Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

 

#Exp19 Access Ch06 Capstone – Northwind Traders Sales Analysis 1.0

Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0

Project Description:

Northwind Traders is a small international gourmet foods wholesaler.  You will update the company’s database by increasing the price of all of  the meat and poultry products. You will make a table for archiving  older order information. You will also summarize quantities sold by  category and identify customers who have no orders.

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Northwind.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Using a select query, you will identify   all of the products with a  category of meat or poultry, and then use an   update query to increase  the prices of the products.
 

  Create a select query that includes the CategoryID from the  Categories table   and the UnitPrice and ProductName fields from the  Products table (in that   order). Run the query and note the CategoryID  for Meat/Poultry.

Add the appropriate CategoryID   criterion to limit the query output  to only Meat/Poultry. Convert the query   to an update query. Update the  UnitPrice for Meat/Poultry only by increasing   it by 6 percent.

View   the query in Datasheet view prior to running it to make sure  you are updating   the correct (four) records. Return to Design view and  run the query. Save the   query as Update Meat/Poultry   Prices.   Close the query.

You will identify orders shipped   during the first half of the year  and create a new table in which to store   them. You will then delete  the orders from the current orders table.
 

  Create a select query that identifies all of the orders shipped Between 1/1/2020 and   3/31/2020. Include all fields from the Orders   table.

Convert   the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive Table. Close the query.

Make   a copy of the Make Orders Archive   Table query and save it as Append Orders Archive   Table.   Open the Append Orders Archive Table query   in Design view. Convert the make table query to an append query. The query   will append to the Orders Archive table.

Modify   the criteria to append orders shipped Between 4/1/2020   and 6/30/2020. Run the query, save it, and then   close it.

Open   the Orders Archive table in Design   view and set OrderID as the   primary key field. Switch to Datasheet view, then save and close the table.

Make a copy of the Append Orders Archive Table query and   save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append   query to a delete query.

Modify the criteria to delete all   archived orders from the Orders table (six records). Run, save, and then   close the query.

You   want to determine how sales are performing with respect to each  product   category. You will create a crosstab query that displays  quantities by   category and salesperson.
 

  Open the Profit query in Design view and add the LastName field from the Employees table to the last column of the   design grid. Run, save, and close the query.

Use the query wizard to create a   crosstab query based on the Profit   query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept   the query name as Profit_Crosstab.

Modify the query to display CategoryName as the row heading field   and LastName as the column heading   field. Run, save, and close the query.

You will create a query to determine   which customers have no  matching orders. The customers will be contacted to   determine if they  would like to place an order.
 

  Create a query to find out if any of the customers have no current  order   details. Add all of the fields from the Customers table to the  results. Save   the query as Customers With No Orders. Run the query and close it.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Vulnerability Scanner

You will be using your virtual machine from last week and installing, configuring, and then running a vulnerability scanner to scan your virtual machine.  

You will be using a free open-source scanner named Vuls. To help you get it installed and running, you can follow these instructions, which recommend that you use an account named “Sammy.” I did these instructions using my root account and ignored the Sammy parts. (Admittedly, this is poor practice, but for a virtual machine we are deleting at the end of the course, we can bend the rules of best practices a bit.) Follow steps 1 through 6. 

In our instructions for the week, we need to edit a couple commands along the way. This is due to the author of the utilities changing the way that certain command arguments are processed. The functionality still works but the commands will differ. Please make sure you use these modifications in order to not have errors. Again, copy/paste will be the easiest way to capture the changes so you don’t miss a dash or space.

ORIGINAL: for i in `seq 2002 $(date +”%Y”)`; do sudo go-cve-dictionary fetchnvd -dbpath /usr/share/vuls-data/cve.sqlite3 -years $i; done

CHANGE: sudo go-cve-dictionary fetch nvd –dbpath /usr/share/vuls-data/cve.sqlite3

ORIGINAL: sudo goval-dictionary fetch-ubuntu -dbpath=/usr/share/vuls-data/oval.sqlite3 18

CHANGE: sudo goval-dictionary fetch ubuntu –dbpath=/usr/share/vuls-data/oval.sqlite3 18

At the conclusion of Step 6, you will have run the scanner against your virtual machine. There will be vulnerabilities, many of which will be unpatchable. Attach a screenshot to your submission of your results screen. Pick one of the vulnerabilities and answer the following questions: 

  • What is the CVE number of your chosen vulnerability?
  • What year was this CVE discovered? (Hint: this is part of the CVE number!)
  • What software programs are affected?  
  • In your own words, what is the summary of this vulnerability?  
  • Perform an analysis of the likelihood of this vulnerability being exploited. In other words, would this program’s vulnerability be easily exposed to an attacker or would it require a complex scenario to make this exposed?
  • In your opinion, given the CVE criticality and the likelihood, do you feel comfortable with this vulnerable software on your system? 

Parameters

  • The assignment should be double-spaced, 12-point Times New Roman font, with one-inch margins
  • Use APA for citing references and quotations

Computer Security Lab

 

Part 3: Analyzing Malicious Windows Programs (Lab 7.1 from PMA)

Complete all the steps mentioned in the below attached document for part 3 of this project:

Project part 3_ Analyzing Malicious Windows Programs.pdf

Part 4: Analyzing Code Constructs in Malware (Lab 6.1 from PMA)

Part 4 of this project is based on Lab 6-1 in “Practical Malware Analysis” textbook chapter 6.

Based on the knowledge gained in all previous lab assignments, you will have to complete lab 6-1

individually (with minimal or no supervision) by following the instructions given in Lab 6-1 in the

textbook. There are more detailed solutions in the back of the book.

1. Open and analyze the malware found in the file Lab06-01.exe using IDA Pro.

2. Answer all the questions (Q1 to Q3) found in Lab 6-1 in your own words.

3. List all the steps you followed in setting up the software environment and the screenshots captured

while analyzing the malware in IDA Pro (Hint: The steps that you list for Lab 6-1 should be something

similar to the steps that were given to you in all previous lab assignment instructions).

Submission Requirements for all four parts of the project:

Format: Microsoft Word

Font: Arial, 12-Point, Double-Space

Citation Style: APA

Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum

of 6 pages (excluding title page and bibliography).

*******************************************Please read first to see if you can do the job.*********************

Discussion boards – 3

DB1 (400 – 600 words) 

Create a main post that highlights 2 best practices regarding the implementation of a security plan. This can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff).

  • Describe and evaluate each strategy.

DB 2 (400 – 600 Words)

 

The security awareness program for your company should include a time line of activities (such as security fair, or special “brown bag” meetings) and the types of communications (newsletters, placards, etc.) that would need to be sent to the users. Consider best practices for implementing your Enterprise Security Strategy Plan.

Identify at least 3 activities that would be part of your Enterprise Security Strategy Plan, and provide the following:

  • Approximate timing for roll out
  • Required communications
  • A brief explanation for choosing this implementation activity

DB 3 (400 – 600 Words)

 

Create a main post that highlights 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Explain why you have chosen these areas. Provide both the values you would hope to see and the actions you would take if what you saw was not in alignment with that optimal range.

Some examples are the following:

  • Security incidents (per week, month, or year)
  • Viruses detected
  • Administration violations (unauthorized changes)
  • Spam not detected
  • Invalid log-in attempts

Computer programming

 Yabe Online Auctions requires its sellers to post items for sale for a six-week period during which the price of any unsold item drops 12 percent each week. For example, an item that costs $10.00 during the first week costs 12 percent less, or $8.80, during the second week. During the third week, the same item is 12 percent less than $8.80, or $7.74. Design a modular program that allows a user to input prices until an appropriate sentinel value is entered and displays the price of each item for weeks one through six. 

Access control q3

Discussion: Security Breach Evaluationh.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.