Python GUI, Tkinter

This is task to create a maze runner game using Tkinter. As I will be running it in auto grader I want the code’s to be as it is said in the a3.pdf following every guideline with Inline comments that all significant blocks of code should have a comment to explain how the logic works, and informative docstrings that every class, method and function should have a docstring that summarises its purpose.

Threats and Mitigation

 

we will continue building on what we have  done in Parts 1 and 2. 

  1. Write a 1-2-page paper that identifies five (5) potential threats and potential solutions to best mitigate loss.
  2. Remember to use proper APA formatting, including citations and references for all resources used.

wk 10

Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost-efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.

project management week 8

 

From Part 11: Project Risk Management of Project Management: Case Studies read the Space Shuttle Challenger Disaster case study. Answer questions 3 and 4 under Risk Management Plan; 6 and 7 under Risk Identification; 5 and 6 under Risk Quantification; 3 and 4 under Risk Response (Risk Handling); and 4 and 5 under Risk Control. 

All written work must be submitted in the student’s own words with sources properly attributed in APA format. For your convenience, the correct in-text citation for your textbook is  (Kerzner, 2013). The correct in-text citation for your Case Studies book is (Kerzner, Project Management: Case Studies, 2013).

The correct full text references for each book appear below:

Kerzner, H. (2013). Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th ed. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118418550/

Kerzner, H. (2013). Project Management: Case Studies. Retrieved from VitalSource Bookshelf: https://online.vitalsource.com/#/books/9781118415825/

6 Pages report as per the instructions No Plagiarism in the report

Incident Response Report #2

This assignment is similar to the last incident response report. You will take the framework you

developed for your report, with corrections that I suggested as feedback, then develop a new

report for this incident. The grading rubrics will be the same, but the grading will be stricter

being this is your 2nd time developing an incident response report.

The incident scenario this time is that an employee was installing a new computer. They were

in the process of installing software when they noticed abnormal mouse activity on the

computer. At that point, they walked away from the computer and called you for help. Treat

this like an incident at a corporation, although the computer is not joined to a domain.

I am expecting that at a minimum you are able to tell the story of what happened during the

incident. What was the initial infection vector, what happened next? Are there any persistence

mechanisms in play? Are there any IP addresses associated with the attacker? And if so, what

are they?

Instead of a 22 page document with evidence, you will be working with evidence that has been

extracted from the computer in its raw form just like an incident responder would see if they

were working on the workstation. The evidence totals about 7 gigs with the memory image.

Some of the evidence collected may overlap evidence that was collected in another method.

Some of the included evidence is from:

• Netstat

• Complete directory / file structure listing for the entire C drive

• Services

• Several Kape collections – These will provide a rich set of evidence but take a little bit to

get used to the way Kape provides the collected evidence

• Browser information

• Prefetch

• Scheduled Tasks

• Users

• Windows Event Logs

• Forensic RAM image

The evidence can be downloaded from a Google Drive link I’ll post on D2L.

Not every piece of evidence collected will yield results. It is your job to comb through the

evidence to put together the pieces of what happened to develop your report. You can

successfully respond to the incident without doing the memory forensics, but it may provide

some easier insights if you want to give it a shot. The memory image is around 5.4 gigs in size.

I split the evidence into different folders to make it easier to download and work with if you don’t

have the full 7 gigs of free space on your drive.

Start by forming your investigative questions, then going searching for evidence that proves

your questions. Your IOCs this time will be generated based on actual evidence you find that

can be used to search other computers to determine if they are in scope of the incident as well.

I will be providing the VM as an optional way to investigate the incident. The VM is provided as

is without any additional support from me. It is a VMWare image. Some of the evidence will still

be in the VM, but it will be provided post attack after that attacker is already gone.

To produce your report, analyze the evidence, then summarize and present it using the

guidelines from the chapter 16 lecture, chapter 16 from the textbook, and guidance from the

“ICS-487 incident report what to include” in the sticky section of D2L.

The report should be at least 5 not counting any pictures utilized and the mandatory coverpage.

There will be a point penalty if the report is less than 5 pages. Do not turn in a 50-page report

for this assignment. The objective is to be concise as you tell the who what when where and

how story.

As previously stated, the raw evidence for this report has already been collected for you. You

will need to comb through it to find useful artifacts to fill in the pieces for the report. This

means making up a company that was hacked, the name of your company that is responding,

etc. Basic remediation steps will also need to be described as partof this assignment. For the

lessons learned section, describe in a paragraph or two items that you learned about incident

response that you will apply to future investigations based on theevidence that was

provided to you this time.

You should list 5 Indicators of Compromise that you gleaned from the evidence that are worth

searching for enterprise wide to make sure no other systems are infected. These will be best

displayed in a table for the IOC section. These IOCs will be developed when you find

artifacts related to the investigation. A timeline should also be put into the report like last

time.

You will also need to develop 10 investigative questions that you would ask during the course of

this investigation.

Keep in mind that for this project this evidence is manually collected from a single computer.

This is a normal amount of evidence one would collect in the course of Incident Response. This

is why we are teaching the method of developing investigative leads, turning those leads into

IOCs, then searching for those IOCs. This type of manual collection does not scale across more

than one or two systems in an incident. The next Incident Response report will involve you

collecting the evidence, and then reporting on that evidence you collect.

Make sure you start this assignment early. This is a 400-level class and will require some critical

thought to complete this assignment along with utilizing the skills that have been taught up to

this point. A quality report will take time to produce especially when it comes to selecting

which pieces of evidence to use that will tell the story but not provide unnecessary detail.

Also keep in mind the responses I provided to your previous report.

A common mistake is making the executive summary and findings section too

technical. This should be written in language that an 80 year old grandma who doesn’t

have an IT background can understand.

Because this is an academic environment, anytime you use someone else’s ideas you must cite

it in IEEE format. It is assumed that most of your content will be coming from the provided

evidence document. You don’t have to cite general information you take from that document.

Make sure that you are re-telling the story. It is ok to use a sentence or two once in a while.

Do not just copy an entire paragraph from the evidence document and turn that in as your

work.

Grading Rubric

Requirement Possible

Score

Coversheet meets specifications including affected organization, incident number

or name, date published, name of the organization that performed the

investigation, and “Privileged and Confidential”

2

Table of contents 2

Report is at least 5 pages long not including cover sheet and any pictures used as

part of the report 3

Good grammar, style, and use of IEEE citations if applicable 10

Formatted according to specifications and style suggestions in Chapter 16 and

reporting lecture 10

10 quality investigative questions based on evidence provided 10

5 Indicators of Compromise based on evidence provided 5

1 – 2 paragraphs of lessons learned describing items that you learned from this

investigation that you will apply to future investigations 7

Remediation describes exact steps taken to expel malicious actors from the

network 5

Who what where when why is told to the best of the author’s ability with the

evidence provided throughout the documents without making the reader piece

any parts of the puzzle together

8

Executive summary containing how the incident was discovered, the type of

incident this is what the response was, the goal of the investigation, duration of

the work, start and stop date, and who sponsored the work

10

Findings section addresses the goals of the investigation by summarizing the

information found in the investigative questions, systems involved, IOC, evidence

collected and remediation sections in a manner that is written with nontechnical

executives in mind. No more than a page long.

5

Systems involved are described and information that is known based on the

limited evidence provided is recorded.

3

Evidence collected section contains detailed account of the evidence that was

utilized for the report, how it was collected, what facts it is providing to back up

the rest of the report. Any procedures have to be documented in such a way that

a third party could replicate the results of the analysis. You may have to do a little

googling here to come up with any missing parts of the analysis and collection.

15

Recommendations section describes fixing the holes that caused this incident and

any larger suggestions for the company as a whole to improve their overall

security posture

5

This report has a total of 25 grading points available. Each individual item will be scored as a

percentage adding to a total of 100% for the assignment. Your total percentage will be what

percent of the 25 points you get on the assignment. For example, I produce a report that

scores a total of 85 of the 100 available percentage points. 85% of 25 is 21.25 so I will get 21.25

points on the assignment.

Solved Exp19_Excel_Ch07_Cap_Real_Estate | Excel Chapter 7 Real Estate

 

Solved Exp19_Excel_Ch07_Cap_Real_Estate | Excel Chapter 7 Real Estate

 

Project Description:

You are the office manager for a real estate company in northern Utah County. You tracked real estate listings, including city, agent, listing price, sold price, etc. Agents can represent a seller, a buyer, or both (known as dual agents). Your assistant prepared the spreadsheet structure with agent names, agent types, the listing and sold prices, and the listing and sold dates. You want to complete the spreadsheet by calculating the number of days each house was on the market before being sold, agent commissions, and bonuses. In addition, you will use conditional functions to calculate summary statistics. For further analysis, you will insert a map chart to indicate the average house selling price by city. Finally, you will create a partial loan amortization table and calculate cumulative interest and principal to show a potential buyer to help the buyer make decisions.

The   spreadsheet contains codes (BA, DA, SA) to represent agent roles (Buyer’s   Agent, Dual Agent,   Seller’s Agent). You want to switch the codes for the actual descriptions.
  In cell E12 of the Details sheet, insert the SWITCH function to evaluate the   agent code in cell D12. Include mixed cell references to the codes and roles   in the range J2:K4 for the values
  and results arguments. use all cell references in the function. Copy the   function to the range E13:E39.

Now you want to calculate the   number of days between the list date and sale date.
 

  In cell J12, insert the DAYS function to calculate the number of days between   the Listing Date and the Sale Date. Copy the function to the range J13:J39.

You want to calculate agent   commissions based on their role.
 

  In cell K12, insert the IFS function to calculate the agent’s commission   based on the agent code and the applicable rates in the range L2:L4. Use   relative and mixed references correctly. Copy the function to the range   K13:K39.

You want to calculate a bonus if   the sold price was at least equal to the listing price, and if the house sold   within 30 days after being listed.
 

  In cell L12, insert an IF function with a nested AND function to calculate a   bonus. The AND function should ensure both conditions are met: Sold Price   divided by the Listing Price is greater than or equal to 100% (cell L7) and   the Days on Market are less than or equal to 30 (cell L8). If both conditions   are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed   cell references to the input values in the range L7:L9. Copy the function to   the range L12:L39.

The top-left section of the   spreadsheet is designed for summary statistics for one condition. You will   calculate average selling prices and the number of houses sold in each city   (the condition).
 

  In cell B2, insert the AVERAGEIF function to calculate the average Sold Price   for houses in the city of Alpine. Use mixed references for the range; use a   relative reference to cell A2. Copy the function and use the Paste Formulas   option to paste the function in the range B3:B5 so that the bottom border in   cell B5 is preserved.

You want to count the number of   houses in one city.
 

  In cell C2, insert the COUNTIF function to count the number of houses in the   city of Alpine. Use mixed references for the range; and use a relative   reference to cell A2. Copy the function and use the Paste Formulas option to   paste the function in the range C3:C5 so that the border in cell C5 is   preserved.

You want to calculate the total commissions   for each agent (the condition).
 

  In cell B7, insert the SUMIF function to total the commissions by agent. Use   mixed references for the ranges; and use a relative reference to cell A7.   Copy the function and use the Paste Formulas option to paste the function in   the range B8:B9 so that the borders are preserved.

The top-middle section of the   spreadsheet is designed for summary statistics for multiple conditions. You   will calculate the number of houses sold for each agent when he or she served   as a Dual Agent (DA). Use mixed references for ranges and the agent code   condition in cell J3. Use relative cell references to the agent condition in   cell E2. When you copy the formulas, use the paste Formulas options to   preserve border formatting.
 

  In cell F2, insert the COUNTIFS function in cell F2 to count the number of   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Use all cell references in the function. Copy the function to the   range F3:F4 and preserve the bottom border for cell F4.

You are ready to calculate the   total value of those houses for each agent when he or she served as a Dual   Agent (DA). Use mixed references for ranges and the agent code condition in   cell J3. Use relative cell references to the agent condition in cell E2. When   you copy the formulas, use the paste Formulas options to preserve border   formatting.
 

  In cell G2, insert the SUMIFS function to sum the selling prices of the   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range G3:G4 and preserve the bottom   border for cell G4.

Now, you will calculate the   highest-price house highest-price house sold for each agent when he or she   served as a Dual Agent (DA). Use mixed references for ranges and the agent   code condition in cell J3. Use relative cell references to the agent   condition in cell E2. When you copy the formulas, use the paste Formulas   options to preserve border formatting.
 

  In cell H2, insert the MAXIFS function in cell H2 to display the highest-price   house sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range H3:H4 and preserve the borders in   the range H3:H4.

The Map worksheet contains a   list of cities, postal codes, and average house sales. You will insert a map   chart to depict the averages visually using the default gradient fill colors.
 

  Display the Map worksheet, select the range B1:C5 and insert a map chart.

Cut the map chart and paste it   in cell A7. Set a 2.31″ height and 3.62″ width.

You want to enter a meaningful   title for the map.
 

  Change the map title to Average Selling Price by Zip Code.

Display the Format Data Series   task pane, select the option to display only regions with data, and show all   labels. Close the task pane.

You are ready to start   completing the loan amortization table.
 

  Display the Loan worksheet. In cell B8, type a reference formula to cell B1.   The balance before the first payment is identical to the loan amount. Do not   type the value; use the cell reference instead. In cell B9, subtract the   principal from the beginning balance on the previous row. Copy the formula to   the range B10:B19.

Now, you will calculate the   interest for the first payment.
 

  In cell C8, calculate the interest for the first payment using the IPMT   function. Copy the function to the range C9:C19.

Next, you will calculate the   principal paid.
 

  In cell D8, calculate the principal paid for the first payment using the PPMT   function. Copy the
  function to the range D9:D19.

Rows 21-23 contain a summary   section for cumulative totals after the first year.
 

  In cell B22, insert the CUMIPMT function that calculates the cumulative   interest after the first year. Use references to cells A8 and A19 for the   period arguments.

The next summary statistic will   calculate the principal paid after the first year.
 

  In cell B23, insert the CUMPRINC function that calculates the cumulative   principal paid after the first year. Use references to cells A8 and A19 for   the period arguments.

Rows 25-28 contain a section for   what-if analysis.
 

  In cell B27, use the RATE financial function to calculate the periodic rate   using $1,400 as the
  monthly payment (cell B26), the NPER, and loan amount in the original input   section.

In cell B28, calculate the APR   by multiplying the monthly rate (cell B27) by 12.

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of each worksheet