Assignment 3

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.

InfoTech in a Global Economy. Review of the article

InfoTech in a Global Economy (ITS 832)

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use Google Scholar to find these types of articles ( https://scholar.google.com/ ) Once you find the article, you will read it and write a review of it.  This is considered a research article review.

discussion

Discuss the importance of code reviews in the software development process as it relates to developing secure software. Explain what code reviews are, who participates, and how such reviews directly impact security. 

Summary for Chapter 1 and 2

 Book name: The Myth of Post Racialism in TV news by Lewis

Chapter 1: Professionalizing and Palatable “Blackness”

Chapter 2: Branding and Marketing “Blackness”

Cornell Notes #

Main Ideas:   review, clarify & synthesize notes to just the main points/most   important aspects 

Summary: A brief breakdown   of the notes from the right column which includes an analysis of what you   read and your own ideas about the theories, concepts, and/or points   made. The summary must be at least one   paragraph.

 

 

500 Words Essay

 

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Please do not submit attachments unless requested.

ITIL Organizational Baseline

 

Company Description

Tech Lopes delivers expert level IT support. We handle both software and hardware issues, as well as general maintenance and IT consultation. We have IT experts ready to provide assistance and results on data recovery, hardware repair, virus removal, and general IT support. We work with all brands of computers, smartphones and tablets in relation to both hardware and software.

Mission

Our mission is to provide fast, expert level IT Support and educate our customers on simple IT solutions.

Vision:

Our vision is to become the most reliable IT Support Company for consumers, and small businesses. 

Target Market

  • Small to Medium Local Business
    • Newly established
  • Highschool / College Students
  • Elderly Personale

Business Strategy

Short Term Goals:

  1. Establish a business client list.
    1. Local business that contract with Tech Lopes to handle IT design, maintenance, and upgrades to systems and networks.
  2. Build system of teams to handle different types of IT issues, customer support, and handle business contracts with clients. 

Long Term Goals:

  1. Provide affordable IT Support to individuals.
  2. Maintain long term IT Contracts with local business and organizations.
    1. Medium business.
    2. Public and Private schools.
    3. Non-profit Organizations.
  3. Develop a system for educating customers to handle the simple IT fixes, and empower clients to provide their own IT solutions.   

QUESTION TO ANSWER

Describe how ITIL’s five core volumes establish a baseline for your organization. Use the following outline. For each section use the heading provided and address each bulleted point.

Introduction 

· Define ITIL, its phases, and benefits.

ITIL Service Strategy

· Describe your organization’s objectives and customer needs. 

ITIL Service Design

· Turn your service strategy into a plan for delivering the business objectives.

ITIL Service Transition

· Develop and improve capabilities for introducing new services into supported environments.

ITIL Service Operation

· Describe how your organization manages services in supported environments.

ITIL Continual Service Improvement

· Describe how your organization will achieve incremental and large-scale improvements.

Access_Ch01_Cap – Loan Lending Management 1.0

 Access_Ch01_Cap – Loan Lending Management 1.0

In the following project, you will open a database containing the records of small loans from a lending firm, work with a form in which to store loan officer information, add records, and sort tables. You add a record using a form and print a report. You apply a filter by selection to a query and a filter by form to a table and save the results for both filters.

Start   Access. Open the downloaded Access file named   Exp19_Access_Ch01_Cap_Loan_Lending_Management.accdb. Grader has automatically added   your last name to the beginning of the filename.

You update a table to contain the data for the Loan Officers,   so that each of the loans processed can be associated with a staff member.
 

  Open the Loan Officers table in Datasheet view. Add the following records to   the Loan Officers table:

FirstName

LastName

EmailAddress

PhoneExtension

Title

John

Badman

[email protected]

x1757

Loan Officer

Stan

Dupp

[email protected]

x6720

Senior Loan Officer

Herb

Avore

[email protected]

x2487

Loan Officer

Polly

Esther

[email protected]

x8116

Senior Loan Officer

Strawberry

Fields

[email protected]

x3219

Loan Officer

Ann

Cerdifone

[email protected]

x5962

Managing Loan Officer

Close the table.

You’ll now add information to   the Loans table for the most recent loan that the firm processed.
 

  OfficerID: 5
  MemberID: 15
  LoanAmount: 7000
  Term: 36   months
  InterestRate: 15.41
  Payment: 244.07
  Grade: D
  IssueDate: 12/15/2018
  LoanStatus: Late (31-120 days)

You would prefer for the Loan data be presented in order of issue   date with the most recent loans listed first.
 

Sort the records in the   Loans table by the IssueDate field in descending order (newest to oldest).   Save and close the table.

Next you will use the Maintain   Members form to add another loan that was processed for one of the firm’s   members.
 

  Open the Maintain Members form. In record 3 (for Brynn Anderson, MemberID 13), add a new loan to the subform:
 

  OfficerID: 5
  LoanAmount: 17000
  Term: 36   months
  InterestRate: 4.35
  Payment: 300.45
  Grade: B
  IssueDate: 9/1/2018
  LoanStatus: Fully Paid

When you need to navigate to a   record quickly, without a large number of clicks with your mouse, you can   search specific information in the Search field of the Navigation bar at the   bottom of the window. In this case, you are interested in adjusting   information for the author with an MemberID of 16 (Tyler Fletcher).
 

  Use the Navigation bar to search for MemberID 16, and then edit the subform so that the   InterestRate is 12.54 instead of .1899 for   the loan with LoanID 47. Close the Maintain Members form.

Reports are   used to neatly organize table data or query results into a document for   presentation to co-workers and/or supervisors. In this case, you are   interested in confirming that the report you created based on the Loans,   Officers, and Members query is reflecting the appropriate information before   sending it to your supervisor.
 

  Open the Loans, Officers, and Members report and check that the report shows   five loans listing Fully Paid as   Loan Status. View the layout of the report in Print Preview. Close the Loans,   Officers, and Members report. Open the Loans, Officers, and Members query.   Sort the query by LoanOfficer field in ascending order.

You are interested in quickly   filtering the data in the Loans, Officers, and Members query based on loan   officer. Filtering by selection allows you to select your filtering criteria   and apply it to the data. In this case, you would like to see only the loans   managed by John Badman.
 

  Use filter by selection to show only the loans managed by the loan officer   whose name is John Badman.

Sorting allows you to display   data in various ways including alphabetically (A-Z & Z-A), in ascending   order, in descending order, newest to oldest etc. You want to display the   query results alphabetically by LoanStatus.
 

  Sort the query by LoanStatus in alphabetical order. Save and close the query.

Now, you are interested in   quickly filtering the data in the Loans table based on two different fields.   Filtering by form allows you to enter your filtering criteria into a form   that is then applied to the data.
 

  Open the Loans table. Use Filter by Form to create a filter that will   identify all loans with a term of 36   months that also have an interest rate less than .11. Apply the filter and preview   the filtered table. Close the table and save the changes.

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

dataset

Question: Add the functionality of adding a dataset to another dataset. Essentially, using this functionality, one would able to add all data of one dataset to another dataset and use it. It would have one argument of type class dataset and no return value as it adds the parameter dataset’s value to self’s dataset.

For this question, the bottom line is that the below cell should work.

# Do not change this cell

print(len(txt_data))

csv_data.append_dataset(txt_data)

print(len(csv_data)) 

You have to decide where this function would go from the above three classes and implement it.

—– Other Classes —–

#Implement dataset class in this cell

class dataset:

    def __init__(self):

        self.list = []

    def __getitem__(self, index):

        if (len(self.list) > index):

            return (self.list[index])

        else:

            return None

    def __len__ (self):

        return len(self.list)

    def append_data(self, item):

        return self.list.append(item)

    pass

# Implement txt_dataset class in this cell

class txt_dataset(dataset):

    def __init__(self,filename,splitter,encoding):

        super().__init__()

        self.append_file(filename,splitter,encoding)

    def append_file(self,filename,splitter,encoding):

        file=open(filename,encoding=’utf8′)

        line=file.readline()

        while line:

            self.append_data(tuple(line.split(splitter)))

            line=file.readline()

    pass   

# Implement csv_dataset in this cell

import csv

class csv_dataset(dataset):

    def __init__(self,filename,splitter,encoding):

        super().__init__()

        file=open(filename,encoding=’utf8′)

        reader = csv.reader(filename, delimiter=’;’)

        for line in file:

            data_value=line.split(splitter)

            super().append_data(tuple(data_value)) 

      def append_file(self,filename,splitter,encoding):

        reader = csv.reader(filename, delimiter=’;’)

        file = open(filename, encoding=encoding)

        for line in file:

            data_value = line.split(splitter)

            super().append_data(tuple(data_value))

        

Security Architecture and Design Individual Assignment 4

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. Report due by Saturday.

Consider the data flow “octopus,” as shown in Figure 8.1 (see attached). How can the analysis system gather data from all these sources that, presumably, are protected themselves?