Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Fireboy and Watergirl: Online on the App Store

Fireboy and Watergirl are an exciting series of adventure games developed by Oslo Albet and Jan Villanueva. 

Fire, Water, Forest, Ice, Light, Wind, and Crystal, seven brand new temples for the official Fireboy and Watergirl series. 

In each temple the boy and girl must run and jump between fire and water, you should know that Fireboy is immune to fire, so he can step freely in pools of boiling lava, but he must be careful from stepping into the water. 

Watergirl is resistant to pools of water but gets hurt when stepping in the lava. 

Let us join with two main characters on the journey to remote, dangerous temples, to seek unimaginable wealth. 

The temple is full of sparkling diamonds waiting to be discovered only by the bravest. 

Solve the puzzles, beat the times, and collect all the diamonds! 

What are you waiting for? 

Update Fireboy and Watergirl full series.

Use the W-A-S-D keys to control the Watergirl.

Use the Arrow keys to control the Fireboy.

Organ Leader and Decision Making

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Tracking movement of a car with vuejs

 logistics company is trying to improve it’s tracking page to ensure it’s

effective to their clients while monitoring their deliveries .

1. Assuming you receive the following locations from the partner app after 5

seconds .

-1.298982, 36.776811

-1.297459, 36.776747

-1.296193, 36.776726

-1.296097, 36.779236

-1.296151, 36.777637

-1.296215, 36.776693

-1.294252, 36.776586

-1.294048, 36.776790

-1.293973, 36.779118

-1.292622, 36.779075

-1.291844, 36.779049

Animate the ​ driver A​ movement from the first to last location on the Tracking Page

2. Add an info window above the rider image to show ​ driver’s A name and current

locations (use coordinate values).

3. Consider a scenario where ​ driver A whose at coordinate (-1.300355, 36.773850)

initially confirms a delivery and as from the tracking page the driver icon is seen

based on his current position . ​ Driver A later cancels the order 15 seconds later

after confirmation since the client was unreachable , the icon then disappears (as

from the Tracking Page) . The order is then dispatched and confirmed by ​ driver B

whose coordinate (-1.291879, 36.778389) 10 seconds later after it was cancelled .

Driver’s B​ icon based on the current position now appears on the Tracking Page.

Show this transition on the tracking page .

Consider the following :

The application should be web based .

Driver Image ​ https://images.sendyit.com/web_platform/vendor_type/top/2.svg

Tools :

Use the Vue.js Framework (highly recommended) or any Javascript based Frameworks

Comparison Outline

Software engineering tools for soft computing: MATLAB, R Tool and DTREG. Comparison should focus on how they are able to model neural networks. Also, pick criteria that compares things they all have in common. 

week 2 group discussion

  400 words

This assignment should be in APA format and have to include at least two references.

What happens when we place the authentication system in our demilitarized zone (DMZ)—that is, in the layer closest to the Internet? What do we have to do to protect the authentication system? Does this placement facilitate authentication in some way? How about if we move the

authentication system to a tier behind the DMZ, thus, a more trusted zone? What are the implications of doing so for authentication performance? For security? 

Enterprise Risk Management – Research Paper

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Ethical Hacking week 2

 

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length.