week-2_countermeasure

 

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Organ leader and decision making

Read the ModMeters Case Study on pages 82-85 in the textbook. Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. Case study paper must be completed in APA style format.  Attached document is the case study pages from 82-85  and also the preferred template for the assignment.

New tech bus leaders

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

The assignment will be graded using the following criteria:

(Maximum # of Points Per Area)

Grammar/Spelling/Citation: Make sure all work is grammatically correct, spelling is 100% accurate, and cite all sources in-text/at the end of the paper where applicable. 

Technical Connection: Make the paper relevant to the course and its connection with your current classwork. Discuss how what you have learned can be applied to your work or future work. 

Word Count: The minimum word count is 500 words. 

Personal Connection – 4 Points: How does this course and the experiences you have been taught in  impact your personal work. 

Journal Article Analysis

 Select any one from the below key terms.

Key Terms:

  • Styles of Negotiation
  • Anchoring in Negotiation
  • Mediation
  • Arbitration

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions

Cyber Security Lab – Shellshock

Please narrate and stake screenshots while doing lab like it says in instruction in PDF

This lab will be done in the SEED lab VM. (Lab pdf, notes, and c code file attached.)

  • Shellshock
  • Environment variables
  • Function definition in Bash
  • Apache and CGI programs

Note: You may need to change void main() to int main() in the C code.

The submission is a lab report that includes screenshots of the steps and a narrative of what is happening.

There are two submissions in case anything goes wrong with the first.

Security Architecture & design

Length:  Minimum of 600 words

Simply, no plagiarism

Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment: