Assignment

Easily visibility for security(intruders will be deferred to walk through it) actual college buildings and classrooms: Finger Print for student specific to that college building.

Need 3 pages on Finger print access for students to college building

Network diagram

Network Security

 

  1. Objectives
  • To practice the formal procedure of system/network security analysis and planning.
  • To examine the vulnerability and security needs of a private organization.
  • To devise strategies to overcome potential malicious attacks, threats, and risks.
  1. Target Network

You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent. 

Network diagram

The network specifically contains:

  • 2-Switches
  • 1-Web/FTP server with Linux operating system using port 80 and port 21
  • 1-Email Server with Exchange 2010 using port 25
  • 2-Active Directory Domain Controllers (DC) with Windows Server 2016 operating system
  • 2-Domain Name Service (DNS) Servers with Windows Server 2016 operating system
  • 2-Windows file servers using port 21
  • 3-Wireless Access Points (WAP) encrypted with WEP protocol.
  • 100 – Desktop/Laptop computers with Windows 10 operating system
  • 2- Multifunction printers (print, copy, scan, fax)
  • 1- Voice Over IP (VOIP) telephone system with 100 IP phones

The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin.  A single security guard is located on the second floor of the building.  The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees.  The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.

  1. Assignment Details

The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.

Write a four to six (4-6) page paper in which you:

  • Analyze five (5) or more specific potential malicious attacks and/or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the five (5) or more selected malicious attacks.
  • Propose at least nine (9) – 3 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected potential malicious attacks.
  • Analyze three (3) or more potential risks for data loss and data theft that may exist in the documented network and applications.
  • Explain in detail the potential impact of the three (3) or more selected risks for data loss and data theft.
  • Propose at least three (3) – 1 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected risks for data loss and data theft.
  • List and provide a product overview of only two (2) alternatives for each logical/technical security control for both data loss/theft and malicious attacks. Include web links to the products and why those products should be considered.

Expectations

  • Use at least five credible and quality resources. Your external resources should not be more than two to three (2-3) years old.

Note: Wikipedia and similar websites do not constitute as credible and quality resources.

  • Single Word document
  • Double spaced
  • Times New Roman, size 12 font
  • One-inch margin on all sides
  • Citations and references must follow APA format
  • Include a cover page containing:
    • Title of the assignment
    • Student’s name
    • Professor’s name
    • Course title
    • Assignment due date

Note: The cover page and reference page are not included in the assignment page length requirement.

Database management

I will send the picture of the ER diagram for reference, to come up with the queries.!

Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:  

 In about 2 lines, explain what the query returns. 

Queries: 

 1 trivial query. Simple select with ordering.
 2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.  
 1 query that uses subquery.
 2 queries that uses join (1 inner join, 1 left or right outer join).
 1 view (query must use join – hint: you can use one of the queries from the
previous question).
 1 query that uses union.
 1 custom stored function.
 1 custom stored procedure. 

ij.start canon

 

ij.start canon is a platform for getting the canon printer driver . You can easily download the driver according to your model as ij.start.canon is designed with a user-friendly interface. Ij.start.canon , Https //ij.start.cannon

 

Canon IJ Network Tool is a toolkit software with the options to keep a check on most of your Canon printer network settings and adjust them according to your requirements. Canon.com/ijsetup offers the Printer Setup download link where you can install the printer setup further. 

Urgent 2

 

Case Study
LH Medical Company (LHM)
LHM is a London based privately owned hospital which provides healthcare to its patients. The hospital uses in-house software to manage and service its patients which they refer to as clients. It is an expanding venture and needs to accommodate for processing its information globally. The practice management system is web enabled and multi-platform for connectivity via web services, in addition it has connectivity to existing legacy systems. An enterprise document management system ensures patient documents are replicated globally and available per demand.
In addition to medical treatments, medicine and drugs, consultation and vaccinations are offered to its patients (with a variable additional fee) the company offers medical instruments to other companies either to purchase or to lease. LHM records the details of its clients with possibly their full medical history in their computer system. When a new patient requests an appointment (walk-in or on-line) a treatment course begins and a practitioner is allocated to the patient. A full history and previous medical records are printed showing different categories of Treatments during different time intervals. Analyses are drawn in terms of any possible allergies and previous histories. Treatments may involve many surgeons and consultants depending on its complexity.
The contact practitioner is responsible for estimating the costs of treatments that is agreed by the client at the start of the treatment. The duration of the treatment may be set at any time duration and may also be changed during the treatment depending on the complexity of possible operations. The final cost and completion date are recorded at the end of the treatment.
During a treatment process notifications may be sent to patients and other practitioners.
Repeat prescriptions may automatically be produced by the system if appropriate and are available for collection at any surgery by the patient. At any time a practitioner may suspend or cancel the prescriptions. The cost for a treatment is paid for by the client or an insurance policy provided by a number of insurers. Insurance policies may have additional surcharges and costing depending on treatment types and medicines. Long term treatment courses may be edited or cancelled by practitioners or clients. To re-start an existing treatment an additional fee is applied.
LHM may receive requests for specialise treatments from other hospitals or they may refer clients to other medical centres.
Each treatment course or service may include one or more of the following items:
• Operations and vaccinations
• Consultations and check-up
• Medicine and different types of tablets
• Clinical reports and attached documents and history
• Prescriptions and repeat Prescriptions
Payments by clients may be in full or part payments to cover a range of medical and non-medical services offered by the company. Payments may include possible applied surcharges for late payments and or special discounts for long term treatments. Tax allocations may also vary from one treatment item to another. Payments have to accommodate for price changes for medicines and medical services and track price changes for drugs purchased from pharmaceutical companies.
A treatment course comprising services from other hospitals carry additional changes set by the medical service providers. A full list of Treatment courses with corresponding payments may be requested by the site manager at any time. Clients’ outstanding balances may be retrieved at any time for current treatment and services indicating the payments for the treatment course.
Task Detail
This assignment is accompanied with a case study describing a high level system specification for an application. You are required to provide UML models for ONLY ONE appropriate use case. Your selected use case must be agreed by your module tutor.
Task 1
Develop a Use case model with one use case. As part of your answer produce the use case description and use case scenario.
Produce a Class diagram and domain model with appropriate refactoring and abstraction, related to the selected use case. As part of your model, produce a system class with clear set of public methods.
Produce a Sequence Diagram for the selected use case. Include possible guards, iteration, and message operations in your diagram. 
Task 2
Incorporate OCL to represent the business logic, rules and constraints for the selected use case. As part of your solution include the correct syntax for pre and post conditions, navigation, and multiplicities. 
Task 3
Produce a Component model with associated interface methods. As part of your model, illustrate various possible component composition and discuss the significance of your design. 
Task 4
Produce a software architectural design and associated interface methods. Discuss coupling and cohesion aspects of your design.
Task 5
Enhance your class diagram given as part of Task1 to contain the Mediator design pattern. Illustrate and discuss how your model can be extended with the observer pattern.

Caped Crusaders Inc

  

Caped Crusaders Inc.

The Super Heroes of the comic world have united in an organization to save the world from villains (some who also possess super powers). You are charged with keeping track of things in this comic world. Your database will contain the information presented below.

  

Table: tblSuperheroes

Table: tblArrests

Table: tblVillains

 

Super Hero ID (autonumber)

Arrest ID (autonumber)

Villain ID (autonumber)

 

Super Hero, Secret Identity (text)

Super Hero ID (foreign key)

Villain, Secret Identity

 

Last Name

Villain ID number (foreign key)

Villain, home planet

 

First Name

Date of Crime (Date/Time with input mask)

Primary Characteristic (what is their special power?)

 

Super Hero, Home Planet

Arrest Date (Date/Time with input mask)

Strength Rating

 

Primary characteristic, other than flying. (What is the character’s special power?)

Fine Charged (Should be more than largest Hero’s charge;   currency)

 

Indicator if the Hero can fly (Yes/No)

Indicator if fine was paid. (Yes/No)

 

Strength Rating. (1-10 with 10 being the strongest)

 

Fee Hero Charges to make arrests (currency)

Step by Step Description:

1. Use all naming conventions discussed in this course.

2. Set the database to compact on close. 

3. Create three tables as per specifications below.

4. Set table relationships and referential integrity (including cascade update and cascade delete if applicable)

5. Enter data into the tables

a. Create a minimum of eight super heroes in your database

b. Create at least ten villains

You may use existing characters from comic books or invent your own. Some villains should have a record indicating multiple arrests and some of the super heroes should have more than one arrest to their credit. At least one super hero should have NO arrests. Some of the fines will and others will not be paid.

c. Create a minimum of 15 arrests. Most super heroes should have arrests but at least one super hero should not have an arrest. 

6. Create Queries

§ A query that computes the strength quotient for each arrest. Name this query: qryQuotient.

The strength quotient = hero’s strength rating divided by the villain’s strength rating.

§ A query that lists the sum of all of the fines collected, grouped by each superhero. Name this query: qryHeroFines

7. Create the following forms:

§ One that allows you to enter a new hero. Name this form: frmNewHero

§ One to enter a new villain. Name this form: frmNewVillain

§ One to enter a new arrest record. This last form assumes that the superhero and villain are already listed in the database. Name this form: frmNewArrest

§ Create a form that lists the superhero and identity that is sorted by the hero’s last name. This form should contain a subform that lists all of the arrests made by that hero with the name(s) of the villain, date(s) of arrest and fine(s). Any hero that has no arrests should not appear in this form. Name this form: frmFinesFromHero. Name the subform: fsubArrests.

8. Create the following Reports:

§ One that lists all of the arrests and the fines that have been levied. Make sure to include the hero and villain names Name this report: rptArrests

§ One that lists the heroes who can fly. Name this report: rptFly

§ One that shows the total amount (one number) fined for all arrests. Name this report: rptTotalFines

§ One that gives the total outstanding amount (not paid by the villains) by each villian. Name this report: rptOutstanding

§ One that lists all of the arrests with the villains that involved a strength quotient that was less than one. Name this report: rptStrength

 

9. Include at least one graphic in your database on one or more of your forms.
 

threat modeling

 

By the end of this week, you should be able to:

  • Describe threat modeling
  • Identify several security models
  • Explain public key infrastructure

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Internet Privacy

Freedom and security are not always compatible. Discuss what you have learned about privacy, or the lack thereof, in today’s technology. Is privacy at a comfortable level in general for you? Is it possible to have a privacy level you’re comfortable with considering the threats that exist on the internet and elsewhere? 

Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll

  

Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll

Excel Chapter 2 Mid-Level 1 – Metropolitan Zoo 

Exp19 Excel Ch02 ML1 Metropolitan Zoo Gift Shop Weekly Payroll

  

Project Description:

As manager of the gift shop at the Metropolitan Zoo, you are responsible for managing the weekly payroll. Your assistant developed a partial worksheet, but you need to enter the formulas to calculate the regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay. In addition, you want to include total pay columns and calculate some basic statistics. As you construct formulas, make sure you use absolute and relative cell references correctly in formulas 

     

Start Excel. Download   and open the file named Exp19_Excel_Ch02_ML1_Payroll.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Use IF functions to   calculate the regular pay and overtime pay based on a regular 40-hour   workweek in cells E5 and F5. Pay overtime only for overtime hours. In cell   G5, calculate the gross pay based on the regular and overtime pay. Abram’s   regular pay is $398. With 8 overtime hours, Abram’s overtime pay is $119.40.

 

Create a formula in   cell H5 to calculate the taxable pay. Multiply the number of dependents   (column B) by the deduction per dependent (B24) and subtract that from the   gross pay. With two dependents, Abram’s taxable pay is $417.40.

 

Use a VLOOKUP   function in cell I5 to identify and calculate the federal withholding tax.   Use the tax rates from the range D21:E25. The VLOOKUP function returns the   applicable tax rate, which you must then multiply by the taxable pay.

 

Calculate FICA in   cell J5 based on gross pay and the FICA rate (cell B23), and calculate the   net pay in cell K5. Copy all formulas down their respective columns to row   16.

 

With the range E5:K16   selected, use Quick Analysis tools to calculate the total regular pay, overtime   pay, gross pay, taxable pay, withholding tax, FICA, and net pay on row 17.
 

  Note, Mac users, with the range selected, on the Home tab, in the Editing   group, click AutoSum.

 

Apply Accounting Number   Format to the range C5:C16. Apply Accounting Number Format to the first row   of monetary data and to the total row. Apply the Comma style to the monetary   values for the other employees. Apply the Total cell styles format to the   range E17:K17.

 

Insert appropriate   functions to calculate the average, highest, and lowest values in the Summary   Statistics area (the range I21:K23) of the worksheet. Format the # of hours   calculations as Number format with one decimal and the remaining calculations   with Accounting number format.

 

Insert a footer with   your name on the left side, the sheet name code in the center, and the file   name code on the right side of the worksheet.

 

Save and close the   workbook. Submit the file as directed.