Discussion and research reports for Cyber security

Need to present a Discussion with a word count of above 150+ words and each discussion need a separate reference link for sure.

1) End point detection and Response (EDR) (150 words)

2)VMware carbon Black (Endpoint) ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

3)SMishing (150 words)

4)Malvertising ( Need this same topic in two different format like we did previously and 2 different URL links as well needed) ( 150+150 = 300 words)

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

  

1) End point detection and Response (EDR). 70-110 words

2) VMware carbon Black (Endpoint) ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140 words)

3)SMishing 70-110 words

4)Malvertising ( Need this same topic in two different format like we did previously and 2 different URL links as well needed) (70+70 = 140 words+)

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

  • Current technologies available to support management functions,
  • Best Practices,
  • Future improvements/technologies, or
  • Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY 

Each one should be different and no each topic information should be similar to the other topic strictly.

Deadline: 01/26/2023 12PM CST

Wk 4 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises? 
  • What are the different types of denial-of-service attacks? How do you detect and respond to these types of events? 

Cite sources to support your assignment. 

Format your citations according to APA guidelines. 

Submit the reflection. 

PC Security Presentation

In this exercise, you will convert the essay you wrote in Project 3 to a PowerPoint presentation. Read this all through to the end once before you try it.

2. Find the image files you downloaded as you will use them here.

3. Outline and develop your presentation on paper or using a word processor first. You must have:
  * A title slide, with a good title (not “PC Security Presentation”) that applies to the specific aspect of security you are discussing, and your name below the title.
  * A slide which introduces your topic. State what it is, why it’s important.
  * 2 or 3 slides which detail your topic.
  * A conclusion slide, which sums up your details/findings.
  * A Works Cited slide which has the URLs of the Internet references where you found your information.

4. As you work this out, follow these guidelines:
  * Title slide must use the Title slide format.
  * Intro, detail and conclusions slides
     * can use the Title and content format, or possibly Two content,
     * must be bulleted,
     * must have a relevant title at the top of the slide,
     * must have “several” bullets of several words each. No blocks of text,
     * should follow the good presentation principles you read about earlier,
     * are where the 2 images go, anywhere you want in there but only 1 image per slide, appropriately sized and located, and
     * each image must be referenced or discussed in one or more bullets.
  * Works Cited slide should use the Title and body format, title is “Works Cited”.

5. When you create your slides, be sure to:
  * add a Theme to all slides.,
  * have slide numbers on all slides except the title slide,
  * use bullet symbols for all bullet points. Any style you want, but the same style on all slides,
  * add a transition,
  * spell check, and
  * remember we are keeping it simple: no gifs, no videos, no audio, no animations, no links.

6. When you’re ready, create your presentation. Begin by choosing a Theme, then set the title slide up since that shows first, then work along – add a slide, add content to a slide, etc. until the basics are all done.

7. Now finish up by adding other required format items, like the slide numbers, transitions and spell check.

8. Save your file. Call it PC Security Presentation

9. Your project will be graded according to the following rubric:

Requirements
Max Points Possible
All required slide types present and well formatted   
25
Content and information accurate, useful and logical
10
Images relevant and referenced
15
Spelling and grammar checked and corrected
10
Total
60

What is Public Const Epsilon

  

What is Public Const Epsilon = 0.0000000005 in constants.vb module?

 

(1) What is this function used for?

Public Function IsZero(x As Double) As Boolean

Return Math.Abs(x) < Zero

End Function

 

(2) Whis is this function used for?

Public Function ChainRule(ByVal f As Evaluable, ByVal g As Evaluable) As Evaluable

Return New Operation(Op.Times,f,g.Derivative).Simplify

End Function

 

(3) What does an underscore prefix mean?

What is public function compareto really do? (in DataPoint class)?

 

What does mustoverride stand for? What is different between override and mustoverride?

 

(4) What does enum stand for?

In statement “MyEvaluable = eva.Clone”, what does the clone attribute mean?

 

In statement “MyEvaluable.Simplify, what simplify stands for throughout the program?

 

What does the GraphingData routine do?

 

Is the entire Operation and ValueObject used by expressions specified in general expression screen?

 

Write a query

 Write a query to show customers regardless they have paid any money or not 2. Write a query to show customers regardless they have ordered any products or not. 3. Write a query to show products regardless they have been ordered or not. 4. Write a query to show employees and customers. 5. Write a query to show countries that customers and employees are from (no duplicates) Administration Schemas Query 1 SCHEMAS 1 Q Filter objects Bowling League Modify mysqlTutorialOrg Tables customers employees offices orderdetails orders payments productlines products Views Stored Procedures Functions MyTestDb Object Info Session Schema: mysqlTutorialOrg
 

Apply: Signature Assignment: Cost Model

 

Assignment Content

  1. Project Cost Management
    Open a new Microsoft Word document, Microsoft Excel document, or use the provided template to complete the following tasks.

    Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in 6 months for under $200,000.

    Use the Cost Estimate template and Cost Baseline template to assist with this assignment.

    Tasks

    • Prepare and upload a 1-page cost model for this project using spreadsheet software. Use the following work breakdown structure (WBS), and document your assumptions in preparing the cost model. Assume a labor rate of $100 per hour for the project manager and $60 per hour for other project team members. Assume that none of the work is outsourced, labor costs for users are not included, and there are no additional hardware costs. The total estimate should be $200,000.
    1. Project management
    2. Requirements definition
    3. Website design
    4. Registration for recreational programs
    5. Registration for classes and programs
    6. Tracking system
    7. Incentive system
    8. Website development
    9. Registration for recreational programs
    10. Registration for classes and programs
    11. Tracking system
    12. Incentive system
    13. Testing
    14. Training, rollout, and support
    • Using the cost model you created in the first task, prepare a cost baseline by allocating the costs by WBS for each month of the project.
    • Assume that you have completed 3 months of the project. The BAC was $200,000 for this 6-month project. You can also make the following assumptions:
    • PV=$120,000
    • EV=$100,000
    • AC=$90,000
    1. What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?
    2. Use the CPI to calculate the estimate at completion (EAC) for this project. Is the project performing better or worse than planned?
    3. Use the SPI to estimate how long it will take to finish this project.
    4. After completing your charts, write a 150-word follow-up in which you complete the following:
    • Explain how the project is doing based on the CPI and SPI. Is it ahead of schedule or behind? Is it under budget or over?
    • Describe the strategies or steps that should be taken for human resource management to avoid additional costs.
    • Describe the strategies or steps that should be taken for resource activity management to avoid additional costs.
    • Recommend 2 tools to support these strategies and explain why these tools would be beneficial.
    • Submit your cost model, course baseline, and follow-up.

Benchmark- Impact Analysis Part-1

  

Benchmark – Impact Analysis Part 1: Information Acquisition 

3.1: Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices within their industry.

Select an industry of your choice and review its compliance requirements. Then, using a fictitious company that is just starting out, identify the essential elements of what is required to attain compliance or successful cybersecurity resilience. Within a report to the CIO, present this information from a legal standpoint making sure to address the following:

1. Identify any industry specific compliances that must be met (i.e., HIPAA, COPPA, DOD). Determine what overarching guidance they must comply with. Determine what overarching laws they must comply with.

2. Examine the requisite set of standards, frameworks, policies, and best practices most helpful in the development and implementation of the organizations objectives. 

3. Identify the organization’s critical data infrastructure assets (i.e., network, telecom, utilities, applications, computers and client data categories).

4. Identify human resources for technical, management and legal operations.

5. Identify requisite law enforcement entities required for reporting breaches to (i.e., local, state, and federal areas of compliance). 

CustomerAccounts

Create a class called CustomerAccounts which uses methods from the Assert class listed in

Appendix A. Create at least five customer accounts which consist of the attributes customer

name and Balance. Also provide the code which will allow you to increase the value of one

customer balance by 1000 Euros.Class CustomerAccounts{// Put elements to the map// Get a set of the entries// Display elements// Increase the balance of one of the customers balance by 1000.}

Activity 7- Project HR & Stakeholder Mngt

How should a project manager handle and work with a difficult stakeholder?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22