Two part paper

 Business Continuity & Disaster Recovery 

Part 1

you will write one more paper that will be included in your final submission.

  1. In a 1-2 page paper, describe how a cloud deployment would affect an organization’s Business Continuity and Disaster Recovery plan. 
  2. Remember to use proper APA formatting, including citations and references to all resources used.

Part 2  

Combine all Project Parts (including the paper you wrote in Part 1 of this assignment) into a comprehensive final paper. Keep the following in mind:

  1. Your final submission should incorporate feedback provided by your instructor (for Parts 1-3).
  2. You should only have one cover page.
  3. Your paper should contain a conclusion.
  4. Your paper should be at least 5 pages (Parts 1, 2, 3, and 4 combined), not including the cover or reference pages.
  5. Your paper must use proper APA formatting, including citations and references for all resources used.
  6. You should have one reference page that combines all the reference materials you used on each project part.

CS D 1

Discuss the differences, advantages, and disadvantages of BOTH Hierarchical databases and Network databases.

300 words with APA format and references.

Case Studies II and Cyber Responses

Provide (3) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2. Additionally, answer the question on DISCUSSION 1 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

It has been gone over in the school’s given curriculum, but one instance of a cyber attack that I feel is very important to mention is the success of Stuxnet. While Iran was building what the United States intelligence determined was a nuclear arsenal, the United States and Israel were working in a conjoined effort in building an extremely sophisticated worm – with the purpose of setting back the Iranian nuclear arsenal financially and at least a couple of years. At the time, this was considered groundbreaking levels of technology for a worm, and it was very successful. Stuxnet was unleashed, and centrifuge tubes needed for nuclear construction began spinning erratically, with some becoming damaged while others self destructed entirely. It’s estimated that over two thousand centrifuges were destroyed, and that it set Iran back around two years of progress, and more importantly, valuable economic power to re-purchase the centrifuges. Crucially, if more centrifuges were purchased, it could help confirm the presence of the heavily suspected nuclear facility, enabling potential further action or sanctions onto Iran. 

– DANIEL

RESPONSE 2:

Reported by the Department of Justice (2018), the series of intrusions involving the Fancy Bear Hack Team which include what has been referred to as the DNC hack resulted in an investigation conducted by the FBI. The objective of the agency was to determine the identities of assailants, mechanisms of intrusion and associated actors which in this case comes down to the Russian state through military actors.

In the same DoJ report, the officers of Russia’s Military Unit 26165 researched victims later targeted in a spear-phishing campaign using proxy servers and maintaining command and control infrastructure for the deployment of malware as a mechanism of penetration. From here, the investigative cyber response transitioned to a legal format where officers identified in this unit were charged in a court of law.

Importantly and what is hopefully now common knowledge is that these operations aren’t standalone, and have been emphatically stated to be part of a larger series of Russian cyberespionage and subversion operations which continues now.

Bibliography

Department of Justice. 2018. U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations. Retrieved from: https://www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and.

-JOSHUA

DISCUSSION 1:

Evil Corp, which is known to be a cybercrime organization, is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB) (McCullagh et al., 2006). I can add that, in the United States, precisely in New York, the FBI secretly installed software on two key members of the Genovese crime family’s cell phones, converting them into “roving bugs” that could be remotely activated to eavesdrop in on discussions in a room, even if their owners had switched them off.

However, despite the indictment of its top members in the United States, Evil Corp is still operating in the hacking business, but it may have transitioned into corporate spying services. This organization has stolen masses of dollars from unwary banks. One is the South Korean banks (Allyn, 2019). In the year 2011, hackers used a compromised laptop of an IT support contractor to obtain access to systems belonging to Nonghyup, a South Korean bank. The malware erased vital data on over 100 servers within the network, preventing millions of clients from accessing their accounts and ATMs for three days. Backup files for disaster recovery were also corrupted. I also agree that in another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts.

QUESTION: So you bring up a great point about Russia.  Why are we not doing more?  Why is the United States Government not holding Russia accountable?  Is holding 12 Russian’s responsible enough?

question

 

1.how both quantitative & aualitative analysis have been applied to research in cybersecurity.

2. Identify & explain 3 IT leadership models and how each can positively influence behaviours in an organization

3. Evaluate the importance of IT leasdership & it’s role in helping acheive governance to help solve organizational problems.

Information Management

  

2-3 pages

Regardless of industry, organizations are responsible to protect and secure their customers’ information. Information management is the process of protecting an organization’s data in terms of:

· Classification and handling.

· Privacy.

· Document and records management.

· Sensitive physical information.

To reduce the risk of customer information being jeopardized, organizations often establish a separation of duties to ensure employees only have access to the information they need to do their jobs. Organizations need to abide by several U.S. privacy laws and regulations to be in compliance and to protect consumers.

In earlier chapters you developed

  

In earlier chapters you developed classes needed for Cost Is No Object—a car rental service that specializes in lending antique and luxury cars to clients on a short-term basis. The rental service produces computerized paychecks for its employees every week. Write a program that gets data for each of the following:
An employee ID number
A first name
A last name
A street address
A zip code
An hourly pay rate
Number of hours worked this week
An insurance plan code
 

Create an application that prompts the user for employee data; the application continues to accept data for new employees until the user enters 0 for an ID number to indicate the desire to quit. While the ID number is not zero, prompt the user for a value for each field in turn. Any time the user enters an invalid value, continue to reprompt the user for the same data. Continue with the next data item only when the previous item is valid, as follows:
An employee ID must be between 100 and 999 inclusive.
A zip code must not be greater than 99999.
An hourly pay rate must be between $6.00 and $25.00 inclusive.
The number of hours worked in a week cannot be negative or more than 70.
An insurance plan code must be 1 or 2.
 

When all the needed data has been entered correctly for an employee, display a copy of all the data fields for the employee as well as the following:
Gross pay, calculated as hours worked times pay rate
Income tax, which is calculated as 15% of the gross pay if the gross pay is $400 or less; otherwise, it is 20% of the gross pay
Insurance premium, which is $60 for insurance plan code 1 and $100 for insurance plan code 2
Net pay, which is calculated as gross pay minus income tax, minus insurance premium; if the net pay is negative (the employee did not earn enough to cover the tax and insurance), then the net pay should be $0

ITGE W 2 D

 

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

COSC 2425 – Programming Project 1…RATED A+ ASSIGNMENT! GOODLUCK

 

You will write a simple assembly language program that performs a few arithmetic operations. This will require you to establish your programming environment and create the capability to assemble and execute the other assembly programs that will be part of this course.

Access to an assembler is needed to complete lab exercises and develop Assembly Language projects. Examples include Microsoft Visual Studio, asm, masm etc. Must compile, build and run in visual studio.

Your North Lake College student ID number is a 7-digit number (3098015). Begin by splitting your student ID into two different values. Assign the four most significant digits to a variable called ‘left’ and the three least significant digits to a variable called ‘right’.

You must choose the data type that is appropriate for the range of decimal values each variable can store. You will choose a data type when you define each of the variables in your program. Try to make efficient use of memory.

Calculate the sum of the two variables ‘left’ and ‘right’. Store this result in a variable called ‘total’.

Calculate the positive difference between the variables ‘left’ and ‘right’. Store this result in a variable called ‘diff’.

Define a character string called ‘message’ that contains the characters, “Hello World!”.

Define an array of data type WORD called ‘numbers’ that is initialized to the following values: 1, 2, 4, 8, 16, 32, and 64.

Write assembly language code using what you know so far (do not look ahead in the book just yet) to determine the length of ‘numbers’. Store this value in a variable called ‘arrayLength’.

Move the contents of the variable ‘left’ into the EAX register.

Move the contents of the variable ‘right’ into the EBX register.

Move the contents of the variable ‘total’ into the ECX register.

Move the contents of the variable ‘diff’ into the EDX register.

Move the contents of the variable ‘arrayLength’ into the ESI register.

Call the author’s DumpReg routine to display the contents of the registers.

Submit your assembly language source code and a screen shot of the output packaged as a single file in “.ZIP” format. Call your file “PGProject1.zip” 

network administration

Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is granted. Integrity of data is the top priority.

You are considering security through obscurity, defense in depth, and diversity of defense.

Answer the following question(s):

Which firewall security strategy would be the best solution for the scenario? Why?