Do not create new permanent tables. I must be able to run your code using the three assigned tables
ET Wk 13 -s
275 words——-
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.
Read Course Textbook: Chapter 17
M. Ioannou, E. Stavrou and M. Bada, “Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication and coordination,” 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, United Kingdom, 2019, pp. 1-4.
M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, “A Study on Security Awareness in Mobile Devices,” 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, pp. 1-6.
Exp19_Excel_AppCapstone_IntroAssessment_Travel
Exp19_Excel_AppCapstone_IntroAssessment_Travel
Exp19_Excel_AppCapstone_IntroAssessment_Travel
Project Description:
You are considering several cities for a vacation. In particular, you are interested in Washington DC, Philadelphia, and Boston. You will format a list of memorials in DC, add Sparklines to compare the number of visitors over a 15-year period, and create a bar chart to illustrate annual visitors at each memorial. In addition, you will create a table of sightseeing locations, sort and filter the data, apply conditional formatting, and add a total row to display average time needed to spend at each memorial. Finally, you will complete a worksheet by adding formulas to compare estimated major expenses for each city.
Start Excel. Download and open the file named Exp19_Excel_AppCapstone_IntroAssessment_ Travel.xlsx. Grader has automatically added your last name to the beginning of the filename.
On the DC sheet, check the spelling and correct all misspelled words.
On the DC worksheet, select the range A4:G4, wrap the text, apply Center alignment, and apply Blue, Accent 5, Lighter 60% fill color.
On the DC worksheet, merge and center the title in the range A1:G1. Apply Blue, Accent5 cell style and bold to the title.
On the DC worksheet, change the width of column A to 34.
On the DC worksheet, select the range C5:F10 and insert Line Sparklines in the range G5:G10.
On the DC worksheet, select the range G5:G10, display the high point sparkline marker, and change the color of the high point markers to Dark Red.
On the DC worksheet, select the range G5:G10, apply Same for All Sparklines for both the vertical axis minimum and maximum values.
On the DC worksheet, select the ranges A4:A10 and C4:F10 and create a clustered bar chart. Apply the Monochromatic Palette 12 chart color. Apply the gradient fill to the chart area. Do not change the default gradient options.
Cut the chart and paste it in cell A13. Change the chart height to 6″ and the chart width to 7″. Add Alt Text The bar chart shows the number of visitors to each memorial for the years 2002, 2007, 2012, and 2017.
Change the chart title to Annual Visitors. Apply Blue, Accent 5, Darker 25% font color to the chart title and category axis labels. Change the value axis display units to Millions. Add Primary Minor Vertical gridlines to the chart.
Apply data labels to the outside end of the 2017 data series. Apply Number format with 1 decimal place to the data labels.
On the Places sheet, find all occurrences of BOS and replace them with Boston.
On the Places sheet tab, convert the data to a table, assign the table name Tourist_Attractions, and apply Blue, Table Style Medium 2.
On the Places sheet, freeze the top row.
On the Places worksheet, sort the data by City in alphabetical order and then within City, sort by Sightseeing Locations in alphabetical order.
On the Places worksheet, add a total row to display the average of the Time Needed column. Apply Number format with zero decimal places to the total.
On the Places worksheet, select the values in the Time Needed column and apply conditional formatting to highlight cells containing values greater than 60 with Light Red Fill.
On the Places worksheet, apply a filter to display only fees that are less than or equal to $10.
On the Cities worksheet, click cell F4 and enter a formula that will subtract the Departure Date (B1) from the Return Date (B2) and then multiply the result by the Rental Car per Day value (F3).
On the Cities worksheet, click cell E13. Depending on the city, you will either take a shuttle to/from the airport or rent a car. Insert an IF function that compares to see if Yes or No is located in the Rental Car? Column for a city. If the city contains No, display the value in cell F2. If the city contains Yes, display the value in the Rental Car Total (F4). Copy the function from cell E13 and use the Paste Formulas option to copy the function to the range E14:E18 without removing the border in cell E18.
On the Cities worksheet, click cell F13. The lodging is based on a multiplier by City Type. Some cities are more expensive than others. Insert a VLOOKUP function that looks up the City Type (B13), compares it to the City/COL range (A7:B10), and returns the COL percentage. Then multiply the result of the lookup function by the Total Base Lodging (B5) to get the estimated lodging for the first city. Copy the function from cell F13 and use the Paste Formulas option to copy the function to the range F14:F18 without removing the border in cell F18.
On the Cities worksheet, click cell H13 and enter the function that calculates the total costs for the first city, including airfare, shuttle or rental, lodging, and meals. Copy the function in cell H13 and use the Paste Formulas option to copy the function to the range H14:H18 without removing the border in cell H18.
On the Cities worksheet, select the range E14:H18 and apply Comma Style with zero decimal places. Select the range E13:H13 and apply Accounting Number format with zero decimal places.
On the Cities worksheet, in cell I2, enter a function that will calculate the average total cost per city. In cell I3, enter a function that will identify the lowest total cost. In cell I4 enter a function that will return the highest total cost.
Group the three worksheets and create a footer with Exploring Series on the left side, the sheet tab code in the center, and the file name code on the right side.
On the Cities worksheet, select Landscape orientation, set a 1″ top margin, and center the worksheet data horizontally on the page.
Save and close Exp19_Excel_AppCapstone_IntroAssessment_Travel.xlsx. Exit Excel. Submit the file as directed.
Mobile -9B
Submit the CPP files for
LastNameW9A1.cpp
LastNameW9A2.cpp
The instructions
operating system vulnerability (windows and linux)
what to do
- Security Assessment Report (SAR): T
- 8 set PowerPoint
- Explain the user’s role in an OS.
- Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
- Describe the embedded OS.
- Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture.
- explain Windows vulnerabilities and Linux vulnerabilities;
- explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices;
- explain the motives and methods for intrusion of the MS and Linux operating systems;
- explain the types of security awareness technologies, such as intrusion detection and intrusion prevention systems;
- describe how and why different corporate and government systems are targets; and
- describe different types of intrusions such as SQL PL/SQL, XML, and other injections.
database management.
For each one of the tables, list columns, data types, column restrictions, column descriptions.
please i need help with this assignment. i need description of the ER diagram below (i have attached screenshot) . please help.
risk management plans
Create a partial draft of the risk management plan. To do so, follow these steps:
- Research risk management plans.
- Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
- Write an introduction to the plan by explaining its purpose and importance.
- Define the scope and boundaries of the plan.
- Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
- Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
- Develop a proposed schedule for the risk management planning process.
- Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.
APA format
4 pages
2 discussions
Discussion 1 – 2 pages (PFA)
Discussion 2 – 2 pages (PFA)
SE492 week 9 Di
When responding to classmates please MENTION THEIR NAME.
Please take a few minutes and check the discussion board to respond to peer OR my comments/queries,
Comments to 2 classmates must be of substance; not just “I agree” or “Good Post.” The purpose of the responses is to convert the discussion forum into a quality learning environment through which you improve your knowledge and understanding of the subject matter.
Discussion Topic
Chapter 10
1. Describe why a project manager needs good verbal and written communication skills.
2. What is meant by the term interpersonal skills? Give some examples of interpersonal skills and explain why they are important.
ü Students should avoid using phrases like, “In my opinion,” or “I think,” or “I believe.” To support your response post to the weekly discussion question
students are required to provide at least one supporting reference.
Write a 4-5 page paper (deliverable length does not include the title and reference pages)
- Describe the challenges of securing information
- Define information security and explain why it is important
- Identify the types of attackers that are common today
- Describe attacks and defenses