CA

 

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

ITISP W 2 A

 Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

HTML programming

  

HTML programming

Create a Design Document, outlining a website with at least 5 pages demonstrating the content from this course, relating to an interest or hobby the student has. 

Include:

· Brief Description of the following pages, including a layout mockup and a color palette 

o 1 text/terms 

o 1 images 

o 1 multimedia page 

o 1 links page 

o 1 user designed 

Automated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code.

 

For this assignment, My task is to scan the WebGoat source code using the VCG SAST tool and verify the findings within the code. In particular, you will be be using VisualCodeGrepper, which is an open-source SAST tool running on Windows. It supports multiple programming languages(C++, C#, VB, PHP, Java, and PL/SQL).

. Prepare a simple report based on OWASP Findings Report Guide, and submit the report in a PDF format   There should be a section summarizing all the findings by:

  1. Risk level
  2. OWASP Top 10 Threats

To install VCG and run your scans, follow these instructions:

  1. Download WebGoat 8.0 from GitHub in a zip format.
  2. Extract the zip file into a directory.
  3. Download VCG from the project page.
  4. Install VCG on a Windows machine. Consider the system requirements on the project page.

Class diagram and sequence diagram

As the head of information systems for a college you are tasked with developing a new student 
registration system. The college would like a new client-server system to replace its much older system 
developed around mainframe technology. The new system will allow students to register for courses 
and view report cards from personal computers attached to the campus LAN. Professors will be able to 
access the system to sign up to teach courses as well as record grades.
Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The 
college will keep the existing course catalog database where all course information is maintained. This 
database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in 
an open SQL interface that allows access to this database from college’s Unix servers. The legacy system 
performance is rather poor, so the new system must ensure that access to the data on the legacy system 
occurs in a timely manner. The new system will access course information from the legacy database but 
will not update it. The registrar’s office will continue to maintain course information through another 
system.
At the beginning of each semester, students may request a course catalogue containing a list of course 
offerings for the semester. Information about each course, such as professor, department, and 
prerequisites, will be included to help students make informed decisions.
The new system will allow students to select four course offerings for the coming semester. In addition, 
each student will indicate two alternative choices in case the student cannot be assigned to a primary 
selection. Course offerings will have a maximum of ten students and a minimum of three students. A 
course offering with fewer than three students will be canceled. For each semester, there is a period of 
time that students can change their schedule. Students must be able to access the system during this 
time to add or drop courses. Once the registration process is completed for a student, the registration 
system sends information to the billing system so the student can be billed for the semester. If a course 
fills up during the actual registration process, the student must be notified of the change before 
submitting the schedule for processing.
At the end of the semester, the student will be able to access the system to view an electronic report 
card. Since student grades are sensitive information, the system must employ extra security measures to 
prevent unauthorized access.
Professors must be able to access the on-line system to indicate which courses they will be teaching. 
They will also need to see which students signed up for their course offerings. In addition, the professors 
will be able to record the grades for the students in each class.
Give below are the UML Use Case Diagram and Use Case Specifications (Descriptions). Your task is to 
draw the Sequence and Class Diagram(s).

me-15

 (1) How do you measure how Amazon has delivered value for its shareholders?    
 

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.

Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.