hacking on social media platform

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template.

Discussion 13- Exe Project

Assigned Readings:Chapter 13. Project Evaluation and Control Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. It has been said that Earned Value Management (EVM) came about because the Federal Government often used “Cost-plus” contractors with project organizations.  Cost-plus contracting allows the contractor to recover full project development costs plus accumulate profit from these contracts.  Why would requiring contractor firms to employ earned value management help the government hold the line against project cost overruns?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text 

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Benchmark – Framework Compliance Assessment Report

 

Using all of the previous assignment information, students will create a Cybersecurity Risk Report that helps their proposed business manage cybersecurity risks.

Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.

2.3: Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and Methodologies to establish a Cybersecurity Program that supports an organization’s strategic initiatives.

CBSC final paper

Write a 5 to 7 page paper (not including title and reference pages) in which you examine a code of ethics for a professional organization, business, or government agency, and write a critique of it. In your paper, determine the entity’s priorities and whose interests the code serves.

Write a program that performs

Write a program that performs the brute-force attack to break the password. The following

table shows encrypted passwords using the crypt() function. Your mission is to break the

password ***** your CWID in the table. For example, the last digit of your CWID

is 1, then you should identify the password ***** indBOW06MoVz6.

Last digit of CWID Encrypted password

1 – indBOW06MoVz6

2 – in79RsnfG/VWo

3 – inbqJM0dLgWvo

4 – incT1ji3YqQ/Y

5 – in7haMV00ylgk

6 – in1U0tb9WpIcI

7 – inPlXS.yNKivQ

8 – inqidvfWapJp2

9 – injY7hdQJTeu2

0 – inQW.HgtuEe.M

Crypt() is a function to check UNIX/LINUX passwords, and the encrypted passwords

above are encoded by the standard crypt() function. Hence, you should use the crypt()

function to break the password. The crypt() function takes two input parameters and

returns the encrypted password, as follows:

Input parameters:

• Password (plaintext): string

• Salt: string

Output:

• Encrypted password: stringThe password ***** is six and the salt is set to ‘infosec’ (without using the quotation

mark). For the brute-force attack, you should try 6-character lower case letters of alphabet

from ‘aaaaaa’, ‘aaaaab’, ‘aaaaac’, …, to ‘zzzzzz’, with the salt. Report the original plaintext

password ***** breaking the encrypted password (one based on your CWID). Also report

how many words you tested to find the original password.

IT214 Week 4

Discussion:

What property does “Row, Row, Row Your Boat” and “Frere Jacques” have in common?
Would any tune work just as well? Suggest one as a test case.

Respond to at least two other students 

Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll

 Exp19_Excel_Ch02_ML1_Metropolitan_Zoo_Gift_Shop_Weekly_Payroll

 Exp19_Excel_Ch02_ML1_Payroll 

  

Project Description:

As manager of the gift shop at the Metropolitan Zoo, you are responsible for managing the weekly payroll. Your assistant developed a partial worksheet, but you need to enter the formulas to calculate the regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay. In addition, you want to include total pay columns and calculate some basic statistics. As you construct formulas, make sure you use absolute and relative cell references correctly in formulas.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch02_ML1_Payroll.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

 

Use IF functions to calculate   the regular pay and overtime pay based on a regular 40-hour workweek in cells   E5 and F5. Pay overtime only for overtime hours. In cell G5, calculate the   gross pay based on the regular and overtime pay. Abram’s regular pay is $398.   With 8 overtime hours, Abram’s overtime pay is $119.40.

 

Create a formula in cell H5 to   calculate the taxable pay. Multiply the number of dependents (column B) by   the deduction per dependent (B24) and subtract that from the gross pay. With   two dependents, Abram’s taxable pay is $417.40.

 

Use a VLOOKUP function in cell   I5 to identify and calculate the federal withholding tax. Use the tax rates   from the range D21:E25. The VLOOKUP function returns the applicable tax rate,   which you must then multiply by the taxable pay.

 

Calculate FICA in cell J5 based   on gross pay and the FICA rate (cell B23), and calculate the net pay in cell   K5. Copy all formulas down their respective columns to row 16.

 

With the range E5:K16 selected,   use Quick Analysis tools to calculate the total regular pay, overtime pay,   gross pay, taxable pay, withholding tax, FICA, and net pay on row 17.
 

  Note, Mac users, with the range selected, on the Home tab, in the Editing   group, click AutoSum.

 

Apply Accounting Number Format to the range C5:C16. Apply   Accounting Number Format to the first row of monetary data and to the total   row. Apply the Comma style to the monetary values for the other employees.   Apply the Total cell styles format to the range E17:K17.

 

Insert appropriate functions to   calculate the average, highest, and lowest values in the Summary Statistics   area (the range I21:K23) of the worksheet. Format the # of hours calculations   as Number format with one decimal and the remaining calculations with   Accounting number format.

 

Insert a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of the worksheet.

 

Save and close the workbook.   Submit the file as directed. 

security

 Journal Reflection on progress 

Please reflect on your dissertation progress 

Topic –  The Smart Phone as a Dangerous Technology

500 words APA format with references needed