fundementals of data systems

Subject: Fundamentals of data systems

 

Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

 Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

software comparison

 Compare SSE-CMM, DSOMM, and BSIMM Version 11 with OWASP SAMM 2.0. Instructions: • Provide an overview of: o SSE-CMM o DSOMM o BSIMM Version 11 • Compare each of the 3 with OWASP SAMM 2.0. Describe in full detail. Requirements: • Should target your organization’s senior leadership • 2–3 page APA paper excluding title and reference pages  • Provide at least two references and in-text citations in APA format (these will preferably  be in addition to the main text)  • College level writing  • Should be your own work in your own words 

Malware Lab

Part 3: Analyzing Malicious Windows Programs (Lab 7.1 from PMA)

Complete all the steps mentioned in the below attached document for part 3 of this project:

Project part 3_ Analyzing Malicious Windows Programs.pdf

Part 4: Analyzing Code Constructs in Malware (Lab 6.1 from PMA)

Part 4 of this project is based on Lab 6-1 in “Practical Malware Analysis” textbook chapter 6.

Based on the knowledge gained in all previous lab assignments, you will have to complete lab 6-1

individually (with minimal or no supervision) by following the instructions given in Lab 6-1 in the

textbook. There are more detailed solutions in the back of the book.

1. Open and analyze the malware found in the file Lab06-01.exe using IDA Pro.

2. Answer all the questions (Q1 to Q3) found in Lab 6-1 in your own words.

3. List all the steps you followed in setting up the software environment and the screenshots captured

while analyzing the malware in IDA Pro (Hint: The steps that you list for Lab 6-1 should be something

similar to the steps that were given to you in all previous lab assignment instructions).

Submission Requirements for all four parts of the project:

Format: Microsoft Word

Font: Arial, 12-Point, Double-Space

Citation Style: APA

Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum

of 6 pages (excluding title page and bibliography).

Discussion 5- Monitoring project

  • Think back about your project that you defined in Week 2, what are some examples of internal and external stakeholders.
  • Find an example stakeholder analysis online, share the link and offer an overview of how it compares to the example given in the Week 5 folder.
  • How must a project manager consider the people side of change management?

Stakeholder Analysis Week 5 link-

https://www.pmi.org/learning/library/stakeholder-analysis-pivotal-practice-projects-8905

Text-

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

Assignment

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500-word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used it must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

course — Physical Security

This course examines risks, threats, and countermeasures to secure data, personnel, and hardware. This involves facility creation and selection concerns, facility access control methods, and safety issues.

complete the following questions in an MS Word

  

.complete the following questions in an MS Word Document in APA format. Double space your work and place in 12 point font using Times New Roman. You must include both a separate cover and reference page.
 

1. (counts double) The following information is listed for the configuration of a router: Internet Port:
MAC Address – 00:21:3D:AE:2C:A6
IP Address – 70.115.23.137
DHCP – DHCP Client
IP Subnet Mask – 255.255.240.0
Domain Name Server – 209.18.47.61, 209.18.47.62
LAN Port:
MAC Address – 00:21:3D:AE:2C:A5
IP Address – 192.168.1.1
DHCP – OFF
IP Subnet Mask – 255.255.255.0
 

a. The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router?
 

b. The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router?
 

c. Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized?
 

d. After choosing an unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.
 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.
 

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network.

Assignment on Linux

Execute the following commands in the attach document and post the screenshots of all the work. Everything should be seen in the screenshot.

Unit 8.1a DB: Object-Oriented Programming

  

Every 4 years, we come together as a nation to vote on who will represent us as a nation, who will lead the country in domestic and foreign affairs, who will hold the title of President of the United States of America.

Research and read/view the election platform statements, winning nomination speech, and inaugural address of the current President of the United States.  In this discussion board, compare these primary sources to the current domestic and foreign policy planning and decisions of the President.  Are their correlations between plan and action to stated goals and promises?  What challenges will the President face in accomplishing these goals and promises?  What other situations arose throughout the election and beginning his term in office that led to possible changes to the original goals and promises.