discussion

Activity 10.2: Analyze a Phishing Email*

You probably already have great source material for this lab exercise: simply open your email spam folder and find a likely phishing attack email.

Part 1: Manually analyze an email header

Once you have identified a suspected phishing email, you will need to open the headers for the email. If you’re not familiar with the process, most email providers have help available on how to access the headers. It can help to print the headers out for analysis or to import them into your favorite text editor to allow for markup as you track what you have found.

Review the headers and identify what clues you can find. 

  Report on;

a) where it was sent from
b) who sent it, and
c) what path it traveled before you received it.
c) What red flags stand out,

d) What would you do to identify future phishing emails based on the header information?

Part 2: Analyze the email content

Now that you have reviewed the header, you can move on to the body of the email. In this phase, review the content of the message, paying particular attention to common artifacts found in phishing emails. You should look for embedded links and record any deceptive links or embeds. You can also identify typos, poor grammar, and other typical elements of a phishing email.

   Report on;

  1. Once you have identified these components, check the links against a tool like those found at zeltser.com/lookup-malicious-websites/.
  2. Is the link or domain a known-bad link?

Part 3: Use an automated tool

      Use one or more automated email header analyzers to review the header from part 1.

   Report on 

      if you identify additional useful data and what that data is.

      (Many sites are available; you can start with www.whatismyip.com/email-header-analyzer/ or mxtoolbox.com/EmailHeaders.aspx.)

Conclusion

Write a one paragraph conclusion on what you learned.

*Source

Chapple, Mike; Seidl, David. CompTIA CySA+ Study Guide Exam CS0-002 (p. 373). Wiley. Kindle Edition. 

Given the following code:

   

Given the following code:

05 IMPATIENS-COLOR PIC 9.

88 RED VALUE 1.

88 PINK VALUE 2.

88 ORANGE VALUE 3.

Write the EVALUATE statement to validate this input.

Write the code to count the number of occurrences of the digit 6 until the first space is encountered in ITEM. Use A-COUNT as the storage parameter.

Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use an in-line PERFORM UNTIL.

Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use a PERFORM paragraph-name ..TIMES.

Given the following code:

MOVE 10 TO NUM

MOVE 1 TO TOTAL

PERFORM 200-TOTAL-RTN 5 TIMES

200-TOTAL-RTN.

MULTIPLY TOTAL BY NUM

DISPLAY TOTAL..

a) Recode this using an in-line PERFORM N TIMES.

b) What is output?

How do you create an object of a class, in COBOL?

Write the code to test if ITEM contains both letters and numbers.

Drawing diagram

The questions are related to MIS report that I uploded

2.1 Requirement determination: Identify and define functional and non- functional requirements. Several data collection or fact finding techniques; such as interview, online research, on site observation, document analysis, structured questionnaires, and survey, can be utilized by the students to identify the functional and non-functional requirements for their proposed system.

2.2  Requirement structuring – Process modelling: Draw a DFD diagram (all the possible level) based on the identified function requirements.

2.3 Requirement structuring – data modelling: Draw a conceptual EER diagram.

Mock Dissertation

 

As you observed in the LIVE session, there is a connection between chapter three and chapter one. Therefore, as an extension of our week in the mock chapter three from last week, we will write a mock chapter one. For the sake of preparation, we will be using the required headings from the University of the Cumberlands Dissertation Handbook.  Like we discuss in class, each university has unique parameters for what they expect in chapter one, so you may see papers from other universities that look slightly different. The importance here is to focus on the content, not necessarily the organization. This assignment will help determine your readiness to write a full-length chapter one.

Directions:

  1. Review the rubric and examples to make sure that you understand what is expected of you in this assignment.
    1. Chapter One Samples.pdf
    2. Rubric for Chapter One.docx 
  2. Develop a 3-4 page (more is fine) mock chapter one to include the following expectations from the university:
    • Overview (1-2 well developed paragraphs)
    • Background and problem statement (1-2 well developed paragraphs)
    • Purpose of the study (1 well developed paragraph)
    • Significance of the study (1 well developed paragraph)
    • Research Questions (numbered list)
    • Limitations of the Study (1 short paragraph)
    • Assumptions (1 short paragraph)
    • Definitions (list)
    • Summary (1 well developed paragraph)

IT476 week 4

After you review Chapters 3 in your textbook and review all course materials in Module 4, please answer the following two questions:

1- What is the difference between a multi-valued attribute and a composite attribute? Give examples.

2- Create an ERD for the following requirements (You can use Dia diagramming tool to create your ERD):
Some Tiny College staff employees are information technology (IT) personnel. Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both. IT personnel are not professors; they are required to take periodic training to retain their technical expertise. Tiny College tracks all IT personnel training by date, type, and results (completed vs. not completed).

300 words

 

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD 

week-10

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

Who is likely to attack your site? When are attacks likely to occur? What sort of attacks might take place? How can you best minimize attacks and protect the integrity of your site?

Excel Skills

 

Click on USA3-Steel.xlsx (this is the document that you will be formatting according to the instructions) 

Click on Excel Assessment.docx (this is the instruction sheet for formatting (USA3-Steel spreadsheet)

DS Wk3

2 pages or 550 words

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

Arrays

Please read below and respond with 150 words or more.

 

Data structure is useful and important in programming because they  help us understand the nature of the problem at a deeper level. Data  structures are a particular way or organizing data in a computer so that  the data may be used effectively. There are many different data  structures such as binary tree, hashing, graph, matrix, and array. An  example of a data structure using the same data type is the array. 

Arrays are commonly used in computer programs to organize data so  that a related set of values can be easily sorted or searched.and when  to use the array. Arrays are extremely powerful data structures that  store elements of the same type. The type of elements and the size of  the array are fixed and defined when you create it.

To understand how an array works, it may help to imagine a computer’s  memory as a grid. An array takes advantage of this grid-like structure  to store lists of related information in adjacent memory locations. This  guarantees efficiency for finding those values. Memory is allocated  immediately after the array is created and it’s empty until you assign  the values. Arrays are classified as Homogeneous Data Structures because  they store elements of the same type. They can store numbers, strings,  boolean values (true and false), characters, objects, and so on and so  forth. Once the type of values that your array will store are defined,  the array’s elements must be that same type. You cannot mix and match  different types of data, such as letters and numbers.