Week 1

Q.1 Course name:  MBA Capstone — Simulation Edition 

 what are your expectations for this course? Highlight one or two areas you expect to learn from this course. You must make your first post by Wednesday, and respond to one of your classmates. Posts must be on two separate days. 

Q.2 Write a Reply 

 First and foremost, I anticipate that this course will have real-world applications. I am aware that CAPSIMS simulations are used to teach students how to make better decisions about what to give up and what to do when it comes to solving problems. For instance, when it comes to making a profit, what is the best course of action to take is to give something up. In order to prevent overlooking even a minor piece of information, it’s necessary to comprehend the mechanics of the complete process as well as the value of teamwork inside your firm. In order to succeed, I anticipate teamwork, commitment, and ongoing communication. This is howthe  business operates in the real world.

Exp19_Access_Ch01_ML1 – Home Loans 1.0

Exp19_Access_Ch01_ML1 – Home Loans 1.0

Exp19 Access Ch01 ML1 Home Loans 1.0

Access Chapter 1 Mid-Level 1 – Home Sales 

Project Description: 

An independent real estate firm that  specializes in home sales needs to create a database in which to store  its records. In the following project, you will open a database  containing information about the properties the real estate firm has  listed. You will work with a table in which to store agent information,  and then sort the table. You create a relationship between two tables  and enforce referential integrity. You also apply filters, sort a table,  and save the results.

Start   Access. Open the downloaded Access file named   Exp19_Access_Ch01_ML1_Home_Loans.accdb. Grader has automatically added your last name to   the beginning of the filename.

Open the Agents table in   Datasheet view, and add the following records letting Access assign the   AgentID number:

FirstName   LastName Title
Guillaume Picard Broker
   Keith Martin Agent
   Usa-chan Yang Agent
   Steven Dougherty Agent   in Training
   Rajesh Khanna Agent in Training
   Juan Rosario President

Sort the Age nts table by the LastName field in   ascending order.

Apply a selection filter so that   everyone with a title other than Agent   in Training displays. Save the changes to the table design and close the   Agents table.

Open the Properties table in   Design View. Change the data type for the specified fields as follows:

Field Name    Data   Type
   DateListed   Date/Time
   ListPrice   Currency
   SqFeet Number
   Beds Number
   Baths Number
   AgentID Number

Save the changes to the design   of the table. Access will alert you  that some of the data in the table may be   lost due to changing the  data type of the fields listed above. Click Yes then view the table in Datasheet   View.

Sort the records in the   Properties table by the ListPrice field from largest to smallest.

Use Filter by Form to create a   filter that will identify all properties with a list price less than $300,000 and with 2 beds. Apply the filter and   preview the filtered table. Close the table and save the changes.

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Dictionary Attacks

 

  1. Write a Python script to perform a dictionary attack on a Linux password file.
    1. Copy /etc/shadow file to your local directory. Study the format of this file.
    2. Add the following 3 lines to the /etc/shadow file. For speed purposes remove all other lines.

tommy:$6$HFQQdE2g$g0eyz6UN.c4Pg1tiQgdPPPXdQ1fEOwttCwzSah/Jo4RE9Eac4H7pgksaNLI/WSIyN8tNtCX4NaAq6Uwz.o.4W1:17400:0:99999:7:::

mathis:$6$niptplk1$.mMMVx4T375WhFkDN5RWEaD93HcmDCx3aBQrn2ZalbiRpl4FB2Rww/BeCPEfSYbegjPvoHM2llQmk/VBbSxWj.:17400:0:99999:7:::

tristan:$6$MWwusFJx$KCoO1wiWKtE.7j/7UiwD.1jXmOckMb5X4GGt1DotLS0laXdFga5n3wGfu43FC/Opxki7mY6Yf9XT.cBGN.pkp0:17400:0:99999:7:::    

  1. Use the “crypt” library crypt function to create your hash.
  2. Use the “hmac” library compare_hash function to compare hashes from the /etc/shadow file to the hashes produced from your guesses.
  3. Use the string split() function to separate the separate the password lines from the shadow file by the ‘:’ delimiter to isolate the userid and the hash from an entry in the shadow file.
  4. Calculate the appropriate hash (using the method specified for the entry from the shadow file) for each word in this wordlist (http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)), compare the hash, and stop comparing when you find a match.
  5. Attempt the dictionary attack for each entry in the shadow file.
  6. Remember you need to provide the word from the dictionary, the method, and the salt to the crypt() function.
  7. Print the userid and password when a match is found:
    “Match found for userid [userid]. Password = [password]”
  8. Print the “No match was found for [userid]” when there no match in the dictionary.

UPDATE: Your program should run with the following command line:

>> python3 dictionary.py [shadow filename] [dictionary filename]

Write an essay on 300 words

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document.

Assignment 10

 Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.
 

CYBERLAWS & ETHICAL HACKING PROJECT

Project Part 2: Identify Vulnerabilities in IT Security

Scenario

Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources

Access to the Internet

Text sheet: Zenmap Intense Scan Results (ts_zenmapscan)

Tasks

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:

What are the first five open ports as identified by the Zenmap scan?

Include the port number

Include the service name

Include a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.

Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE)database.

Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the campus network againstattempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

4. Write a report targeted at IT management and systems administration staff explaining thevulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space

Citation Style: Follow your school’s preferred style guide

Length: 2 to 4 pages

The Complexity of Information Systems Research in the Digital World.

 This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally-enabled solutions to assist with the emergence of digitalization. Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization. Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

S1/4 Peer Review

  1. Analyze/Review two of your classmates’ postings and respond individually. 
  2. Each response to your classmate should be at least 150 words in length and include one credible information source citation. 
  3. Please find the attachment. 

Discussion Question

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the iOS platform. 

To participate in the Discussion, respond to the Discussion prompt by Day 3. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates by Day 5 in one or more of the following ways: 

  • Complete the Week #4 Discussion by the assigned due date.  Late assignments will not be accepted. 
  • This is a required assignment and is worth 50 points.
  • You must apply and use the basic citation styles of APA.
  • Do not claim credit for the words, ideas, and concepts of others.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.
  • Use this link to access the Discussion Board

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.