Linux bash shell script

 

Write a Linux bash shell script that should take an IP address as an argument from the command line and ping to that address. The script should output the result of the ping as either reachable or unreachable depending on the result of the ping. Two example outputs of the script may look like as below. Take the screen shot of the script itself and the outputs of the running script for 8.8.8.8 and 23.23.23.21 to submit.

 

————1——

$ ./yourname_script.sh 8.8.8.8

The IP address 8.8.8.8 is reachable

—————2————-

$ ./yourname_script.sh 23.23.23.21

The IP address 23.23.23.21 is not reachable

OE W 6 A

  

· Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization. 

· Chapter 10 – Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude? 

(Information Technology and Organizational Learning)

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

focus on the social and organizational issues

Discussion: This week we focus on the social and organizational issues that exist with better understanding why changes occurs.  This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Physical Security

 

 Topic: Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend.  

Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission. 

Encryption Algorithms

 1 page discussion 

  • As the cybersecurity specialist in HU Investment Firm, you are responsible for the security of the system. Identify one encryption algorithm that you believe will meet the requirement of improving the security posture with encryption algorithms.
  • Explain exactly how you would incorporate this into the security structure of this company.
  • Identify and explain the associated costs for the identified encryption algorithm. Take into consideration the procurement costs, i.e. software / licensing, implementation, configuring, and updating. 

bash scripting, knowledge on linux

 

Hi, do you have skills about bash scripting, knowledge on linux?

It is not an assignment it’s an exam preparation, I want an expert answer about it

because I have the actual exam on Wednesday. Let me know if you really have skills with coding because I’m struggling in this class and I need help for live exam on Wednesday because it is open book exam but timed 90 minutes. If you do live session let me know I really can compensate you big if you can do that. I’ll give you $10 for this preparation exam.

Cloud Computing

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Physical Security

 

Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.