Practices for Cyber Threats and Defense

  

1. Define what constitutes a secure posture and how it helps in understanding the importance of having a good defense and attack strategy.

2. Describe the Incident Response Process and the importance of having one? Be sure to include some industry standards and best practices for handling incident response in your answer.

3. What is a Cyber Strategy and why is it needed? How can you build an effective enterprise cyber strategy?

4. What is the Cybersecurity Kill Chain, the different stages of the attack, and what are some examples of activities that occur in each one of those phases?

5. What are some strategies to perform reconnaissance? 

6. What are some current trends in strategies to compromise a system?

7. Describes lateral movement and how attackers perform lateral movement once they compromise a system.

8. What is Privilege Escalation and describe some ways attackers can escalate privileges in order to gain administrative access to a network system?

9. What is Threat Intelligence and proves a few different aspects of threat intelligence?

10. What is the Recovery Process?

11. Describe Vulnerability Management and the importance of vulnerability management to mitigate vulnerability exploitation. 

12. Describe log analysis and provide some techniques for manual log analysis since it is critical for the reader to gain knowledge on how to deeply analyze different types of logs to hunt suspicious security activities

Exp19_Excel_Ch09_ML2_Pizza_Sales

#Excel Chapter 9 Mid-Level 2 – Pizza Sales 

#Excel Chapter 9 Mid-Level 2 – Pizza Sales 

#Exp19 Excel Ch09 ML2 Pizza Sales  

  

Project Description:

You manage a chain of pizza restaurants in Augusta, Lewiston, and Portland, Maine. Each store manager created a workbook containing the quarterly sales for each type of sale (dine-in, carryout, and delivery). You want to create links to a summary workbook for the yearly totals.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch09_ML2_Pizza.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

You want to enter totals from   the Augusta workbook into the Pizza workbook.
 

  Display the Augusta worksheet; in cell B4, insert a link to the Dine-In total   in cell F4 in the
Exp19_Excel_Ch09_ML2_Augusta   workbook. Edit the formula to make the cell reference relative.

 

You want to copy the formula   down the column but preserve the original formatting.
 

  Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the   Augusta worksheet. Close the Augusta workbook; keep the Pizza workbook open.

 

You want to enter totals from   the Portland workbook into the Pizza workbook.
 

  Display the Portland worksheet; in cell B4 insert a link to the Dine-In total   in cell F4 in the
Exp19_Excel_Ch09_ML2_Portland   workbook. Edit the formula to make the cell reference relative.

 

You want to copy the formula   down the column but preserve the original formatting.
 

  Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the   Portland worksheet. Close the Portland workbook; keep the Pizza workbook   open.

 

You want to enter totals from   the Lewiston workbook into the Pizza workbook.
 

  Display the Lewiston worksheet; in cell B4 insert a link to the Dine-In total   in cell F4 in the
Exp19_Excel_Ch09_ML2_Lewiston   workbook. Edit the formula to make the cell reference relative.

 

You want to copy the formula   down the column but preserve the original formatting.
 

  Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the   Lewiston worksheet. Close the Lewiston workbook; keep the Pizza workbook   open.

 

The Summary sheet should contain   the same formatting as the other sheets.
 

  Select the range A1:B7 in the Lewiston worksheet. Group the Lewiston and   Summary worksheets. Fill formatting only across the grouped worksheets.

 

Ungroup the worksheets and change   the width of column B to 16 in the Summary worksheet.

 

You are ready to insert   functions with 3-D references in the Summary worksheet.
 

  In cell B4, insert a SUM function that calculates the total Dine-In sales for   the three cities.

 

Copy the formula in cell B4 and   use the Paste Formulas option in the range B5:B7 to preserve the formatting.

 

You are ready to display the   Contents worksheet and insert hyperlinks.
 

  • Insert a hyperlink in cell A3 that links to cell B7 in the Augusta sheet.   Include the ScreenTip text: Augusta total sales (no period).
  • Insert a hyperlink in cell A4 that links to cell B7 in the Portland sheet.   Include the ScreenTip text: Portland total sales (no period).
  • Insert a hyperlink in cell A5 that links to cell B7 in the Lewiston sheet.   Include the ScreenTip text: Lewiston total sales (no period).
  • Insert a hyperlink in cell A6 that links to cell B7 in the Summary sheet.   Include the ScreenTip text: Total sales for all locations (no period).

 

You want to create a data   validation rule.
 

  Select the range B3:B5 on the Future worksheet and add the following data   validation rule:
  • Allow Date between 3/1/2021 and 10/1/2021.
  • Enter the input message title: Proposed Date (no period).
  • Enter the input message: Enter the proposed opening date for this location. (including the period).
  • Select the Information error alert style.
  • Enter the error alert title: Confirm Date (no period).
  • Enter the error message: Confirm the date with the VP. (including the period).

 

You should test the validation   rule to ensure it works correctly.
 

  Enter 10/5/2021 in cell B3 and click OK in the   Confirm Date message box.

 

You want to unlock a range on   the Future worksheet to enable changes by users.
 

  Unlock the range B3:B5.

 

Now that the cells are unlocked,   you are ready to protect the Future worksheet.
 

  Protect the worksheet without a password and using the default settings.

 

Hide the Future worksheet.

 

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of the five visible worksheets.

 

Mark the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.

 

Save and close Exp19_Excel_Ch09_ML2_Pizza.xlsx. Exit   Excel. Submit the file as directed.

SE493 week 6 A

Assignment Description

Please read Chapter 11 of your textbook and review Lecture slides and IGU online library and reputable journals/resources and describe and explain Good practice guidelines for dependable programming.

Hint: You can find useful information in chapter 11 and lecture slides.

PreviousNext

Security Architecture and Design Individual Assignment 2

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. Report due by Saturday.

  1. System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.                                                                                 My definition immediately raises some important questions.                                                                                     • What are “components”?                                                                                                                                 • Which functions are relevant?                                                                                                                   • What is a communication flow?

CSS 300 Module 5 Activity Worksheet

 CSS 300 Module 5 Activity Worksheet
Use this worksheet to complete your lab activity. Submit it to the applicable assignment
submission folder when complete.
Deliverable:
– A word document answering the following questions
Using the Weather.csv dataset from Module 4
Part 1: Metrics for Evaluation
1. Calculate the following metrics: mean absolute error, mean squared error, root mean
squared error, and the R2 score. Use the following code samples:
print(‘Mean Absolute Error:’, metrics.mean_absolute_error(y_test,
y_pred))  
print(‘Mean Squared Error:’, metrics.mean_squared_error(y_test,
y_pred))  
print(‘Root Mean Squared Error:’,
np.sqrt(metrics.mean_squared_error(y_test, y_pred)))
print(‘R-squared Score:’, regressor.score(X, y))
Part 2: Model Refinement
1. Rerun the linear regression model from Module 4, but change the percentage of records
that are used for testing. Try using 0.25 and 0.3.
2. Calculate the same metrics from above.
3. Use a scatter plot to visualize all three models.
4. Evaluate the three models. Are any of them underfit or overfit? Which % of testing data
performed best? 

Exp22_Excel_Ch02_CumulativeAssessment_Inland_Jewelers

  Exp22_Excel_Ch02_CumulativeAssessment_Inland_Jewelers

  

Project Description:

You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.

Data Visualization

Select any example visualization or infographic and imagine the contextual factors have changed:

  1. If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
  2. If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
  3. What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
  4. What other data considerations should be considered and why?  
  5. Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.

Be sure to show the graphic (before and after updates) and then answer the questions fully above.  This assignment should take into consideration all the course concepts in the book.  Be very thorough in your response.  The paper should be at least three pages in length and contain at least two-peer reviewed sources.

Dissertation Timeline

 

Completion of the dissertation primarily rests upon you, the doctoral student. However, research indicates that self-regulated learning strategies predict the elapsed time along the dissertation journey (Dunn & Rakes, 2015; Kelley & Salisbury-Glennon, 2016). One such strategy is the creation of a timeline. This cyclical process has the learner plan out a task, monitor their performance along major milestones, reflect on their progress, and then use the reflection to adjust the timeline. However, to be effective, this strategy needs to be personalized for each learner’s purpose (Zimmerman, 2002).

Using the attached template as a guide, you are to create such a timeline – a roadmap, if you will, along your dissertation journey. Incorporated within the timeline are major milestones. Build into the timeline goals for each milestone with specific dates. You may also want to include specific contact information as well as possible obstacles that may arise. This will be a tool you will bring to each consultation with your professor/chair. Most importantly, it is to be a useable point of reference along your dissertation journey.

References

Dunn, K., & Rakes, G. (2015). Exploring online graduate students’ responses to online self-regulation training. Journal of Interactive Online Learning, 13(4), 1–21.

Kelley, M., & Salisbury-Glennon, J. (2016). The Role of Self-regulation in Doctoral Students’ Status of All But Dissertation (ABD). Innovative Higher Education41(1), 87–100.

Zimmerman, B. J. (2002). Becoming a self-regulated learner: An overview. Theory into Practice, 41(2), 64-70.