Penetration Testing

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Machine Learning Iris

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.

Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

cyber security

 1.”Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

2. Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?” (Ciampa 649). 

Information Systems Business and Beyond

Discussion: This week we focus on some additional terms for IT users.  This week lets discuss what a community of practice is.   Why are they important and how can they impact the culture within an organization?

Assignment

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court.

2. The minimum word count shall be not less than 500 words in APA format.

Answer these questions without plagarism

1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? (Hint: Look at the bandwidth and CPU utilization.)

page1image44572064page1image44572448

2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.

3. ExplainhowyoucoulduseoneormoreoftheWindowslog(Application, Security, Setup, System, and Forwarded Events logs) files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file?

4. Shouldyoufilterlogfilesduringaninvestigationintoasecurityincident?Why or why not?

5. Shouldremotedesktopservicesbeenabledonemployeeworkstationsforuse by IT Help Desk personnel? Why or why not?

6. HowdoesMicrosoftBaselineSecurityAnalyzer(MBSA)differfromWindows Update? Why are Shares a source of system vulnerabilities?

block chain analysis

 

Critical Analysis Paper

Follow the links below for the journals and complete the following questions for each link. Please use one document for both journals. 

Paper 1:

Link: https://www.sciencedirect.com/science/article/pii/S0736585318306324

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Paper 2:

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers: