Intro to Networking: Assignment 3

Must be one full page. At least (2) APA reference. 100% original work. no plagiarism. Attached is the previous assignment instruction leading to this assignment. Also, attached is the answer that will you for this work.

  • You have completed building out the physical aspect of your network in the new ACME, Inc. facility. Now let’s get it up and running.
  • You will need to provide a plan for how to bring the network online.
    • Note: There are 5 departments moving into the facility
      • Accounts Receivables
      • Accounts Payables
      • Human Resources
      • Legal
      • Outside Sales
  • Your plan should include the following, this is not the entire list.
    • Network Switch Configurations
    • IP Addressing table and assignments/Subnetting strategy
    • Routing Tables (3 minimum routes/remember this is a remote office)
    • Remember to justify your choices
  • All of this should be contained in a Word document

110/s3

What key elements should be involved in a remediation plan and why are they important? Locate a source (other than the links and content of this course) that would assist in developing a remediation plan. Provide a short summary on why this source is beneficial and aspects that you like. If it is a website, post the link to the source in the Webliography. 

R Studio

 Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria.  She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or      NY?  Done
  2. Is the crime rate higher in FL or NY (Note a low score      in crime means lower crime)?  Done
  3. Is the crime rate higher in lower or higher house price      areas?  Done

Using the R tool, show the data in the tool to answer each of the questions.  Also, show the data visualization to go along with the summary.

  1. If you were Suzie, where would you move based on the      questions above? Done

Need the below done ONLY

  1. After you gave Suzie the answer above (to #4), she gave      you some additional information that you need to consider:
    1. She has $100,000 to put down for the house.
    2. If she moves to NY she will have a job earning       $120,000 per year.
    3. If she moves to FL she will have a job earning $75,000       per year.
    4. She wants to know the following:
      1. On average what location will she be able to pay off        her house first based on average housing prices and income she will        receive?
      2. Where should she move and why?  Please show        graphics and thoroughly explain your answer here based on the new        information provided above.

Note: The screenshots should be copied and pasted and must be legible.  Only upload the word document.  Be sure to answer all of the questions above and number the answers.  Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work.

APA FORMAT references

  1. This assignment was started in class and needs to be completed prior to submission. All submissions MUST be a WORD document – NOT a PDF document. 

    Directions and Grading: 

    APA-7-Compliant Title Page = 40 points

    • REFER to Foundations p. 31 (bottom right number) for perfect sample
    • Use the title “APA-7 Practice with Title and References Pages”
    • APA-7-Compliant References Page = 60 points
    • REFER to Foundations p. 32 for perfect sample
    • REFER to Foundations pp. 33-39 to find the CORRECT formula for EACH article listed below
    • USE THE BELOW ARTICLES: BE SURE TO LOG INTO MY MONROE BEFORE PASTING THESE LINKS

https://www.proquest.com/docview/2713605548

https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression

https://www.who.int/emergencies/situations/monkeypox-outbreak-2022

Programmed Security

 

 

Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.

In 500-700 words, explain defensive scripting and how it works.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Risks associated with web servers Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

The Apache web server is an open source web server that was created in 1995. With very little configuration Apache is able to handle large amounts of traffic and because of open source there are developers continuously working on updates and better functionality. Apache can also be used on multi-platforms. Apache is able to accept and route traffic to certain ports. By default it will run on port 80, but with specific address-port combinations it is able to route ports. Ways to make Apache more secure are through some of the following ways. Disabling the trace HTTP request. By default this is enabled and allow cross-site tracing that could potentially expose your cookie information. Disabling the directory listing will prevent access to the files and sub-directories within the browser. Tools that can be used to secure your Apache server are mod security that is an open source web application first this will provide you with several features designed to protect the server.  

The Microsoft Internet Information Server (IIS) has been in service since Windows Server 2003 and only operates on the Windows operating system. Like Apache you are able to route traffic to other ports. IIS benefits from being popular due to its platform that supports all the Microsoft applications. Some of the features of IIS are Remote management that allows the management of the program via command line interface or union PowerShell. IIS also comes with security features that allows users to manage TLS certificates and allows the user to filter requests that will allow for the traffic of whitelists and blacklists. These are tools that will assist in securing IIS. Disable the OPTIONS Method. The OPTIONS method gives a list of the methods supported by a web server and disabling this ensures that potential attackers won’t be able to access the information. Enable Dynamic IP address restrictions will block access to IP address that go over a certain amount of requests. This can prevent denial of service attacks. 

Reference 

(February 20, 2020). Ultimate guide IIS server: What is IIS? IIS tutorial. DNS stuff. Retrieved from https://www.dnsstuff.com/windows-iis-server-tools

Acunetix (November 5, 2014). Microsoft IIS – 8 Tips for security best practices. Acunetix. Retrieved from https://www.acunetix.com/blog/articles/iis-security-best-practices/

Hernandez, J. (May 8, 2019). What is Apache? In-depth overview of Apache Web Server. Sumo Logic. Retrieved from https://www.sumologic.com/blog/apache-web-server-introduction/

Kumar, C. (June 6, 2019). Apache web server hardening and security guide. Geekflare. Retrieved from https://geekflare.com/apache-web-server-hardening-security/

– VINCENT

RESPONSE 2:

Security on an Apache webserver is only as good based on its configurations.  Along with proper security configuration, it’s important to keep Apache updated with the latest security patches as they become available.  The following are some configuration changes in securing an Apache server:

Securing an Apache webserver should be configured to use only what is required for functionality. Configure on the module required to run functionality and restrict other unnecessary services.  

Run as an unprivileged user:  this refers to locking down the Apache server with minimal permission than necessary.  This would require to set the server as an unprivileged systems user versus root or admin user.

Disabling server-info directive, server signature and server-status Directive to prevent the exposure of server information, such as version, paths, data directories, server performance, HTTP requests and client IPs. 

Setting the ServerToken directive to Prod will direct Apache to a specified name, like Apache in the server response header. This prevent the server from sending server information out when responding to a request.

OpenSSL is one tool I ran into when researching Apache security.  Because Apache does not come with encryption, running OpenSSL with it can provide traffic encryption and public/private key pairs to force all traffic over SSL protocol.

A Microsoft IIS server has similar security configuration recommendations as the Apache.  These include:

Installing and properly configuring only the necessary modules required for functionality and implementing the least privileged rule. As well as enabling Window authentication with extended protection to protect against credential relaying and phishing attacks.

Maintaining an up-to-date anti-virus and security patches.  Also enabling SSL and SSL certificates.     

Web application isolation includes isolating web application pools, ASP.Net temp folders and content and ensure access controls list are configured to allow access as per set permissions.

Claudia 

Acunetix. (2021, March 12). 10 tips for apache security. Retrieved August 03, 2021, from https://www.acunetix.com/blog/articles/10-tips-secure-apache-installation/

The most important steps to take to make an Apache server more secure. (n.d.). Retrieved August 03, 2021, from https://help.dreamhost.com/hc/en-us/articles/226327268-The-most-important-steps-to-take-to-make-an-Apache-server-more-secure

Archiveddocs. (n.d.). Security best practices for iis 8. Retrieved August 03, 2021, from https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/jj635855(v=ws.11)

– CLAUDIA

Perform the following

  

1. a) Perform the following binary subtractions of unsigned binary numbers. Convert your answer to decimal.

2

b) Repeat above but for when the binary numbers are in two’s complement form. Comment on the results. 

2. Add the following additions of unsigned hexadecimal numbers.

Indicate whether or not the sum overflows an 8-bit result.

3. Shown below are the contents of a 16-bit resister. Determine the decimal value represented by the binary number if:

a) the binary number is unsigned

b) the binary number is in two’s complement form. 

4. FIGURE 1 shows how a 3 to 8 line decoder (74138) can be used in conjunction with NAND gate (74133) to connect a set of switches to the data bus of a microprocessor system via buffers

(74367). Answer the following questions relating to the diagram:

a) What address, in HEX, is required on the address bus in order to read the switches? 

b) RD and MEMRQ are control lines from the CPU. What must their logic state be in order to read the switches? 

5. This question refers to the C68MX11 CPU, details of which accompany this assignment.

a) With reference to the block diagram of the CPU, what is the purpose of the CCR? 

b) Again with reference to the block diagram, outline how the processor would add two numbers held in ACC.A and ACC.B the result being stored in memory. Identify the addressing modes that would be employed in this addition. 

c) Give the address range in hex that the PC could access. 

6. Three widely used but quite different processors are Intel & ARM and Atmel’s AVR. 

Briefly contrast the architecture of these processors and how this relates to their application niche. 

1. a) Perform the following binary subtractions of unsigned binary numbers. Convert

your answer to decimal. 

i) 100110012 – 010001002 

ii) 110100102 – 101101102 

b) Repeat above but for when the binary numbers are in two’s complement form.

Comment on the results. 

c). Add the following additions of unsigned hexadecimal numbers. Indicate whether or not the sum overflows an 8-bit result. 

a) 0716 + 0916 

b) 1316 + 2816 

c) AB16 + 3E16 

d) 8F16 + AD16 

d). Shown below are the contents of a 16-bit resister. Determine the decimal value represented by the binary number if: 

i) the binary number is unsigned 

ii) the binary number is in two’s complement form. 

1 0 0 0 0 0 1 1 1 1 1 0 1 0 0 0 .

A local small business has hired you

A local small business has hired you to write a payroll calculation program.

#The program only needs to calculate gross pay for an employee and display the results.
#Your program will accept the employee’s name, hours worked, and the employee’s pay rate.
#The program will need to calculate overtime as well.
#Overtime is defined as anything over 40 hours is paid at 1.5 times the regular pay.
#The program should print the employee’s name, the gross pay amount,
#and only if there was overtime, print the overtime pay amount as well.
#Finally, the program should repeat as necessary until the user enters a sentinel value.

Programming R, Java, Python

 

1. Write an R program that reads the text file into a data frame. Using that data frame, print the mean, median, mode, average deviation, and standard deviation. Be sure to state which output is which, such as “The mean is: 25”.

2. Write a Java program that reads the text file. Using meaningful print statements, output the mean, median, mode, and standard deviation.

3. Write a Python program that reads the text file. Using NumPy and SciPy modules, print the mean, median, mode, and standard deviation.

As part of the mastery requirements for this Competency Assessment, complete the following boldfaced item:

Using the requirements for Steps 1–3 above, write code that adds another statistical method to output using all three languages beyond the competency statistical methods.

4. Write an R program that:

A. Reads the text file.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Also create a three-dimensional array that is 2500 by 10 by 10.

D. Slice the two-dimensional array using a starting column index of 2 and an ending column index of 5. Print the results of the arrays and slice.

5. Write a Java program that:

A. Reads the text file.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Slice the two-dimensional array using a starting column index of 2 and an ending column index of 5. Print the results of the arrays and slice.

6. Write a Python program that:

A. Reads the text file using NumPy.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Also create a three-dimensional array that is 2500 by 10 by 10.

D. Slice the two-dimensional array using a starting index of 2, an ending index of 5, and steps by 10. Print the results of the arrays and slice.

7. Compare and contrast your experience with each language when determining the mean, mode, median, and standard deviation.

Place your screenshots and responses in a Microsoft Word document. This part of the assessment should meet any stated specifications listed above. Be sure to include the .R files with your code for the R portion.