cybersecurity

  

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Internet Programming

 Internet Programming Term Project – Online Banking I. Introduction This project let you apply the programming skills you learned in Internet Programming class by developing an application for online banking using ASP.NET MVC Core with C# language. You will build a website which serves as an online service website, where one can register as a customer. Once registered, a customer can log in and log out the website. Customers can update their profile/personal information, review deposit/withdraw history, check balance, pay bills. Particularly, in the bill pay section, the customers can add/update payee information, pay one or more payees, and review payment history. Another role of the website is a teller. A teller can see the information of all the customers, can perform deposit/withdraw operation, can close customer accounts. II. Requirements 1. There are two roles in this website – customers and tellers. 2. A teller can see all customers’ information. 3. A teller can withdraw and deposit money for a customer. This is just a simulation of the operation that a teller performs at the bank counter when collecting and/or disseminate cash/check from a customer. 4. The website is free. Anyone can register as a customer. Upon registration, the customer information is collected and saved in the database; an id is assigned to the customer. 5. Registered customers can log in and log out the website. The only pages an unregistered person can access is the home page and registration page. 6. A customer can update his/her personal information on the website. 7. On the bill pay page, a customer can add new payee or update existing payee. One customer can have multiple payees. 8. A customer can pick one or multiple payees to pay. When payment is submitted, you only need to save the payment information in the database. A customer can review payment history which can be sorted and filtered by a date range. 9. You need to design a simple database. Three tables are required in the DB:  Customer –information of the registered customer  Payee — each customer can have a saved list of payees with all information necessary to send the payment  PaymentHistory – stores the payment history of all customers You can also add additional tables that you think are needed.  10. You will not only be graded by the correctness, but also by the quality of code. I expect your code to be clear and follow good programming practice. 11. When designing and building the website, keep security and user friendliness in mind! 12. You can work alone or in a team of 4 students maximum. 13. Bonus points will be given to projects with an additional role – manager. If you implemented this feature, make sure to describe it in your video demo and project report. Maximum 10 bonus points. III. Deliverables 1. Project Reports – You need to write a project report, where you need to:  Provide introduction of the project  Show screenshots of the pages you built  Explain how each page work, and how are the pages connected  What skills you learned from class are used in your project  If this is a teamwork, only one report is needed for the team. The report needs to have all team members’ names and clarify each team member’s contribution to the project. 2. Presentation – At the end of the semester, you will prepare a demo video using screen recording software such as “screen cast o matic”, “screencastify”, or zoom (meeting recording functionality). In the video, present your project by briefly going through the code structure and a demo of the website. 3. Code – Zip all the source code into one zip folder.  

CMG 545 Week6 – Apply: Project Plan

 

Assignment Content

  1. Throughout the past few weeks, you have learned about the type of leader you’d like to be and how you can use your leadership skills in project management. This week’s reading discussed Kotter’s eight-step model of planned organization, appreciative inquiry, and the psychological and emotional processes involved in successful change. Leading an IT project will require you to use all of these skills when working with stakeholders. One of the most important project tasks is to present the scoping information to the stakeholders.

    For this assignment, you will revise your team’s project plan to present to stakeholders. Access your team’s draft of the Project Plan Template from the Wk 3 Team – Apply: Project Scope, Budget, and Timeline Stakeholder Meeting Role Play assignment, and re-save it so you can work on it individually.

    Using information from the previous weeks’ assignments and instructor feedback, revise the Project Plan Template. Your new project plan should include the following revisions and additions:

    • A summary of the project in Section 1: Summary
    • An individual revision of the timeline from the Wk 3 Team – Apply: Project Scope, Budget, and Timeline Stakeholder Meeting Role Play assignment in Section 3: Schedule – Milestones
    • A list of stakeholders (refer to the Wk 3 – Apply: Project Management Flowchart and Summary assignment document) in Section 4: Resources
    • An analysis of impact of change that should occur based on the risk assessment in Section 6: Change Management
    • An explanation and justification for the changes made in your revision of your group’s decisions in an Appendix section
    • Cite two sources other than Intuit, Inc. company documents.

      Format your citations according to APA guidelines.

      Submit your assignment.

  • I HAVE  ATTACH THE PREVIOUS ASSIGNMENTS THAT THE INSTRUCTIONS ARE REFERRING TO
     

Assignment 1 cryptography

  Question: Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at the reasons why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

 –The writing assignment requires a minimum of two written pages to evaluate history.

  -You must use a minimum of three scholarly articles to complete the assignment.

– The assignment must be properly APA formatted with a separate title and reference page. 

 – No Plagiarism 

Inferential Statistics

  

In this report paper, you will explore in detail one of the statistical learning techniques or data mining (if you have the background) approaches to research discussed in the course, applying it in the context of a specific application or methodological study. This will help you gain a deeper understanding of your chosen topic as well as gain experience in translating these ideas into practice. 

Find a data set, generate your topic based on the type of dataset and what questions you want to answer from the dataset. The following task need to be performed:

  • Data      Selection (Check the lecture slides for the online data set resources).
  • Data      Exploration and visualization
  • Data      Analysis (Explain the Statistical methods you used in the project)
  • Discussion and Summarization of      the work and results

Your report is base on the hands-on project.

Note: Use MS Excel or SPSS or WEKA

blockchain Finance

compose 3-page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your essay, you must include an APA-style reference page.

DBMS project

I need someone to work on a database project. project include making entities, relationship schema, populate the database with the data, write SQL query for 10 questions (any).