Week 4 Lab

 

Scenario/Summary

The purpose of this lab is to develop your programming skills and introduce functions.

Write a program that simulates flipping a coin and rolling a dice.

A user will input their choice of flipping a coin (C), rolling a dice (D), or exiting (E).

If the user chooses a coin toss, the program will ask how many times the coin should be tossed, then will simulate tossing the coin that many times and print the result to the user.

If the user chooses rolling a die, the program will ask how many sides the die has and how many times it should be rolled. The program will then simulate rolling a die (with the number of sides specified) that many times.

The program will continue until the user presses E.

Culminating Assignment Concept Paper: Red Team Assessment Strategies in Cybersecurity

 

Culminating Assignment

Concept Paper:   Red Team Assessment Strategies in Cybersecurity

Directions:

1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  

2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:

Parameters:  

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body:  
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  

Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.

The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.

After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.

Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.

Resources to help you complete this assignment:

Rubric:

Points: 

Assignment: Red Team Assessment Strategies in Cybersecurity

Criteria

Needs Improvement

Below 60-70 F

Fair

70-79 C

Proficient

80-89 B

Exemplary

90-100 A

1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.

Weight: 25%

Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.

Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.

Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.

Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.

2. Describe the approach to red team assessment.

Weight: 30%

Did not submit or incompletely described the approach to red team assessment.

Partially described the approach to red team assessment.

Satisfactorily described the approach to red team assessment.

Thoroughly described the approach to red team assessment.

3. Discuss how different types of organizations are utilizing red teaming.

Weight: 30%

Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.

Partially discussed how different types of organizations are utilizing red teaming.

Satisfactorily discussed how different types of organizations are utilizing red teaming.

Thoroughly discussed how different types of organizations are utilizing red teaming.

5. 3 References

Weight: 5%

No references were provided.

Does not meet the required number of references; some or all references poor quality choices.

Meets the number of required references; all references high-quality choices.

Exceeds the number of required references; all references high-quality choices.

6. Clarity, writing mechanics,  formatting.

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

Assignment

Lab 5 2240….of lab 4,

 

  • Lab FIVE-04
    • Visit the following site:
    • Module 3:Problem Statement:  3.4.1.12 The Timer class. ================================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)
    • .==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FIVE-04) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FIVE-04
    4. Locate your Python program (Lab FIVE-04 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentLab FIVE-05
    • Visit the following site:
    • Module 3:Problem Statement:  3.4.1.13 Days of the week. ================================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic =======================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FIVE-05) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FIVE-05
    4. Locate your Python program (Lab FIVE-05 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentLab FIVE-06
    • Visit the following site:
    • Module 3:Problem Statement:  3.4.1.14 Points on a plane ================================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic e=========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FIVE-06) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FIVE-06
    4. Locate your Python program (Lab FIVE-06 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentLab FIVE-07
    • Visit the following site:
    • Module 3:Problem Statement:  3.4.1.15 Triangle================================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error=======================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Lab FIVE-07) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Lab FIVE-07
    4. Locate your Python program (Lab FIVE-07 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT

Homework

Write atleast 500 words on what you would like to learn for future study in Cloud Computing.

You need to refer to 3 sources and include them in the references.

Discussion and research report on Cyber security course

Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.

1) AppDetectivePro  120 words  Need link reference as well

2) MSSQL datamask= 120 words  Need link reference as well

3) Scuba=  (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

4)Docker (software) =  (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

5) Data sovereignty in the cloud = 120 words  Need link reference as well

6)SECaas ( security as a service) = 120 words  Need link reference as well

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

1) AppDetectivePro – 70+ words Need link reference as well

2) MSSQL datamask= 70+ words Need link reference as well

3)Scuba = ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

4)Docker (software)  =  ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

5)Data sovereignty in the cloud = 70+ words Need link reference as well

6) SECaas ( security as a service) = 70+ words Need link reference as well

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY  and do not use AI to get the copy paste information lik Chatgpt

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 04/06/2023 11:59AM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Research Problem Proposals with Research Questions

Assignment Content

  1. STOP: (1) Have you watched the HW video on APA 7 Basics and Cover Page? (2) IF you were absent, have you watched the class recording? Do not continue to the assignment until these things are complete

    ASSIGNMENT
    Step 1, Brainstorm: Think about your field of study as a master’s student. Use one of the two methods taught in class and find two news articles that report on relevant problems related to the industry associated with your master’s degree program (think about scandals within the last 5 years). Come up with two examples using the format below in a simple Word document, using APA 7 Basics and an APA 7 cover page learned through the HW video (see p. 20 in Foundations for a sample cover page)

    Step 2, Create your Word Document and Answer Questions (it should look similar to p. 5 in Foundations):

    FOR EXAMPLE: If my major is public health or even education, I would come up with something like Issue/Problem 1 below (MPH students, you cannot use this as your own). We have started one together in class, so you must complete what you started in class and find a second research problem proposal:

    Issue/Problem 1: Depression and anxiety among young adults 
    1) People Involved: College students, parents
    2) Link to Article: https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression
    3) My Research Question: What have researchers learned about the impact of COVID 19 on depression and anxiety among young adult students?

    I would then fill out my second Problem proposal below: 

    Issue/Problem 2:
    1) People Involved: 
    2) Link to Article: 
    3) My Research Question: What have researchers learned about

    Grading:
    Cover/Title Page = 40 pts
    Issue/Problem 1 = 30 pts
    Issue/Problem 2 = 30 pts

Sum-Wk-3

Assignment 1

After reading chapter 4 (attached) – 

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 2 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Sources: Use a minimum of three scholarly articles to complete the assignment.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.