365_2021_CS1-3b_FirstLastName_1

  

· Open the file SC_EX365_2021_CS1-3b_FirstLastName_1.xlsx, available for download.

· Save the file SC_EX365_2021_CS1-3b_FirstLastName_1.xlsx as SC_EX365_2021_CS1-3b_FirstLastName_2.xlsx 

o Edit the file name by changing “1” to “2”.

o If you do not see the .xlsx file extension, do not type it. The file extension will be added for you automatically.

· With the file SC_EX365_2021_CS1-3b_FirstLastName_2.xlsx open, ensure that your first and last name is displayed in cell B6 of the Documentation worksheet. 

o If cell B6 does not display your name, delete the file and download a new copy.

PROJECT STEPS

1. Liang Bandy is a senior project manager at Forward Construction, a firm that works on construction projects for business and commercial buildings. Liang has created a workbook summarizing the Office Plaza Construction project for the Meadowood Office Center. She asks for your help in completing the workbook.
Go to the Budget worksheet. Unfreeze the panes since Liang does not need to display those rows as she scrolls the worksheet.

2. In cell K2, enter a formula using the NOW function to display today’s date. Apply the Short Date number format to display only the date in the cell.

3. Format the worksheet title as follows to use a consistent design throughout the workbook:

a. Fill cell C2 with the Teal, Accent 6, Lighter 40% shading color.

b. Change the font color to White, Background 1.

c. Merge and center the contents of cell C2 across the range C2:I2.

d. Use AutoFit to resize row 2 to its best fit.

4. Format the hourly rate data as follows to suit the design of the worksheet and make the data easier to understand:

a. Italicize the contents of cell L2 to match the formatting in cell J2.

b. Apply the Currency number format to cell M2 to clarify that it contains a dollar amount. 

5. Format the data in cell B4 as follows to display all of the text:

a. Merge the cells in the range B4:B14.

b. Rotate the text up in the merged cell so that the text reads from bottom to top.

c. Middle-align and center the text.

d. Remove the border from the merged cell.

e. Resize column B to a width of 6.00.

6. Format the data in row 4 as follows to show that it contains column headings:

a. Change “Description” to use Code Description as the complete column heading.

b. Apply the Accent 6 cell style to the range C4:I4.

c. Use AutoFit to resize column E to its best fit.

7. In column F, Liang wants to include the actual dollar amount of the work completed. Enter this information as follows:

a. In cell F5, enter a formula without using a function that multiplies the completed hours (cell E5) by the hourly rate (cell M2) to determine the dollar amount charged for blueprint drafting. Include an absolute reference to cell M2 in the formula.

b. Use the Fill Handle to fill the range F6:F14 with the formula in cell F5 to include the charges for the other work.

c. Format the range F6:F14 using the Comma Style format and no decimal places to match the formatting in column G.

8. Liang needs to show how much of the estimate remains after the completed work. Provide this information as follows:

a. In cell H5, enter a formula without using a function that subtracts the completed amount billed (cell F5) from the estimated amount (cell G5) to determine the remaining amount of the estimate for blueprint drafting.

b. Use the Fill Handle to fill the range H6:H14 with the formula in cell H5 to include the remaining amount for the other work.

c. Format the range H6:H14 using the Comma Style format and no decimal places to match the formatting in column G.

9. Liang also wants to show the remaining amount as a percentage of the completed amount. Enter this information as follows:

a. In cell I5, enter a formula that divides the remaining dollar amount (cell H5) by the estimated dollar amount (cell G5).

b. Copy the formula in cell I5 to the range I6:I15, pasting only the formula and number formatting to display the remaining amount as a percentage of the actual amount for the other work and the total.

10. Calculate the totals as follows:

a. In cell E15, enter a formula using the SUM function to total the actual hours (range E5:E14).

b. Use the Fill Handle to fill the range F15:H15 with the formula in cell E15.

c. Apply the Accounting number format with no decimal places to the range F15:H15.

11. Liang also wants to identify the work for which Forward Construction has billed more than the full estimate amount.
In the range I5:I14, use conditional formatting Highlight Cells rules to format values less than 1% (0.01) in Light Red Fill with Dark Red Text

12. Liang imported data about the project team working on the Office Plaza Construction project and stored the data on a separate worksheet, but wants to include the data in the Budget worksheet. Copy and paste the data as follows:

a. Go to the Project Team worksheet and copy the data in the range B2:G13.

b. Return to the Budget worksheet. Paste the data in cell K3, keeping the source formatting when you paste it.

13. Liang needs to list the position for each team member. Those with five or more years of experience have a Senior position. Otherwise, they have Support position. List this information as follows:

a. In cell O5 on the Budget worksheet, enter a formula that uses the IF function to test whether the number of years of experience (cell N5) is greater than or equal to 5.

b. If the team member has five or more years of experience, display “Senior” in cell O5.

c. If the team member has less than five years of experience, display “Support” in cell O5.

d. Copy the formula in cell O5 to the range O6:O14, pasting the formula only.

e. Use AutoFit to resize column O to its best fit.

14. Liang wants to include summary statistics about the project and the team members. Include this information as follows:
In cell E17, enter a formula that uses the AVERAGE function to average the number of years of experience (range N5:N14).

15. Make the Line chart in the range C19:I33 easier to interpret as follows:

a. Change the chart type to a Clustered Column chart.

b. Enter Task Progress as the chart title.

c. Add a primary vertical axis title to the chart, entering Hours as the axis title text.

d. Add data labels to the Outside End of each column.

16. Delete row 35 since Liang has adjusted the chart.

17. Go to the Schedule worksheet. Rename the Schedule worksheet tab to Work Schedule to use a more descriptive name.

18. Each type of work starts on a different date because the types depend on each other. Enter the starting dates for the remaining work as follows:

a. In cell D6, enter a formula without using a function that adds 1 day to the value in cell C6.

b. In cell E6, enter a formula without using a function that adds 2 days from the value in cell C6.

c. In cell F6, enter a formula without using a function that adds 3 days to the value in cell C6.

d. In cell G6, enter a formula without using a function that adds 3 days to the value in cell C6.
[Mac Hint: The date will display in the format m/d/yy.]

19. Copy the formulas for inspections to the rest of the schedule as follows:

a. Copy the formula in cell D6 to the range D7:D8.

b. Copy the formula in cell E6 to the range E7:E8.

c. Copy the formula in cell F6 to the range F7:F8.

d. Copy the formula in cell G6 to the range G7:G8.

20. In cell C9, enter a formula that uses the MIN function to find the earliest date in the project schedule (range C6:G8).

21. In cell C10, enter a formula that uses the MAX function to find the latest date in the project schedule (range C6:G8).