SE494 Assignment 3
Follow the instructions in the attached document and develop C++ programs
Then, submit three c++ code files.
LastNameW3Ex1.cpp
LastNameW3Ex2.cpp
LastNameW3Ex3.cpp
SE494 Assignment 3
Follow the instructions in the attached document and develop C++ programs
Then, submit three c++ code files.
LastNameW3Ex1.cpp
LastNameW3Ex2.cpp
LastNameW3Ex3.cpp
Read Chapter 1 and 2 of your textbook and reputable resources and write 2/3 page summary and describe the following:
What is risk analysis and threat definition? Explain What is being protected? What are the threats? Where are the weaknesses that may be exploited? Explain at least three(3) types of attacks and how they impact organizational data/resources?.
This week was all about programming. We looked at several types of programming. Watch the video, Why Programming is Important | Mark | Jack | Bill Gates Tips About Programing, where major influencers of the digital world talk about learning to program. They also share their experiences of the importance of learning to program. Choose one of the people interviewed in the video that inspired you. Do some Internet research to learn some more about them.
Answer this question: Why is it important for you as a business professional in your chosen field to know how to program?
Part 1: Current Security Threats
Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.
Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
Security organizations, such as Secunia (http://secunia.com/)
Your supervisor has also asked you to consider the following questions as you shortlist the threats:
What threats are new this year, and which have become more prevalent?
Why are these threats more common and why are they important?
What threats remain constant from year to year? Why?
What threats do you believe will become more critical in the next 12 months? Why?
What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?
With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.
Part 2: Identify Vulnerabilities in IT Security
Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.
Required Resources
Access to the Internet
Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)
Tasks
1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
What are the first five open ports as identified by the Zenmap scan?
Include the port number
Include the service name
Include a brief description of how each is used
2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
Include the name and a brief description of each vulnerability.
3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.
4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.
Submission Requirements for both parts of the project:
CARDIAC CARE UNIT
ST GEORGE’S HOSPITAL
Your program will read one input sequential file. You will use textfile “patients.txt” which is located on tracs as a test file but you must write your program so that it invokes the dialog feature of C# ***** the user can select the input file form a Windows template. You will submit your exam on tracs in a zipped folder. If your zipped folder contains fewer than 5KB of data it is garbage and it will receive a 0. You are allowed multiple submissions to safeguard your work, but anything submitted past the end of class will not be graded. I will grade the last submitted version.
As specified above, you should code your program so it can input data from any file the Nurse or the Doctor wants to. The format of the input file is such that the input file contains multiple sets of data for cardiac care patients and it could also be an infinite continuous stream of data records. Each set of 12 consecutive records contains data about one patient. The first record contains the patient name, the next 10 records contain 5 pairs of data representing 5 measurements of the patient’s blood pressure (Systolic over Diastolic) and the 12th record contains the id of the doctor for that patient. The first number is ***** pressure, the second number is ***** pressure, and the third number is ***** pressure and so on. The input file will look like this followed by data for the next patient and the next patient and so on.
Joe A. Patient
180
60
175
76
188
100
190
80
190
80
1There will be an unspecified number of data sets in the various input files to be processed. Your program must create 3 String constants in memory. They should hold the following string values:
D.ABRAMS,MD Dr. Abrams is doctor 0.
D.JARVIC,MD Dr. Jarvic is doctor***** Panos is doctor 2.
PROCESSING:
For each patient in the input file, your program will load the systolic and diastolic blood pressure measurements into the proper variables that you must define. You will compute the average value for each group of variables: one average value for the Systolic values and one average value for the Diastolic values and display them in a listbox, along with the “Status” and the “Doctor’s Name.”
If the average Systolic pressure of a patient is <=90 or >= 160 OR if the average Diastolic pressure is <= 60 or >= 90 then your program must display a “WARNING” under the status for that patient, otherwise you will display ‘NORMAL’ under the status for that patient. The last column of the display will show the Cardiologist’s Name for the patient.SAMPLE GUI FOR YOUR CARDIAC CARE APPLICATIONCODING SPECIFICATIONS:
DisplayPatientStatus_Button:
The codebehind the “DISPLAY PATIENT STATUS” button must only contain calls to VOID methods and Value Returning methods (known as Functions).
Write a void method ProcessFile to process the file until the end of stream and call that method from inside the button click event.
Inside this ProcessFile method your program should call the following sub-methods:
Write two separate Functions (value returning methods.) One, SystolicPressure, to accumulate and return the mean Systolic blood pressure and another Function, DiastolicPressure, to accumulate and return the mean Diastolic pressure of the current patient.
Write a Function PatientStatus, to return the patient’s STATUS after the patient’s numeric data has been processed.
Write a Function DoctorsName to return the doctor’s name.
Write a private void DisplayOutput method, to create a string and display each output line for each patient the app is processing.Clear_MonitorButton
The codebehind the “CLEAR MONITOR” button must contain calls to void methods that will do the field and variable cleaning and re-initializations.
Write 500 word-long post addressing the way risk management affects the way an organization implements an Information Security program
Finish assignment
4-6 page research paper including sources and intent citations.
Topic Selection in Attached file.
You are the treasurer of the local drama club, and have begun to create a database of potential donors and volunteers for your organization. You discovered that some donations have already been made, but the records are stored in an Excel workbook. You use your newly gained knowledge of Access to create a relational database to track the donors and their donations. You will begin by importing the Excel workbook into the database. You will create a table from scratch to track the dates for which volunteers have signed up to help, create relationships between the tables, and then create some baseline queries
Start Access. Open the downloaded Access file named Exp19_Access_Ch2_HOEAssessment_Drama. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
You will examine the data in the downloaded Excel worksheet to determine which field will become the primary key in the table and which field will become the foreign key so that you can join it to the existing table in the database.
Open the Donations.xlsx Excel workbook, examine the data, and close the workbook.
You will import the Excel workbook that contains donation information into the database.
Click the External Data tab, click New Data Source, point to From File in the Import & Link group, and then select Excel. Navigate to and select the Donations.xlsx workbook to be imported as a new table in the current database. Ensure that First Row Contains Column Headings is selected. Set the DonationID field Indexed option to Yes (No Duplicates). Select DonationID as the primary key when prompted and accept the table name Donations. Do not save the import steps.
Change the Data Type of the DonationID field to Short Text in Design view of the Donations table. Set the Field Size of DonationID to 5. Set the Field Size of DonorID to Long Integer. Save the changes and open the table in Datasheet view. Close the table.
You will create a new table that will enable the club to associate each donor who agrees to volunteer with dates in the database.
Create a new table in Design view. Add the following fields in Design view and set the properties as specified:
Add the primary key field as VolunteerID with the AutoNumber Data Type and Number assigned to a new volunteer activity. (type the period) as the Description. Set the Caption property to Volunteer ID.
Add DonorID with the Number Data Type and Donor Volunteer as the Description. Set the Caption property to Donor ID and the Required property to Yes.
Add VolunteerDate with the Date/Time Data Type. Set the Caption property to Volunteer Date. Switch to Datasheet view and save the table as Volunteer Dates when prompted. You will enter data into the table in a later step. Close the table.
You will create the relationships between the tables using the Relationships window.
Add all three tables to the Relationships window. Identify the primary key field in the Donors table and join it with its foreign key counterparts in the related Donations and Volunteer Dates tables. Select the Enforce Referential Integrity and Cascade Update Related Fields check boxes. Save and close the Relationships window.
You will add 8 records to the Volunteer Dates table so that you can test referential integrity in the database.
Add the following records to the Volunteer Dates table:
Donor ID
Volunteer Date
9
4/10/2021
9
4/24/2021
10
4/10/2021
10
4/24/2021
11
5/01/2021
11
5/08/2021
19
5/01/2021
20
5/08/2021
Close the table.
Sort the records in the Donations table by the DonationAmount field in descending order. Save and close the table.
You will use the Simple Query Wizard to create a query of all donors who indicate that they are willing to volunteer.
Add the Firstname, Lastname, Phone, and Volunteer fields from Donors (in that order). Save the query as Donor Volunteers.
Add a criterion in Design view to select only donors with Yes in the Volunteer field.
Sort the query results in ascending order by Lastname. Run, save, and close the query.
You will copy the Donor Volunteers query and modify it to add an additional table and field.
Copy the Donor Volunteers query and paste it using Donor Volunteers and Dates as the query name.
You decide to hide the Volunteer column from the query results, as the value repeats in every record of the datasheet.
Open the Donor Volunteers and Dates query in Design view and in the Volunteer column, click the Show check box to deselect it.
You will add a field from a related table to display whom has volunteered for which dates.
Add the Volunteer Dates table to the top pane of the query design window. Add the VolunteerDate field to the last column of the design grid. Run, save, and close the query.
You will create a query that identifies donors and their associated donations. Because there is a relationship between the two tables, you can now pull data from each of them together as usable information.
Create a query in Design view that includes the Donors and Donations tables. The query should list the Firstname and Lastname (in that order), then the DonationAmount and the DonationDate (in that order).
Sort the query by the DonationAmount in ascending order. Run, close, and save the query as Donors and Amounts.
You determine that the data in the Donor Volunteers and Dates query could be summarized with a Total row. You will group the records by donor name, and then count the number of dates that each has volunteered.
Copy the Donor Volunteers and Dates query and paste it using Summary of Volunteer Dates as the query name.
Open the Summary of Volunteer Dates query in Design view and delete the Firstname, Phone, and Volunteer columns.
Click Totals in the Show/Hide group on the Query Tools Design tab. Click in the Total row of the VolunteerDate field, click the arrow, and then select Count. The records will be grouped by the last name and the dates for each one will be summarized.
Modify the field name of the VolunteerDate column as Date Count: VolunteerDate to make the field more identifiable. Click Run in the Results group (5 records display in the Datasheet). The results display the date count for each last name. Save and close the query.
Close all database objects. Close the database and then exit Access. Submit the database as directed.