zeux attack

   

Module 05 Course Project – Zeus Attack

As indicated previously, XYZ has been infected with Zeus. Zeus has spread throughout the inside network, and it is your job to monitor and figure out how it is spreading and what you can do to prevent it from spreading further.

In a Microsoft Word document, write a minimum four to five (4-5) page proposal in which you:

1) Determine how you are going to monitor your network.

2) Describe the tools you plan on using (at least two).

3) Describe what techniques you plan to use for the following:

· Determine what the malware is doing to your network.

· Determine how the malware is spreading.

· Determine how you will protect your network in the future.

Discussion Question

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the iOS platform. 

To participate in the Discussion, respond to the Discussion prompt by Day 3. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates by Day 5 in one or more of the following ways: 

  • Complete the Week #4 Discussion by the assigned due date.  Late assignments will not be accepted. 
  • This is a required assignment and is worth 50 points.
  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.
  • Use this link to access the Discussion Board

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

SE491: Software Construction week 1 Dic

Week 1: Discussion

In your own words, what is the difference between a flow chart, a pseudocode, and a program? Why does a programmer need to know all three of them?

You are required to make at least two comments on the responses posted by your classmates with a minimum of 50 words. Make sure you design your response with your own words. Your responses to your classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality academic environment through which you improve your knowledge and understanding. Read and review all assigned course materials and chapters before you start working on your assignments.

Article writing

Discuss game theory and how artificial intelligence is used in video games.  Provide examples and visual representations. 
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.

Review the article

For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

It is an objective evaluation.

Link – https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4

Case Study Phase 2

The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.

A) PROPOSE A RISK ASSESSMENT METHODOLOGY WHICH CAN BE USED ALONG WITH YOUR CHOSEN COMPANY IN CASE STUDY PHASE 1 (attached).
 

B) MAKE SURE YOUR REFERENCES LIST CONTAINS AT LEAST 4 SOURCES

GUIDELINES:

Running Size of your deliverable should include the 2 Pages of content for this phase, a title page, the references page

Make sure you are using at least four (4) academic APA references.

This submission should be created following APA 6th edition guidelines.

The paper is to follow the APA style guide, Sixth Edition 

Online Patents and other concerns

 

In order to complete assignment #4, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 61. Chapter 6 noted that Friendster has obtained a number of social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these two companies and you expect that you may eventually be sued by Friendster. In addition to contesting the validity or enforceability of the Friendster patents, what are some of your other options? 

Chapter 72. The CEO of a small but promising start-up company is in need of an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?

3. Read about the Gramm–Leach–Bliley Act (GLBA). Discuss the impact of the GLBA on the financial services industry