Relate any incident you have been involved with that relates to a web security issue
hacking on social media platform
Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template.
Discussion 13- Exe Project
Assigned Readings:Chapter 13. Project Evaluation and Control Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:
- It has been said that Earned Value Management (EVM) came about because the Federal Government often used “Cost-plus” contractors with project organizations. Cost-plus contracting allows the contractor to recover full project development costs plus accumulate profit from these contracts. Why would requiring contractor firms to employ earned value management help the government hold the line against project cost overruns?
Text
Title: Project Management
ISBN: 9780134730332
Authors: Pinto
Publisher: Pearson
Edition: 5TH 19
Benchmark – Framework Compliance Assessment Report
Using all of the previous assignment information, students will create a Cybersecurity Risk Report that helps their proposed business manage cybersecurity risks.
Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.
APA style is not required, but solid academic writing is expected.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.
This benchmark assignment assesses the following programmatic competencies:
MS Cybersecurity
2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.
2.3: Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic initiatives.
CBSC final paper
Write a 5 to 7 page paper (not including title and reference pages) in which you examine a code of ethics for a professional organization, business, or government agency, and write a critique of it. In your paper, determine the entity’s priorities and whose interests the code serves.
Write a program that performs
Write a program that performs the brute-force attack to break the password. The following
table shows encrypted passwords using the crypt() function. Your mission is to break the
password ***** your CWID in the table. For example, the last digit of your CWID
is 1, then you should identify the password ***** indBOW06MoVz6.
Last digit of CWID Encrypted password
1 – indBOW06MoVz6
2 – in79RsnfG/VWo
3 – inbqJM0dLgWvo
4 – incT1ji3YqQ/Y
5 – in7haMV00ylgk
6 – in1U0tb9WpIcI
7 – inPlXS.yNKivQ
8 – inqidvfWapJp2
9 – injY7hdQJTeu2
0 – inQW.HgtuEe.M
Crypt() is a function to check UNIX/LINUX passwords, and the encrypted passwords
above are encoded by the standard crypt() function. Hence, you should use the crypt()
function to break the password. The crypt() function takes two input parameters and
returns the encrypted password, as follows:
Input parameters:
• Password (plaintext): string
• Salt: string
Output:
• Encrypted password: stringThe password ***** is six and the salt is set to ‘infosec’ (without using the quotation
mark). For the brute-force attack, you should try 6-character lower case letters of alphabet
from ‘aaaaaa’, ‘aaaaab’, ‘aaaaac’, …, to ‘zzzzzz’, with the salt. Report the original plaintext
password ***** breaking the encrypted password (one based on your CWID). Also report
how many words you tested to find the original password.
IT214 Week 4
Discussion:
What property does “Row, Row, Row Your Boat” and “Frere Jacques” have in common?
Would any tune work just as well? Suggest one as a test case.
Respond to at least two other students
Effectiveness of mobile app for anxiety and depression in usability perspective
write conclusion in 3 pages on effectiveness of mobile app for anxiety and depression(double spaced APA formatted)with references
Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll
Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll
Exp19_Excel_Ch02_ML1_Payroll
Project Description:
As manager of the gift shop at the Metropolitan Zoo, you are responsible for managing the weekly payroll. Your assistant developed a partial worksheet, but you need to enter the formulas to calculate the regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay. In addition, you want to include total pay columns and calculate some basic statistics. As you construct formulas, make sure you use absolute and relative cell references correctly in formulas.
Start Excel. Download and open the file named Exp19_Excel_Ch02_ML1_Payroll.xlsx. Grader has automatically added your last name to the beginning of the filename.
Use IF functions to calculate the regular pay and overtime pay based on a regular 40-hour workweek in cells E5 and F5. Pay overtime only for overtime hours. In cell G5, calculate the gross pay based on the regular and overtime pay. Abram’s regular pay is $398. With 8 overtime hours, Abram’s overtime pay is $119.40.
Create a formula in cell H5 to calculate the taxable pay. Multiply the number of dependents (column B) by the deduction per dependent (B24) and subtract that from the gross pay. With two dependents, Abram’s taxable pay is $417.40.
Use a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. Use the tax rates from the range D21:E25. The VLOOKUP function returns the applicable tax rate, which you must then multiply by the taxable pay.
Calculate FICA in cell J5 based on gross pay and the FICA rate (cell B23), and calculate the net pay in cell K5. Copy all formulas down their respective columns to row 16.
With the range E5:K16 selected, use Quick Analysis tools to calculate the total regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay on row 17.
Note, Mac users, with the range selected, on the Home tab, in the Editing group, click AutoSum.
Apply Accounting Number Format to the range C5:C16. Apply Accounting Number Format to the first row of monetary data and to the total row. Apply the Comma style to the monetary values for the other employees. Apply the Total cell styles format to the range E17:K17.
Insert appropriate functions to calculate the average, highest, and lowest values in the Summary Statistics area (the range I21:K23) of the worksheet. Format the # of hours calculations as Number format with one decimal and the remaining calculations with Accounting number format.
Insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of the worksheet.
Save and close the workbook. Submit the file as directed.
security
Journal Reflection on progress
Please reflect on your dissertation progress
Topic – The Smart Phone as a Dangerous Technology
500 words APA format with references needed