Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example: Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)
Homework 2
This assignment is intended to help you learn to:
- Summarize the security roles and responsibilities in an enterprise.
- Summarize the purpose of information security policies, standards, procedures, and guidelines in an organization.
- Reflect on the content of the class meeting.
Please use APA when you answer questions and quote someone
Apply: Risk Register
Wk 4 – Apply: Risk Register [due Day 7]
Assignment Content
- Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.
Complete the following tasks:
- Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
- Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
- Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
- Submit your risk register with the response strategy and explanation.
Note: A Risk Register template is available, but it is not required that you use it.
Computer science
Discuss importance of database nomalization
What is computer science
discussion
Regi grew up in a war zone where peace was a far-off dream. He lost his family due to the ravages of war, and eventually had to leave his home country. This drastically impacted his attitude and made him a strong advocate of peace in war-torn regions of the world.Regi became a professional hacker, listing his many services through one of the IRC channels. Hacking passwords was his specialty, and defacing Web sites, cracking software licenses, and reverse engineering applications were among his many talents. When the opportunity came along to support a noble cause he believed in, he took it.Frustrated by the many delays and hindrances in the way of the peace process in his home country, he planned to voice his concerns by targeting a Web site of one of the not-for-profit government organizations he was familiar with. He did not want any other child to lose their family like he did.While searching for target Web sites, Regi stumbled upon the government Web site XChil- drenrelief4U, a welfare organization Web site dedicated to the abolishment of child labor in the region. Regi ran an FTP brute force tool against the Web site and quickly cracked the admin pass- word. With the password, he logged onto the site and changed the Index.htm file. He posted: “Stop War, We Need Peace” to the logon page, deleted the log file, and logged out.
- Do Regi’s reasons justify his action? Why or why not?
- What are the possible consequences of Regi’s action?
Matlab
Write a function that takes 2, 3 by 3 matrices as arguments. The function should return two arguments. The first is a 3 by 3 matrix that is the second matrix subtracted from the first. The second should be scalar containing the Determinant of the returned matrix. Your function should also check for appropriate inputs and print an error statement if an input is incorrect.
Exp19_Access_Ch06_Cap – Insurance 1.0
Exp19_Access_Ch06_Cap – Insurance 1.0
Exp19 Access Ch06 Cap Insurance 1.0
Access Chapter 6 Capstone – Insurance
EX19_AC_CH06_GRADER_CAP
Project Description:
You have been asked to modify a database that tracks driver data and insurance details. You will update, add to, and delete records from tables. You will also create queries that aggregate data, find unmatched, and find duplicate values.
Start Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Insurance. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
Open the Drivers table, observe the data, and then close the table. Create an update query based on the Drivers table. Include all of the fields from the table.
Set the criteria to update Special drivers to Senior. Run the query, save it as Update Class, and then close the query.
Create a make table query based on the Drivers table. Include all of the fields from the table. Set the criteria to select Senior drivers. The query should make a new table named Non-Standard Drivers in the current database.
Run the query, save it as Make Non-Standard Drivers and then close the query.
Make a copy of the Make Non-Standard Drivers query and save it as Append Non-Standard Drivers.
Change the query type to Append and append records to Non-Standard Drivers. Set the criteria to select Minor drivers. Run, save, and then close the query.
Set DriverID as the primary key field of the Non-Standard Drivers table. Save and close the table.
Make a copy of the Append Non-Standard Drivers query and save it as Delete Non-Standard Drivers.
Change the query type to Delete. Set the criteria to select Minor or Senior drivers. Run, save, and then close the query.
Create a crosstab query based on the Non-Standard Drivers table. Set Class as the row heading field and Gender as the column heading field. Summarize the data by counting the DriverIDs. Save the query using the default name, and view the query results.
Modify the query so that Class displays as the column heading and Gender displays as the row heading. Save the query as Non-Standard Drivers_Crosstab and run the query.
Modify the database (Non-Standard Drivers table) so that the gender M displays as Male and F displays as Female. Run the crosstab query again to display the changes. Close the query.
Create a find duplicates query based on the Drivers table where there is a repeated LastName and Street value. Add the DriverID and FirstName fields to the query results. Save the query using the default name, and view the query results. Note that Eric and Kirk Abelson live at the same address, but have two different DriverIDs. In the Drivers table, expand the Subdatasheet for Eric and notice that he carries insurance for both household vehicles. Close the table and the query.
Create an unmatched query to find drivers in the Drivers table who have no insurance listed in the Insurance table. Include all fields from the Drivers table. Save the query using the default name, and view the query results.
For the driver named Lawrence Alexander, add a record to the Insurance table. Enter the InsuranceID number as 10010, the DriverID as 341890123, and the Agent as AS8842. Populate the remaining fields (AutoType, AutoYear, TagID, and TagExpiration) with data of your choice. Close the table. Run the Drivers Without Matching Insurance query again. Note that Lawrence Alexander no longer appears in the results, as you have used the query to identify missing data and corrected the error. Kirk Abelson is covered under the same policy as Eric, his father. Close the query.
Close all database objects. Close the database and then exit Access. Submit the database as directed.
4 Discussions and 2 Case Study ( NO PLAGIARISM )
Discussion 6.1 (Computer Forensics)
You get a call from a high school student name Michael claiming that he just received an email from another student threating to commit a crime. Michael isn’t sure where the student sent the e-mail from. What should you do first in this situation?
Discussion 4.1 (Computer Forensic)
Explain how to identify an unknown graphics file format that your digital forensics tool doesn’t recognize.
Discussion 6.2 (Computer Forensics)
What are the places where a mobile device’s information might be stored?
Case Study 6.1 (Computer Forensics)
A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. Make sure you adhere to the grading rubric and write the report in APA format.
Writing Requirements
- 2-3 pages in length (excluding cover page, abstract, and reference list)
- Include at least two peer reviewed sources that are properly cited
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.
- Please use the Case Study Guide as a reference point for writing your case study.
Discussion 6.1 Executive Leader ship
Servant leadership emphasizes being able to serve and lead. In your opinion, is this contradictory or doable?
Discussion 6.2 Executive Leadership
Describe the different generations that make up what some people refer to as “generational diversity” and identify their unique characteristic. What are the implications of generational diversity on effective leadership?
Case Study 6.1 Executive Leadership
YOU make the Ethical Call: Ethical Assessment. Address the two questions associated with the Chapter Ten Ethical Call “Buy American” on page 371.
Assignment must be in 7th edition APA compliance.
Please use this strategy when you analyze a case: 3-4 Pages
- Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
- List all indicators (including stated “problems”) that something is not as expected or as desired.
- Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
- Identify the areas that need improvement (use theories from your textbook)
- Specify and prioritize the criteria used to choose action alternatives.
- Discover or invent feasible action alternatives.
- Examine the probable consequences of action alternatives.
- Select a course of action.
- Design and implementation plan/schedule.
- Create a plan for assessing the action to be implemented.
- Conclusion (every paper should end with a strong conclusion or summary)
Write a function in Calculus λ that returns a list with the path from a to b in a graph
Write a function in Calculus λ that takes as input a directed graph, g, and the identifiers of two vertices, a and b, and returns a list with the path from a to b. If there is no path from a to b your function should return the empty list.
You can represent the graph as you see fit (and explain it) and you can also identify the vertices as you see fit.
KP Chapter 15 & 16
Reflection Paper