bswa week13 p13 final

Hello,

i need this paper by 4/22 afternoon 12am.

Strictly No plagiarism please use your own words.

Week 13. Submit – Topic:PHISHING CYBERCRIME.

what i initially gave description to professor :

PHISHING

Phishing is a cyber-crime conducted by fraudsters to obtain sensitive information such as

bank account numbers, passwords or PIN. Their intentions to get such information is for the sole

purpose of scamming the victim. As the criminal masquerades as legit organizations an individual

is affiliated to, they can trick a person into releasing sensitive information. My research is based on

how to detect and distinguish attacks instigated on the email platform. The study aims to identify

the different techniques employed by scammers to obtain personal information from victims. The

formulated hypothesis statement is ‘an email that prompts an individual to verify account

information by inputting both account number and pin combination is phishing’

please write 700 word explaining about above requested topic, double spaced, written in APA format, showing sources and a bibliography.

And

12 slides power point presentation on PHISHING CYBERCRIME.

reference :

 https://www.youtube.com/watch?v=-JcgRyJUfZM

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

INT1550

Answer in your own words  questions in the  attach document.

no citation.

Semester Project Company

 

This assignment continues your work towards your Semester Project. Now that you have seen what the Internet offers in the way of templates for security policies, you will need to provide a basic background for the organization and its network that you want to model your Security Policy for. This is typically step one for any professional developing such a document, but since this would most likely be the first time you’ve ever done this and there’s no existing organization to analyze, you need to start somewhere. So for this assignment, do the following:

– The general description of your organization (think about organizations other than IT organizations; i.e. non-profits in your geographic area, healthcare businesses, retail businesses, manufacturing businesses, etc.) You will be writing a security policy for this business. Picking a non-profit might be a nice idea. It gets you involved in your community.

P.s: a U.S. company is recommended for this assignment

PRACTICLE CONNECTION

  SUBJECT     ITS530 – M50 Analyzing & Visualizing Data  

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Topic Draft

Topic: Adoption of Blockchain in Healthcare

In a minimum 5-pages, 

develop an introduction where you clearly explain the overall research topic, 

literature gathering process,

and the scope and organization of the literature review.

The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.

Need Strong APA 7 with references.

Assignment 7.1 [95 points]

  

Assignment 7.1 [95 points]

This program will ask the user to answer a series of arithmetic problems and report on how the user performs. You will write this program in phases as specified below. Make sure that each phase works correctly and uses good style before progressing to the following phase.

Note that the purpose of this assignment is to give you lots of practice with parameter passing without making you write a huge program. For this reason I have provided a structure diagram at the end of this document. Make sure that you adhere to the structure diagram carefully.

Turn in only your final product.

Phase 1: Your main function for phase I must look exactly like this:

int main()

{

srand(time(0)); 

doOneSet();

}

You must write the function doOneSet which will, for now, write out 5 addition problems. All of the numbers printed should be between 0 and 100, inclusive. Here is a sample output for this phase:

45 + 21 =

0 + 100 = 

54 + 23 = 

4 + 19 =

18 + 92 =

The numbers that are produced for these problems must be generated randomly by the computer. The numbers in the sample output are given only as an example. Refer to lesson 7.3 for more information about generating random numbers.

Phase 2: Change your doOneSet function so that instead of just writing out the problems it also allows the user to enter an answer, and then tells the user whether the answer was correct or not. Do not change your main function. Here is the sample output for this phase (user input is indicated here by using bold font. It won’t be bold in your own output):

45 + 21 = 66

correct

0 + 100 = 100 

correct 

54 + 23 = 67

incorrect

4 + 19 = 13

incorrect

18 + 92 = 110

correct

Before you move on to phase 3, refer to the structure diagram at the end of this document and make sure that you have adhered to it for all of the functions indicated there for phase 2. This will probably mean dividing your doOneSet function up into functions, if you haven’t done it already.

Phase 3: Now you will change your doOneSet function so that it will work for either addition, subtraction, or multiplication. For the purposes of this assignment, a set of problems is defined to be a group of problems that are all of the same type (all addition, all subtraction, or all multiplication). After completing this phase your program will give 5 addition problems, 5 subtraction problems, and 5 multiplication problems, for a total of 15 problems. Your main function must look exactly like this:

Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Rainbow Table

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

Compliance Audit

 

It is essential as a cybersecurity professional to have a complete understanding of how a compliance audit is conducted and documented because organizational sustainability often depends on the adequate assessment of information security and privacy management.Using the GCU Virtualization Environment, build either a Windows or Linux server. Then, search the web for technical controls related to HIPAA.Break the technical controls down into technical requirements appropriate for your virtual server with Pass/Fail criteria.Audit the virtual server and report if compliant or not.Once compliance testing has been completed, draft a certification letter for your client or organization highlighting the applicable controls tested along with the compliance model used. 

Refer to the “HIPAA Security Audit Certification Document,” located within the Required Readings, as an example.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-630 Compliance Audit Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopeWrite.