DS-2

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Mining

 

Using search engines, find two different recent  articles involving data mining. Describe the role of “data mining” in  the story using your own words.

Here is an example of an article:

12:00 AM, January 07, 2018 / LAST MODIFIED: 12:00 AM, January 07, 2018 New police unit to check cyber crime
Social media users to face stringent watch; police can detect users quickly 

Be sure to cite your sources.  Initial posts should contain at least one APA reference and associated in-text citation.

Final research Paper

  

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (600 words): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.

Prompt 2 “Big Data” (600 words): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy?

Prompt 3 “Government and Policies” (600 words):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

Be approximately six to eight pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Buffer overflow assignment

Exploit the vulnerable program (vulnerable.c) to obtain a shell. The vulnerable program and sample exploit (you need to edit the exploit to make it work) are in the Assignments folder which in turn is in the Documents folder in the TritonApps lab environment. Provide commands and the screenshots of the outputs to illustrate your exploit. [10 pts]

Answer the following questions related to the exploit:

a. Which function and statement in the program is the major cause of the vulnerability? Why? [10 pts]

b. What address are you using to overwrite the return address? How did you obtain this address? [10 pts]

c. Draw a figure of the overflow string that leads to a successful buffer overflow attack and a shell. The figure should highlight the important addresses and contents. [10 pts]

d. What offset worked for your exploit? How did you find the offset? [10 pts]

Discussion

 

This is a required assignment worth 20 points (20-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation.  

ERM Week 2

Q1.  275 words

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper among above two was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Q2. research paper – SEPARATE Document – 5 full pages

  Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.  Minimum of 400 words

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

DATABASE

   

                        1.5 Marks
                Learning     Outcome(s):
Create entity-relationship     model, relational model, and write SQL queries
 
 
 
 
 
 
      Question One

Consider the below schema for a library database and write relational algebra expressions for the following queries  

  

   

1. Author ( authorname, citizenship, birthyear) 

2. Book (isbn, title, authorname)

3. Topic (isbn, subject)

4. Branch (libname, city)

5. Instock (isbn, libname, quantity)

1. Give all authors’ names born after 1940. [0.25 Point]

2. Give the names of libraries in Sydney. [0.25 Point]

3. Give the city/cities and “isbn” where each book is held.    [0.25 Point]

4. Give the title of each book on the topic of either alcohol or drugs. [0.25 Point]

5. Give the title and author of each book of which at least two copies are held in a branch located in Melbourne.  [0.50 Point]

   

                        1 Mark
                Learning     Outcome(s):
Explain database concepts,     systems, and architectures
 
 
 
 
 
      Question Two

What is the different between the database schema and the database instance? Give an example for each.

   

                        1 Mark
                Learning     Outcome(s):
Design a database starting from     the conceptual design to the implementation of database schemas
 
 
 
 
 
      Question Three

Name at least three tables that might be used to store information in the following systems:

a. An e-commerce system such as Amazon.  [0.25 Point]

b. A social media system such as Twitter.    [0.25 Point]

c. A health care system. [0.25 Point]

d. A university system. [0.25 Point]

   

                        1.5 Marks
                Learning     Outcome(s):
Create entity-relationship     model, relational model, and write SQL queries
 
 
 
 
      Question Four

Given the relation below named Contact_Info, answer the following questions:

  

SSN

Name

Phone

Email

Age

 

234-356

Sara Fahad

340-675-9876

[email protected]

22

 

673-980

Mohammad Ahmed

234-896-2567

[email protected]

28

 

129-678

Waad Saud

280-986-8736

[email protected]

31

a. What is the relational schema of the relation Contact_Info?  [0.25 Point]

 

b. What is the degree of the giving relation? [0.25 Point]

 

c. Is the column Name an atomic attribute/value? If no, justify your answer? [0.25 Point]

d. What are the outputs of the given operations?  

1.                      (Contact_Info)  [0.50 Point]

2.   (Contact_Info)   [0.25 Point]

Diagrams

 draw an Activity Diagram showing the actions and events involved with a student completing spring 2021 pre-registration for courses to attend a local public school. Think about COVID-19 as well. Save your file in MS Word or PDF file format.  

Cloud Computing

1. Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?

2. Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.