Please read the document carefully. I need a 1 page press release from the perspective of either Huawei or International Governments about the scenario in the document, a 1-2 page technical background about the scenario, and a 1 page FAQ sheet about the scenario
Automating Changes
Shell scripting is commonly used to automate changes and install updates. Write a script to automatically update the Centos Server
Instructions
Make sure that the script:
- Updates the entire Linux machine
- Restarts HTTPD (the web server) if there are updates
- Extracts the latest zip file containing the software
- Places it in the correct location
- We have provided a few external resource links to assist you and as always the instructor is here to help
- Students should submit a “.sh” file named “randomUpdate.sh”
- This will be graded according to the supplied rubric
Aligned Objectives
- Identify and fix the causes of system failures and not the symptom
- Resolve problems in a systematic manner
- Design and develop change management guidelines for software patches and deployment
- Describe the software development life cycle
Assignment due: Friday
Criteria
Upload a “.sh” file with the correct first line.
The file includes an update command to update all packages on the server.
The file extracts the randomNumber.zip file to the correct directory.
The file cleans up any temporary files.
This criterion is linked to a Learning OutcomeThe file logs to syslog using logger. For information on the logger command, type man logger in a terminal.
ISO/IEC 27000
Standards are designed to ensure consistency. Without them, no structure would exist.
integrate at least two quality, academic resources (in addition to your textbook) for the purpose of the ISO/IEC 27000 Suite of Security Standards. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
- Describe the purpose of the ISO/IEC 27000 Suite of Security Standards.
- Justify the value they bring to cybersecurity.
- Provide full citations and references,
Project: Conduct Quantitative Analysis ( Need Corrections)
For this project, I have already done the project in the attached file of (My Spread Sheet folder ). However, I ended up failing this project. For that reason, I would like you to make corrections to my given attached spreadsheet through the given attached folder of (professor feedback) and ( professor instruction folder) give it back to me. you might have to redo the several steps completely as well. Like answering questions and essay.
Data Classification
Data Classification (100 points)
Consider the iris flower dataset, which includes information about different variations of iris flowers. (The data can be accessed at Kaggle.com.) Create a Jupyter notebook file that includes the following:
- An explanation about different classes that already exist in the dataset.
- Python code that builds different data classifiers (at least two) using the different classification algorithms, trains those classifiers using the training data, and displays their accuracy results.
- Python code to run those classifiers on the test data and compare their results and accuracy. Discuss the reasons for different accuracies.
- A summary of the results and your findings.
Important Notes:
- Submit only one .ipynb file that includes all the code and be sure not to submit any other file format.
- Be sure to include a clear explanation before each step you do in a markdown cell in the file.
- Be sure to include your name, the date, your class section and the name of your program at the top of your file in the first cell of the file (markdown cell).
- Be sure to add a table of contents at the second cell in the file (markdown cell).
- Comment your source code and describe your code to someone who may be viewing it for the first time.
- Your code should be executable and use meaningful variable names
The following are a few examples of
The following are a few examples of pseudocode:
>> Example 1
start
read
Customer_Order_Record
if Quantity > 100 then
Discount = 20
else
if Quantity > 12 then
Discount = 10
endif
endif
Total = Price* Quantity
Total = Total –
(Discount* Total)/100
Print Total
Stop
>> Example 2
Start
Read Student_Marks_File
Pass = 0
Fail =
0
Total = 0
X = 0
while (End Of Student_Marks_File) do
Total = Total + Subject_Marks
if (Subject_Marks
> 40) then
Print “Student passed in”
Subject
else
Print “Student failed in” Subject
endif
X = X +1
Read Next
Record
endwhile
Average = Total/X
Print “Average
Marks of” Student_Name “are” Average
Stop
From the above examples of pseudocode containing control structures, analyze
the logic implemented in the pseudocode. By Friday, January 4,
2013, submit a document that explains the implemented logic to the
W3: Assignment 3 Dropbox.
Practical Assignment
Go to Hands-On Tutorials for AWS. (https://aws.amazon.com/getting-started/hands-on/?getting-started-all.sort-by=item.additionalFields.sortOrder&getting-started-all.sort-order=asc&awsf.getting-started-category=*all&awsf.getting-started-level=*all&awsf.getting-started-content-type=*all)
2. Select: Cloud Level: 100 and Content-Type: Hands-on from the lefthand side menu.
3. Go through these hands-on tutorials:
-Store and Retrieve a File (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document.
-Launch a WordPress Website (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document.
-Launch a Linux Virtual Machine (Free Tier) – Provide proof (screenshots of the last page) and an explanation of what you did in a 1-page document.
ppt
10 slides
Citizen Rights versus Security
Research Paper
Answers the following questions:
- What are mobile forensics and do you believe that they are different from computer forensics?
- What is the percentage of attacks on networks that come from mobile devices?
- What are challenges to mobile forensics?
- What are some mobile forensic tools?
- Should the analysis be different on iOS vs Android?
Your paper should meet the following requirements:
- Be approximately four pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Your final project will be to design a training presentation to the client’s IT staff.
Your final project will be to design a training presentation to the client’s IT staff.
If you haven’t already done it last week,:
- Download the Client Presentation Template to get started.
- Review the Presentation Resources which may help you get started.
The presentation must meet the following requirements:
- 11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
- voice annotation for every slide (excluding the reference slide)
- at least two references
The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.
The presentation should address your recommendations for the following items:
- Version Summary
- Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
- Installation Methods
- Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
- Security Features
- Windows Security, BitLocker, Defender, Local Security Policy
- Backup and Recovery Overview
- Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
- the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
- the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
- the ability to restore system files and settings without affecting the user’s personal files and data.
- the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
- Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
- Backup and Recovery Tools
- You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
- Backup to Recover from Ransomware Attack
- Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
- Backup and Recover a Restore Point
- Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.
How Will My Work Be Evaluated?
As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. In this assignment you are being called upon to present a high-level technical presentation to your client’s IT Team.
But the challenge you face is in expressing a technical solution without getting bogged down in too much detail. You simply want to introduce or refresh the audience on the key points of Windows 10 benefits, including security and backup methods.
Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.
Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
- 1.1.2: Support the main idea and purpose of a communication.
- 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
- 2.3.5: Articulate the implications, consequences, and potential limitations of proposed conclusions and solutions.
- 10.1.1: Identify the problem to be solved.
- 11.1.1: Explain appropriate preparation procedures.
- 1.2.1: Configure technology according to stakeholder specifications and requirements.
- 12.6.1: Identify the controls needed for confidentiality.