What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)? Per enterprise security assessments?
implementation of innovation technologies.
This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:
- Provide a high-level overview/ summary of the case study
- Note how constructive intentionality impacts innovation implementations
- Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Malware & Sniffers
Using the following link as your reference, select TWO and explain the differences
(viruses, worms, trojans, and bots).
Review Article
review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
Address the following:
- What did the authors investigate, and in general how did they do so?
- Identify the hypothesis or question being tested
- Summarize the overall article.
- Identify the conclusions of the authors
- Indicate whether or not you think the data support their conclusions/hypothesis
- Consider alternative explanations for the results
- Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
- The relevance or importance of the study
- The appropriateness of the experimental design
When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation.
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Python cod
Write a Python program that reads IP addresses from an input file (ip_input.txt), checks its format and validity, and then checks its connectivity to each IP. Use the IP input file shown as below. Submit your code and the output screen shots after a run.
8.8.8.8
2.2.2.2.2
127.5.6.7
3.3.3.305
0.120.3.5
8.8.8.1
169.234.6.8
8.8.4.4
4.4.8.8
(you may add more to test your code)
Validity check (check the format and filter the addresses that are not publicly routable):
– IP should be four dotted format (x.x.x.x)
– octets having values between 0-255.
– IP should not belong to one of these blocks:
o 0.0.0.0/8
o 127.0.0.0/8
o 169.254.0.0/8
o (you may add more if you like)
Connectivity check:
– Use ping for testing reachability to the IP address.
The output could look like:
Ip address: 8.8.8.8
Validity: yes
Reachability: yes
Ip address: 2.2.2.2.2
Validity: no – bad format
Reachability: no
Ip address: 127.5.6.7
Validity: no – in block 127.0.0.0/8
Reachability: no
…….
…….
dis 8
1.
Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.
2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?
Write a paper of 2 pages each and answer all the sub-question
Policy
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
IT Software in business
i have assignment for IT software in business its only 3 questions and it should be submit as excel file. i need to get 100% in this assignment and its super easy but im not good at IT
General essay
The Year Up Washington DC site offers four career tracks: 1. Sales/Customer Service 2. IT/Helpdesk 3. Business/Project Management 4. Software Development Please answer the following questions for your essay: 1) What is your first choice for your specialty track? Why? What previous experience (if any) do you have that would make you successful in this track? Discuss any previous school or work experience, certifications you have, or self-learning you’ve done. (Write 1-2 paragraphs) 2) What positions are you interested in within this field? Why? 3) What research have you done on your own to learn more about this career field? 4.) If you don’t get your first choice for your specialty track, how would your second choice fit into your career goals. Essay must be no more than 2 pages, double spaced.
My first choice will be IT/Helpdesk, second choice is software Development. I am currently 19 years of age I have always enjoyed the IT field because technology is intriguing.
Cross-Site Scripting
- Cross-Site Scripting attack
- XSS worm and self-propagation
- Session cookies
- HTTP GET and POST requests
- JavaScript and Ajax
Note: Since May 5 2019, the Firefox Add-on “HTTP Header Live” has been disabled by Firefox. Mozilla verifies and signs add-ons that follow a set of security guidelines. The version of HTTP Header Live (v 0.6 – Last Updated April 9, 2018) installed on the VM does not comply with this security guideline, so it was automatically disabled. The issue can be easily resolved by installing the latest version of HTTP Header Live.
Video to help:
https://www.youtube.com/watch?v=sFSq6dsDGzA&feature=youtu.be