Vulnerability Process and Assessment Memorandum

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Remediation:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Java Project to be applied in Console

  

Description:

The Bank app is a console-based application that simulates banking operations. A customer can apply for an account, view their balance, and make withdrawals and deposits. An employee can approve or deny accounts and view account balances for their customers.

Purpose:

We want to see that you can meet deadlines and that you can code. You are expected to complete the following requirements and give a 5 minute presentation of your project.

Requirements:

● Build the application as a Maven project using Java 8

● All interaction with the user should be done through the console using the Scanner class

● Customers of the bank should be able to register with a username and password, and apply to open an account.

o Customers should be able to apply for joint accounts

● Once the account is open, customers should be able to withdraw, deposit, and transfer funds between accounts

o All basic validation should be done, such as trying to input negative amounts, overdrawing from accounts etc.

● Employees of the bank should be able to view all of their customers information. This includes:

o Account information

o Account balances

o Personal information

● Employees should be able to approve/deny open applications for accounts

● Bank admins should be able to view and edit all accounts. This includes:

o Approving/denying accounts

o withdrawing, depositing, transferring from all accounts

o canceling accounts

● All information should be persisted using text files and serialization via Object Input/Output Stream

● 100% test coverage is expected using J-Unit

o You should be using TDD

● Logging should be accomplished using Log4J

o All transactions should be logged

Discussion : Global Wireless

We looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

note minimum of 250 words.  At least one scholarly source should be used 

Omnet++ Assignment

Wired Network Performance Consider a wired network model (OMNET++) using a Gigabit Ethernet (GbE) backbone switch linked to several Ethernet sub-switches (also called subnet) so that large number of wired nodes/clients can be accommodated to the network. For example, one subnet can support up to 20 nodes (for optimum performance). So, if you are simulating a network with 100 nodes in total, your network model should have 5 subnets linked to a GbE backbone. Simulation parameters: 

• Number of nodes/clients: 100 

• Simulation time: 3600 Sec (longer required for Video streaming)

• Traffic type: Video streaming

 • Packet type: UDP packet 

• Performance metrics: 

(a) Video Throughput; (b) Video End-to-end delays; (c) Video packet losses. 

[Hint: Video streaming uses UDP transport layer protocol, and hence UDPVideoStreamCli, UDPVideoStreamSvr can be used for video client and video Server, respectively.] Investigation: Effect of increasing the number of video clients on system performance You may use the following table to record your simulation results. 

Analyse the results (including model validation) and write your report (4-6 pages) by summarising your research findings. 

Hint: You can draw several graphs including number of clients versus video throughput, end-to-end delays, and packet losses.

General Report Format Cover page: Assignment title, student’s name, and ID Introduction: What, why and how? – Begin your report with a clear objective (What!) of your assignment. Explain why this assignment/research is needed and how you have completed it. Outline the structure of the rest of the report. Modelling the network: Describe the model that you have developed using appropriate screenshots for models and subnet (hint: avoid unnecessary screenshots). Results and Analysis: Summarise your simulation results using tables and/or graphs (Excel or Matlab graphs) and provide a comparative analysis. Model Validation: Discuss how you have validated your simulation results. Lesson learned: Write a paragraph or two, reflecting on your own learning. Conclusion: Summarise the main findings and future research directions. References: List at least 5 references that you have used in the report. Report Length: (Part 1: 4-6 pages; Part 2: 10-14 pages) Spacing: 1.5 Font: 11 Times New Roman.

Business Impact Analysis (BIA)

Create a PowerPoint (5-6 slides) on a life event you may have coming up and apply the strategies you learned in the Business Impact Analysis (BIA) section. 

What workarounds or “back up” plans/solutions can you put in place to ensure your event will still occur?   

Your final slide should include a minimum of 2 references, which are formatted using APA standards. 

software antivirus

  

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?[700 words]

Pract connection

How Cloud services are helpful in utility sector. 

The document should be of min 400 to 500 words with references(Optional).

Information security

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. 

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Week 7 discussion – Cyber Law

 Week 7 discussion Hacking and invasion of the computers of others

Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another. Please respond in 400 words. And add references using APA format.