EH intership paper

Hello,

i need this paper by 10/27 afternoon.

Strictly No plagiarism please use your own words.

Will you adjust your Internet behavior now that you know how your data is used?
If yes, how?

300 words paper and 4 slides  PPT needed.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

File based database implementation in java

 

Objective

You are to implement a simple database using a sorted file of fixed length records. The data that you are to use for testing is in file: Parks.csv Windows compatible (cr lf). This data contains the visitation records for the US National Parks from 1904 to 2016.. The goal of this assignment is to understand and practice using file management techniques to implement a database system. Your file-based database needs to handle overflow by writing records to an overflow file that contains unsorted records.

First, create a file of fixed length records from the data provided interleaved with blank records. Your file should create space for insertions by writing one blank record between each real record. Meta-information should be stored in a non-fixed length way in a separate configuration file, e.g., “Parks.config”. The config file must also store useful data like the names of the fields (for display), the number of records, and anything else you would want to add.

So, the initial file will have 764 records, half of which are blank. When a record is inserted, the file is searched (using binary search) to find the correct location. If there is a blank record where the new record needs to go, then the blank record is simply overwritten. However, if there is no empty record available in the correct location, the original file should be re-written with new blanks inserted, including after the new record. For example, if we do 3 inserts into blank records, we would now have 385 real records in our file of 764 total records. If the next insert fails, we would create a new file with 770 total records in it (the 385 real records, each with one blank record after it).

You must not read the whole data file into memory at a time

Program Description

Create a program which offers the user the following menu of operations:

1) Create new database
2) Open database
3) Close database
4) Display record
5) Update record
6) Create report
7) Add record
8) Delete record
9) Quit

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

WEB Answer

 

  1. Pitch Deck
    Overview
    You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
    Instructions
    You will need to answer the following questions:

    • What kind of domain names will you register (that is .com, .biz, .net, et cetera)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
    • Will you register the site using multiple domains? Why is or isn’t this necessary?
    • Will you need to secure any portion of your site? Why? (See the section on HTTPS.)
    • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
    • What browsers do you anticipate your visitors will be using based on information available today?
    • Does the browser have any impact on your design?
    • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?
    • Requirements
      You may use any one of a variety of formats to create a pitch deck. PowerPoint is highly recommended, with extra points for creating a presentation using a video device or software that you can upload to YouTube or another easily accessible online hosting service. (If you choose this option, you must coordinate ahead of time with your instructor, to ensure that your instructor will be able to access your video.) Note: You’ve already been hired, but remember that you still need to show off how awesome you are.
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Present information and requirements for a website design to a customer.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

vulnerable dependencies by using two different SCA tools “Snyk” and “Dependency-Check

 My task for this assignment is to use two different SCA tools “Snyk” and “Dependency-Check” to find vulnerable dependencies in open-source projects. Each tool requires a different setup method that can be found in the online documentation of the tool. You are required to follow the instructions in the online documentation to set up the environment, perform a scan, and prepare reports in a useful format. The ability to use online documentation is part of this assessment.

Required Tools

  • Ubuntu Linux VM
  • Snyk
  • Dependency-Check

Part 1

For Part 1 of this assignment, you will be using Snyk to scan a customized ”Gemfile.lock” file (also attached below) that contains a list of modules used by an open-source Ruby application and identify vulnerable dependencies. Snyk is a security tool that enables you to find and fix known vulnerabilities in open-source software. Watch this video to learn more about Snyk:

  • Create a free account with Snyk
  • Setup Snyk CLI on your Linux VM. For instructions, check the “CLI – Installation” page. 
  • Create a directory called “CYB505-Snyk” and copy ”Gemfile.lock” there.
  • Change to the newly created directory and run a test using Snyk CLI (refer to installation documentation for more details).
  • Login back to Snyk portal and observe the results. A new project should have been created by executing the test from the CLI. It will show you a summary of the findings. Clicking on the project name takes you to the finding details.
  • Summarize the findings in the format of a report. See the “Deliverables” section below.

 Part 2

For Part 2, you will be using Dependency-Check, which is an open-source SCA tool from OWASP.  You are required to install this tool on your Linux VM and run a test on another open-source tool from OWASP, Juice Shop.

To complete Part 2 of the assignment, follow the instructions:

  • Create a folder on your Linux VM called “CYB505-DC”.
  • Download OWASP Juice Shop (if you have not already done so for Discussion 7.1). Unzip and copy it to the newly created folder.
  • Download OWASP Dependency Check binaries zip file from the following link: https://bintray.com/jeremy-long/owasp/dependency-check under downloads.
  • Extract the zip file and look for the executable script called “dependency-check.sh” in the bin folder.
  • Run the scan and output the results into an HTML file. Use the command help option(“.dependency-check -h”) for guidance. Hints: Check out -f and -o arguments and ensure that your command line is in the directory with the .sh file.
  • Summarize the findings in the report format. See the “Deliverables” section below.

Deliverables

Submit a zip file that contains the following three files:

  1. A single assessment report PDF file that contains findings from both scans. The report should include:
  • An executive summary that summarizes the findings for the upper-management audience using limited technical knowledge.
  • Findings
    • Vulnerability overview
    • Detailed dependencies paths
    • Risk rating
    • Remediation recommendations
    • Your analysis of the proposed remediation method, ONLY for “High” rated findings. I.e., if it is possible to do, what are the challenges, etc.
  • You are free to choose the report format and headings, but points are allocated for a professional-looking, industry-standard level report. The report should be readable and eye-catching, yet accurate and informative for the technical audience.
  • PDF export of the Snyk report
  • PDF export of the Dependency-Check HTML report.

security architecture 15.1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum of 400 words

What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

Assignment and Discussion

Discussion:
This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.
Need 125 words and Textbook is attached.

Assignment:  
Chapter 4 – Review the section on Linear Development in Learning Approaches. Discuss how learning changes over time impact organizational culture. What is the impact of this cultural change on the success of IT projects? (Information Technology and Organizational Learning) 

Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections. Note the various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.

Exercise 6:
How are you doing on keeping your own information secure? Review the steps listed in the chapter and comment on how well you are doing.  (Information Systems for Business and Beyond Text – Refer to Chapter 6) 

Research Paper: Server Virtualization and Cloud Computing

Research Paper: Server Virtualization and Cloud Computing

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.