Reverse Engineering, Vlnerabilties

This is an Android app. Please review and identify if there are any vulnerabilities in this mobile Android app.

For each vulnerability, please take a screenshot or evidence and explain why you think it is a vulnerability.

Password to extract the file: infected

Softwear Anti-virus Security Architecture

Length: Minimum of 1500 words 

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

1. Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? (900 Words – two references)

2. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? (600 Words – two references)

Network Design

 

You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Houston, Texas, and adding a test location in China.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include logical topology diagrams (layer 3) and physical network diagrams of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as either a:

  • 2- to 3-page Microsoft® Word document
  • 10-slide Microsoft® PowerPoint® presentation with detailed speaker notes

Write a short paper, 400-500 words on herasay rule

 
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. 

 

Use References. Include quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. 

It should be Plagiarism free.