Dice Rolling Simulator

 

For your final project, you must find a project that you will use Python to complete. There are several websites with Python projects so I leave that to you to Google for them and select a project. I expect this project to be between 50 and 100 lines of code and include functions and classes. It must be submitted in a Jupyter notebook UNLESS you give me an extremely good reason why it can’t be. Preferring Python scripting is not a good reason, it must be technical reason.

You will keep a Word document that acts as a “journal” for all the work you do on your project. That first entry will be the submission, and approval or denial, of your project. When you submit your project, you must discuss the following topics:

1) How many lines of code do you think the project will take

2) The website or book where you got the suggestion. If you got the idea from several sites, list them all. If you are doing a project that is work related, state that then describe how it will help you. You will get some bonus points if you are picking a project that you are truly interested in. As an example, if you are interested in disinformation work and want to develop a program to help you scrape data from Twitter, I will look favorably on the project. However, you need to describe why you’re interested in the area as well as describe how the program will help you.

3) How many hours a week you will commit to working on your project. Be honest. This will let me know if I think you can actually get your project done.

4) An honor statement that says that you will do all of your own work, that you will list in your journal all sources of help you received such as a classmate or stackoverflow. If you use a site like stackoverflow, you must post the link for any question you asked or post that helped you solve your issue. Finally, your statement must say that you will only ask a fellow classmate for help. Yes, if you want to earn extra credit, you can help your classmates with problems they are having with their project. However, there’s a catch. You can only use the Final Project discussion board to ask and answer questions. If I feel that someone is asking too many questions, they will be restricted from asking more until they have correctly answered/helped a fellow student. If someone is giving complete answers, they will be removed from the board and will not be able to ask or answer questions. The idea is that you help each other, not do each other’s work. Giving links to answers, giving short answers or pointing out errors without giving the way to solve the error is what is expected. The discussion board can be found here – Final Project

Assignment

 

For this assignment, you will need the following: Ubuntu and VirtualBox.

Ubuntu can be downloaded at https://www.ubuntu.com/download/desktop.

VirtualBox can be downloaded at https://www.virtualbox.org/wiki/Downloads.

Next, create a virtual machine or instance in virtual box and load the Ubuntu desktop software on it. You may need to do additional research to get Ubuntu loaded on the virtual machine . Next, watch the video about installing a LAMP server; install the LAMP server on your Ubuntu virtual machine. 

Use screencast-o-matic to document this assignment. Submit link to video on iLearn.

Practical Connection

  

Course Description:

Course : Fall 2020 – Application Security (ISOL-534)

This course covers techniques and strategies for securing computers running Microsoft Windows operating systems, and their applications. Focusing on Windows Server 2012 and newer versions, and Windows 10 for clients, the course introduces the Windows operating system platforms and major areas of security vulnerabilities. Students will learn how to assess Windows computers for security vulnerabilities and how to make them more secure.

Course Activities and Experiences:

Students are expected to: • Review any assigned reading material and prepare responses to homework assigned. • Actively participate in activities, assignments, and discussions. • Evaluate and react to each other’s work in a supportive, constructive manner. • Complete specific assignments and exams when specified and in a professional manner. • Utilize learned technologies for class assignments. • Connect content knowledge from core courses to practical training placement and activities

Data Mining Assignment

Provide a real world example of a probability distribution based on your readings for the week. Consider the data instances that is different from uniform (i.e., equal probability).

Instructions for participation: You must post an INITIAL POST and then respond to at least ONE POST. In both postings, you MUST provide citable academic literature to defend your use case. Please do not use the same source over again, especially when most times there is absolutely no applicability from one post to the next. 

Reflection paper on business continuity and disaster recovery plan.

 Instructions for Residency Reflection Paper

 1. Reflect on all the materials and experiences you have had in this course up to this point. 

      topics covered

      a.   Building the Business Case: Measuring the Impact on the Business 

      b.   Evaluating Risk: Understanding what Can Go Wrong 

2. Write and submit a two-page (double spaced) reflection paper on how this course could aid you in your current or future job. 

3. Use a minimum of one cited reference. 

Creating Company E-mail/WIFI/Internet Use Policies

Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Requirements:

– 2 pages

– No plagiarism 

Impact of IT week 2

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to three of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) 

Please write 350 words essay.