Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.
week-12-ft
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.
Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.
PLEC Week 4
Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Write in essay format not in bulleted, numbered or other list format.
Due care due diligence 3.0
- Distinguish between due care and due diligence.
- Based on your experience, provide examples of due care and due diligence.
Hardening the Firewall
In this assignment, students will demonstrate methods and techniques of adjudicating systems configured in a manner consistent with general practice.
Research methods for hardening PFSense.
Using the virtualized PFSense system created in Topic 3, harden the PFSense system using Snort.
- Start the Snort service.
- Update Snort and download the latest community rules.
- Ensure that you have configured Snort to detect port scans.
Using the Kali VM from Topic 3, run another port scan.
Using screenshots of the results, explain if Snort detected the port scan.
Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:
- Explain what hardening is, what Snort does, and why it is being used in this scenario.
- Explain any other methods by which PFSense can be hardened.
- Include at least five screenshots.
week 3
see attachment
Interpersonal communication
answer the post and feedback each post need 75 words there is 3 post thank you
Practical Excersice Power Point
follow the instructions to complete the presentation.
Team managment dis 3
Designing Team and Team Identity
Part 1: Our text book lists about twelve elements that a manager should consider when designing a team (This is not a design team, this is building or hiring a team of people) Choose two elements that you think are most important. Define them and explain why these two are most important. Would you choose the same two for a face to face team and a virtual team? If you were a manager and were given a team of five 30-year-old males from the United States and you could hire one more person for the team, would you hire a female from France? why or why not?
Part 2: Do you feel more attached to your work team, your class team or your ‘team of family and friends?’ Do each of these ‘teams’ have a different identity? What is the difference?
Need 300 – 400 content including references.