Case Study Lab Work – No Plagiarism

Case Study Lab work

Develop a plan to attack a website on “henrynet”. Use all the techniques that you’ve learned in this course to build your plan and carry out your attack. Your hacking process should be conducted when the server will be on starting on Friday at 11:55 PM and end on Sunday at 11:55 PM. 

“henrynet” is what I call my fictitious domain, on that domain, there is a web server, you are to find the webserver using the tools, the webserver has no URL, so you will have to find the IP address of the webserver. You will plan an attack on the webserver, not the domain.

The goal is to accomplish turning off the website or altering the website of “Grandma’s Famous Cookies for Diabetics” which is on the server mentioned below. Remember, you would have to first identify the web server on the domain. and hack into the web server to turn off or alter the website or take the web server down. You will be using the below server on port 2222 as your launch point. 

Remember the Server you will use is:
ssh -p 2222 [email protected]

Paper

  • Write a 4 to 5 page paper (excluding title and reference pages) write-up explaining the scenario you did above with screenshots included.   
  • Add Lab screenshots and explain the steps performed.
  • Include references and citations.
  • APA format
  • You will be playing capture the flag. 

Presentation

  • Build a PowerPoint presentation 10-15 slides on the same topic you just described in your paper. 

Policy, Legal, Ethics, & Cmplc week 2

 

Week 3 Quiz

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  1. What is privacy?2. What risks, if any, does facial recognition software raise?3. How much information about you can be found on-line with a simple google search? 4. How much information about you can be found by searching government and commercial databases?5. Describe informed consent. 6. Should secondary use of consumer provided data be available without notice to the consumer?7. How do data mining and predictive analytics work? 8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 10. How many public cameras is too many?  

Leading Strategic Change with Technology – Assignment

Select and develop a strategic plan

You must identify a type of business. Please mention below points in your assignment.

· Identify the technology with Explanation – what it is and how it works.

· Manage the technology and how it positively effects the organization.

· Manage the change that the technology will produce with Training, Phase in the technology, Concurrent use of legacy and new technology.

· Provide support system for the new technology.

· Meet current organizational goals and future organizational goals.

· Use of outside examples.

Note: 500 words with intext citations and 4 references must needed.

Research paper on privacy and security

Identify a problem in area (a) or (b). Submit the problem title and one paragraph description of the problem for “Research Paper assignment Part 1”; once your submitted problem is approved, submit maximum two page write-up on how you think the related issues could be addressed.

Research Problems: 

Area (a): Inclusive Privacy Solution

Masking sure that a privacy solution does not ignore concerns of a group of people

Please look for example papers in WIPS (WIPS – Workshop on Inclusive Privacy and Security)

Area (b): Usable Privacy Solution

A privacy solution that people uses with comfort

Example: Privacy notice? Not a usable solution (we mostly never read them because the way they are written is hard to comprehend)

Password is primarily a security tool, but also a privacy tool.

Is password usable? Not much. Creating and remembering strong password is difficult. 

Please look for example papers in SOUPS (SOUPS – Symposium On Usable Privacy and Security). 

Cloud Cost Analysis

The analysis is for your client, a federal government agency, as part of its Microsoft Azure cloud pilot. The Cloud Cost Analysis is the second of a two-part assignment for your client’s CIO. Using the Azure Pricing Calculator, you will calculate the annual cost to establish a cloud system. 

The Cloud Cost Analysis will include three deliverables: 

Deliverable 1 will include a share link to calculations displaying the steps you took to calculate the annual cost using the free Azure pricing calculator tool. 

Deliverable 2 will be two spreadsheets showing the cost for a pay-as-you-go option and a one-year option payment. 

Deliverable 3 will be a two-paragraph memo which compares the two and provides your recommendation. 

Project 2: Cloud Cost Analysis Instructions

If you haven’t already done so last week, download the Project 2 Template and use it to record your work.  

java chat

  Modern computing systems play a neat magic trick; they manage to run dozens of software seemingly simultaneously on your desktop. Underneath the hood, each process is being shuffled in and out of the processor at lightning speed, giving us the illusion of parallel operations. A Java Thread is a programming technique that allows us to do just that. We’ll see how Java Threads use time-slicing techniques to divide up the CPU and create concurrent lightweight processes 

Prompt: Take the opportunity to engage with classmates on all matters regarding Java. Asking for and providing assistance are solid ways to build your coding skills. You are required to provide at least one of the following each week:

  • A question regarding how to accomplish a certain task from this week’s assignment or project
  • A response that aids a student’s aforementioned question
  • An interesting article with a brief synopsis that details an interesting aspect or capability of Java
  • A link to and short description of a tool, technique, plug-in, IDE, and any other useful resource you run across

ple week15 DB

Hello,

i need this paper by 5/05 afternoon 12am.

Strictly No plagiarism please use your own words.

Discuss in 500 words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

 https://hackablepodcast.com/episodes/phreaks-and-geeks

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Gwinnett Technical College CIST 1305 Program

  

Gwinnett Technical College CIST 1305 Program Design and Development PROGRAM ANALYSIS WORKSHEET NAME: ____________________ DATE: __________ PROGRAM DESCRIPTION: SOFTWARE (PROGRAM) REQUIREMENTS: INPUT PROCESS OUTPUT Gwinnett Technical College CIST 1305 Program Design and Development PROGRAM ANALYSIS WORKSHEET NAME: ____________________ DATE: __________ PROGRAM DESCRIPTION: SOFTWARE (PROGRAM) REQUIREMENTS: INPUT PROCESS OUTPUT FUNCTION I-P-O CHART PROGRAM: FUNCTION NAME INPUT PROCESSING OUTPUT Program 1) A small company is moving all its employee data to a computer. To make a smooth transition, a software program will permit the data entry personnel to enter data into a file. Design a program that writes the employees.dat file. The program should accept user input until the user indicates there are no more records to write. The Employees file contains four fields (see the Input File Description). The program will use the employee ID as criteria to determine a current employee. Validate the employee ID and employee wage fields per the requirements below. You may use any of the library functions presented in Chapter 6 of the textbook to assist in validation. Your validation routines should include error messages and allow the user to correct an input error. Use an array to hold the valid ID numbers. The Input File Description is the same for both programs. Process: The user has a stack of employee files from over 25 years of being in business. There are more files than current employees. The user should enter an ID number and, if the ID is valid, continue to enter the rest of that employee’s data. If the ID is not valid, then the user moves on to the next file. The program must support this process. No data should be entered for an employee that does not have an ID found in the system (below). Program assumptions: Employee ID: May not be more than 10 characters long. The number must exist in the list of valid employee ID’s. Valid ID Numbers: RE49762358, PR156125, OF45461, RE68566547, PR156984 Employee Wage: The number may not be zero nor larger than $45.50. Program 2) Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below. The last name should print first followed by a comma, and then the first name. On the same line, the ID number should appear separated from the name by a few blank spaces (you may use TAB). Add more white space before displaying the employee’s wage. Use the EOF function to determine when the last record has been read. ________________________________________ Deliverables: Design the logic for both programs and submit using either pseudocode OR flowchart. Submit all other appropriate documentation to complete these applications (hierarchy chart, internal documentation). Include program analysis for both programs (separate form for each) and IPO chart for any custom functions created for the programs (may use single form but indicate which program utilizes each function). A desk check is NOT required. Input File Description: File: employees.dat Field Description Data Type Employee first name String Employee last name String Employee ID # String Employee Hourly Wage Real (2 decimal places) Output Report – Printer Spacing Chart: GTC1305 Company Employee Report Employee Name Identification Number Wage XXXXXXXXXX, XXXXXXX