please explain the purpose of using the password cracking utilities and discuss the relevance to cybersecurity.
Problem 7- Legal
Question I – At the end of a long day, Sabrina, a cashier for a supermarket is counting the paper money. One of the bills falls from the cash register into the bottom of Sabrina’s purse. What elements of embezzlement are present in this situation? Should Sabrina be convicted of embezzlement? Why or why not?
Question II – Fort Thomas Living is a small publishing company located in the Northern Kentucky. Recently, Fort Thomas Living has contracted with several different local writers to publish various magazines and short-story books. Once such transaction involves an exchange of $10,200. Another transaction involves an exchange of $9,600? Are both of these exchanges of money subject to the disclosure requirements of the Money Laundering Control Act?
Text
Title: Business
ISBN: 9780357447642
Authors: Marianne M. Jennings
Publication Date: 2021-01-01
Edition: 12th Edition
CASE STUDY AND ARTICLE REVIEW
Please see the documents. Each one need 3 pages without heading and references.
Clients stay in
Question 1
An adventure holiday firm organizes “adventure holidays” and wants to set up
a database to aid its business. The company owns a group of cabins in the
mountains at its headquarters, alongside a river. It also owns several rafts for
river-rafting. It organizes Clients to go on Rafting Trips, which can last just a
few hours, or several days, down different rivers, ‘shooting’ rapids of various
levels of difficulty, and camping on the bank of the river at night
They take bookings from Holiday-Groups, made up of one or more Clients.
(Clients prefer to book this way because Holiday-Groups get a discount on the
price of a holiday.) Holiday-Groups arrive and leave together, but the
individuals who make up a Holiday-Group do not necessarily all take part in
identical activities while on the holiday. Each Holiday-Group gets a unique
code.
A Client is identified by his Holiday Group Code plus a unique number. Each
Holiday-Group chooses one of their members as Group Coordinator. We also
record each Client’s first name and family name.
Holiday-Groups arrive and depart from the company’s headquarters together,
but may go on different river rafting expeditions while they are there. For
example, in a group which is staying for two weeks, one client may choose to
go on the ten-day rafting adventure, while another in the group may choose to
go on several shorter adventures.
Clients stay in Cabins. There may be one, two, or more Clients to a Cabin. A
Cabin has a unique Cabin-Name, and a daily rate, and can have one, two, or
three bedrooms. We want to record this information. No Cabin ever has
members of more than one Holiday-Group in it at the same time, but of course
a Holiday-Group may occupy more than one cabin. Cabins may be
unoccupied.
A Rafting-Trip has a start-date, and duration which can be from 1 to 14 days.
A Rafting-Trip will use only one raft. (The company has rafts with different
passenger capacities.)
A Rafting-Trip consists of a group of Clients, who may be from several
different Holiday-Groups. A Rafting-Trip starts on a given date. All Rafting
Trips start from the same location, but can end at different End-Locations
along the river. (The company arranges for rafters and their raft to be picked
up at the End-Location and returned to company headquarters at the end of a
Rafting Trip.)
A Rafting-Trip is always led by a company Employee, called a Raft-Master,
who is identified by his Employee-Number and Start-Date. Employees are
identified by Employee-Numbers; End-Locations are identified by GPSCoordinates
translated into an eight-digit number. For each End-Location we
record a brief description, and an average journey-time to the End-Location from the starting location. Each Employee has his Employee-Number
recorded, and his First and Family names.
A. Draw an Entity/Relationship Diagram that expresses the relationships
among the entity types described above. Assume that we model Holiday-Groups,
Clients, Employees, Rafting-trips, Cabins and Locations as entity
types. You need not indicate the attributes of each entity type.
B. Design a fully normalized relational schema that can capture the data
relationships expressed in your Entity-Relationship diagram.
Your schema should be able to capture the following example data. Populate
your proposed relations with this data.
A Client whose name is Michael Saville, is part of a Holiday-Group whose
HolidayGroupCode is E45; his unique number is 27, and he is staying in the
Cabin whose name is ‘Pioneer’. Staying in the same cabin, and a member of
the same group, is Ibrahim Jaffar, whose unique number is. 28. Group E45
arrived on the 1st of September 2014 and left on the 15th. Another Client is
Sundar Singh, whose unique number is 27, and whose HolidayGroupCode is
E53. The ‘Pioneer’ cabin has three bedrooms and a daily rate of £150.
Another cabin, ‘The Little Lodge’, has 2 bedrooms and a daily rate of £125.
Sundar Singh is staying here.
All three of them are going on a Rafting-Trip led by the employee whose
EmployeeNumber is E345, and whose name is Jumaane Ban!, starting on the
5th of September, and ending at a destination whose GPS Co-ordinates are
23455733. This End-Location takes an average of 3 days to reach, and has
the note ‘Locked gate – bring key’.
Netlab 4
Complete Netlab 4 and submit your lab summary here.
NETLAB 4. A. Web Pen-Testing.
- Scanning with Nikto.
- Setting up Burp Suite.
- Building a site man with Burp Suite.
- Brute forcing a Web Application.
NETLAB 4. B. Client Side Exploitations.
- Hooking Web Browsers with BeEF Framework
- Clients Exploitation with BeEF Framework.
NETLAB 4. C. ARP Spoofing And MiTM Attacks.
- ARP Spoofing with ettercap.
- Capturing web usernames and passwords
- Maniputaing HTTP images.
- Manipulating Java scripts.
Draft paper
Instructions
This is where you will submit the rough draft of your research paper. Research Paper Criteria: You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. The research paper specifications are as follows:
- 8-10 pages (double-spaced) Times New Roman 12 pt font.
- Must have Abstract, Table of Contents, Introduction, Conclusion and section headings
- Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
- In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!
- You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.
- Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
- Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
VBScript Database QueryLab Report
VBScript Database QueryLab Report
Task 4: Write and Run Database Query Program 1
In this scenario, we need to query the Computer database to determine which computers need to be replaced. Our decision will be based on the CPU speed, Number of Processors and the size of the Hard Drive.
· In the space provided in your Lab Report document, paste your modified VBScript program and the RUN.
In the table cell below, paste your ComputerReplace.vbs Program
In the table cell below, paste the desktop RUN from your ComputerReplace.vbs Program
Task 5: Write and Run Database Query Program 2
In this scenario, we need to upgrade our company computers based on the Operating System and the amount of memory. We want to ensure that all Fedora 10 machines are upgrade to Fedora 14 and all Windows XP machines are upgraded to Windows 7. If we find any computers with only 2 GB of memory, we will upgrade the memory to 4 GB.
In the table cell below, paste your ComputerUpgrade.vbs Program
Message Authentication
- 3.1 List three approaches to message authentication.
- 3.2 What is a message authentication code?
- 3.4 What properties must a hash function have to be useful for message authentication?
- 3.5 In the context of a hash function, what is a compression function?
- 3.6 What are the principal ingredients of a public-key cryptosystem?
- 3.7 List and briefly define three uses of a public-key cryptosystem.
- 3.8 What is the difference between a private key and a secret key?
- 3.9 What is a digital signature?
COSO Framework
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
