Its a 209 multiple choice question and 3 free text question.
Application Security – Windows Hardening Recommendations
Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
To protect servers from attack, each server should authenticate connections based on the source computer and user.
Assignment
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
Cyber Weapons
Week 9 Forum – Cyber Weapons
For your initial post, discuss all three topics below.
Zero-Day exploits and Cyber Weapons
- Analyze the significance of the STUXNET malicious code events in Iran, and the significance of the Dragonfly malicious code currently found in the US and Europe (Do not dwell on describing the effects, instead describe the significance).
- Analyze the effects of the global market for sale of ZDEs. Can the proliferation of ZDEs and cyberweapons be controlled or managed by a treaty similar to the Nuclear Non-proliferation Treaty? Is it possible to keep a count of cyber weapons the same way we can monitor nations to count their nuclear weapons? Explain your answer.
- Describe the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy. Compare those characteristics and effects on computers to the traditional effects that are commonly associated with a malicious code cyberattack. Look up the costs for various commercial EMP devices found for sale on the Internet.
- Wk 9 – Loving the Cyber Bomb.pdf
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy (source) - Wk 9 – Understanding Technologies of Terror.pdf
Understanding Technologies of Terror (source) - Wk 9 – Clash of Interpretations.pdf
Clash of Interpretations: Cyberattacks as Weapons of Mass Destruction (source) - Wk 9 – Making Good Cybersecurity Law and Policy.pdf
Making Good Cybersecurity Law and Policy: How Can We Get Tasty Sausage? (source)
Analysing and visualization
Question: 2-3 pages
Take the assignment from the previous week (week 4), add at least twice as much data to the sets. Note how this impacted the results from the previous week. Be sure to have a visualization to show the initial results and the new results. Be sure to explain why the results are different or similar from last week.
Week4 assignment: Review The Power of Good Design and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem. Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. Ensure there is data visualization in the homework and note how it relates to the three principles selected.
Question: 3 pages
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
PROG12974
Requirements
PROG12974 Assignment 4
Sheridan Institute of Technology & Advanced Learning
Faculty of Applied Science and Technology
School of Applied Computing
PROG 12974 – Introduction to Programming (C)
Assignment 4 – Book Manager
In this assignment, you will write a simple Book Manager using C structures and C file processing. The program can do the followings:
REQ-0. Show a Main menu and read a digit from the keyboard. If the digit is not 0-6, then show an
Error message; If the digit is “0”, then Exit the program. Example I/O:
====== MAIN ======
0 – Exit Program
1 – List all Books
2 – List Books in Categories
3 – Add a New Book
4 – Update a Book
5 – Delete a Book
6 – Search a Book by ID
==================
Enter your choice: 7
== Incorrect choice!
… …
Enter your choice: 0
== Thank You, Bye-Bye!
REQ-1. If the digit is “1”, show a list of all the books you have, including the book ID, Category, Title, Author, and a short Note. Example I/O:
… …
Enter your choice: 1
——————————————
ID: 1
Category: Novels
Title: Catch-22
Author: Joseph Heller
Note: Not read yet
——————————————
ID: 2
Category: Novels
Title: The Stranger
Author: Albert Camus
Note: Great book!
1
——————————————
ID: 3
Category: Novels
Title: Great Expectations
Author: Charles
Note: Half way to go
——————————————
ID: 4
Category: Languages
Title: ENG4U Notes
Author: Myself
Note: Just for memory
——————————————
REQ-2. If the digit is “2”, then read a Category number and show the list of books in that category.
Example I/O for listing all books in category “Languages”:
… …
Enter your choice: 2
——————————————
List Books by Categories
1 – Arts
2 – Languages
3 – Computers
4 – Novels
5 – Others
——————————————
Enter category to list ( 1 – 5 ): 2
——————————————
ID: 4
Category: Languages
Title: ENG4U Notes
Author: Myself
Note: Just for memory
——————————————
REQ-3. If the digit is “3”, show prompt and read book information from the keyboard. The new book is added to the collection. Example I/O for adding new book #5:
… …
Enter your choice: 3
== Enter new book ID ( 1 – 100 ): 1
== Book #1 already exists.
… …
Enter your choice: 3
== Enter new book ID ( 1 – 100 ): 5
——————————————
Enter Category Number [1-Arts; 2-Languages; 3-Computers;4-Novels; 5-Others]: 3
Enter Book Title: C Programming
Enter Author Name: Internet
Enter Note: Online Resources and Links
——————————————
REQ-4. If the digit is “4”, read a book ID, show prompt and read new information to update the existing record. Example I/O for updating book #3:
… …
Enter your choice: 4
== Enter book ID to update ( 1 – 100 ): 6
== Book I#6 does not exist.
… …
Enter your choice: 4
== Enter book ID to update ( 1 – 100 ): 3
——————————————
ID: 3
Category: Novels
Title: Great Expectations
Author: Charles
Note: Half way to go
——————————————
——————————————
Enter Category Number [1-Arts; 2-Languages; 3-Computers;4-Novels; 5-Others]: 4
Enter Book Title: Great Expectations
Enter Author Name: Charles Dickens
Enter Note: Finished 17/11/11
——————————————
REQ-5. If the digit is “5”, read a book ID, show prompt to confirm deleting the book, and delete the book when confirmed. Example I/O for deleting book #1:
… …
Enter your choice: 5
== Enter book ID to delete ( 1 – 100 ): 10
== Book #10 does not exist.
… …
Enter your choice: 5
== Enter book ID to delete ( 1 – 100 ): 1
——————————————
ID: 1
Category: Novels
Title: Catch-22
Author: Joseph Heller
Note: Not read yet
——————————————
Are you sure (Y/N): y
== Book deleted.
REQ-6. If the digit is “6”, read a book ID and show the information of the book. Example I/O:
… …
Enter your choice: 6
== Enter book ID to search ( 1 – 100 ): 10
== Book ID #10 has no information.
… …
Enter your choice: 6
== Enter book ID to search ( 1 – 100 ): 4
3
Tips
——————————————
ID: 4
Category: Languages
Title: ENG4U Notes
Author: Myself
Note: Just for memory
——————————————
1. Read carefully code examples in Chapter 11, especially those for random-access file processing (11.10, 11.11, 11.14, and in particular 11.15). Make sure you fully understand all the examples
before starting.
2. Define 6 functions for the 6 requirements REQ#1 to REQ#6.
3. Your program should be able to test if there is already an existing file containing some book
information. If there is, use it but do not overwrite it; otherwise, create a new file.
4. Consider using the test data file “assignment4_test_data.txt” to test your program. In Windows you can use the following command lines.
D:PROG12974Assignment>assignment4_sun < assignment4_test_data.txt
D:PROG12974Assignment>assignment4_sun < assignment4_test_data.txt > output.txt
From a Linux terminal you can do it like this:
username$> cat assignment4_test_data.txt | ./assignment4.out > output.txt
5. Do NOT use goto statement or recursive functions. Global arrays and structure definition are
acceptable.
Grading
Your submission will be evaluated based on the following criteria:
Submission 1 Submission is in correct format (see instructions below).
Compilation 1 Program compiles without errors (warnings are acceptable).
Documentation 2 Code is well-commented and clearly explained.
Readability 2 Code is clean, well-organized, and easy to follow.
Efficiency 4 Code uses the best approach and is efficient.
Specifications 30 Program works correctly and meets the requirements.
REQ-0 2
REQ-1 2
REQ-2 4
REQ-3 6
REQ-4 6
REQ-5 6
REQ-6 4
Total Marks 40
*. Penalties may apply to cases when code doesn’t compile, wrong submission or naming, program
crashes while being tested, late submission, submission instructions not followed, use of goto, etc.
Submission
Submit your source code as “assignment4_lastname.c” to the SLATE Assignment 4 submission folder.
If you have your own header file (the .h file), remember to submit the header file as well.
Important Notes
This is an individual work and is subject to the school Policy on Academic Honesty. The policy is available at: https://policy.sheridanc.on.ca/.
Submission implies permission of the Faculty to check the submission electronically for plagiarism using
software similarity detecting systems.
All assignments are subject to a late penalty of 10% per day (including weekends).
Late assignments will only be accepted up to 3 days after the due date (including weekends).
SIEMENS SIMATIC
I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA)
A peer-reviewed scholarly journal article discussing electronic innovation and the government
InfoTech in a Global Economy (ITS 832)
Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 3 pages overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use Google Scholar to find these types of articles ( https://scholar.google.com/ ) Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:
- Be approximately three to four pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
High level architecture and project plan for Migrating Application to Azure | Azure | Enterprise Architecture | Agile Project Management | Cloud Computing | Cloud Sales
The on-premise application has the following characteristics:
• 10 million active users and growing
• Running on a mix of RHEL 6.x and Ubuntu 14.x based systems, with little to no patch management
• Basic three-tier LAMP stack, with network-attached storage for images
• Highly available with 99.95% SLA
• Currently supports a regional user base, but is looking to expand globally as part of the migration
• Contract with on-prem facility ending in 6 months
You need to do the following
• High level target architecture on Azure
• Project Plan: How will your migration strategy, team structure, and technical recommendations guarantee success.
• Q&A: Expect follow up questions on related technical components, migration strategies, team structure, and timelines
IT345 Week 9 B
Discussion 9B
Summarize what you have learned over the last 9 weeks. Has it changed your opinion about technology? Do you believe technology will continue to evolve? What businesses should concerned about being “phased” out due to new technology?
Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.
Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see other posts until you make your first post.
Malware Attack
Playbooks, sometimes known as Standard Operating Procedures (SOPs) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.
During weeks 2, 3, and 5, you will develop individual playbooks for a fictional company that hired you to write their playbooks and manage the team. The first playbook is a response to malware found at the company. Each week is a separate playbook and needs to have a cover page and references.
Outline a 2- to 3-page playbook in Microsoft Word or Word Compatible to address a category of malware attacks of your choice.
Complete the following in your playbook:
- Provide details of the malware category.
- Identify the expected vulnerability and attack vector.
- Analyze the vulnerability to determine 2 risks of this malware.
- Outline step-by-step instructions on how to resolve the malware attack.
Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
Review Rubric to assure all requirements are met.