Discussion 300 words

 Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) 

Homework 2

 

This assignment is intended to help you learn to:

  • Summarize the security roles and responsibilities in an enterprise.
  • Summarize the purpose of information security policies, standards, procedures, and guidelines in an organization.
  • Reflect on the content of the class meeting.

Please use APA when you answer questions and quote someone 

Apply: Risk Register

 

Wk 4 – Apply: Risk Register [due Day 7]         

          

Assignment Content

  1.     Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

discussion

Regi grew up in a war zone where peace was a far-off dream. He lost his family due to the ravages of war, and eventually had to leave his home country. This drastically impacted his attitude and made him a strong advocate of peace in war-torn regions of the world.Regi became a professional hacker, listing his many services through one of the IRC channels. Hacking passwords was his specialty, and defacing Web sites, cracking software licenses, and reverse engineering applications were among his many talents. When the opportunity came along to support a noble cause he believed in, he took it.Frustrated by the many delays and hindrances in the way of the peace process in his home country, he planned to voice his concerns by targeting a Web site of one of the not-for-profit government organizations he was familiar with. He did not want any other child to lose their family like he did.While searching for target Web sites, Regi stumbled upon the government Web site XChil- drenrelief4U, a welfare organization Web site dedicated to the abolishment of child labor in the region. Regi ran an FTP brute force tool against the Web site and quickly cracked the admin pass- word. With the password, he logged onto the site and changed the Index.htm file. He posted: “Stop War, We Need Peace” to the logon page, deleted the log file, and logged out.

  • Do Regi’s reasons justify his action? Why or why not?
  • What are the possible consequences of Regi’s action?

Matlab

Write a function that takes 2, 3 by 3 matrices as arguments. The function should return two arguments. The first is a 3 by 3 matrix that is the second matrix subtracted from the first. The second should be scalar containing the Determinant of the returned matrix. Your function should also check for appropriate inputs and print an error statement if an input is incorrect.

Exp19_Access_Ch06_Cap – Insurance 1.0

Exp19_Access_Ch06_Cap – Insurance 1.0

Exp19 Access Ch06 Cap Insurance 1.0 

Access Chapter 6 Capstone – Insurance  

EX19_AC_CH06_GRADER_CAP

  

Project Description:

You have been asked to modify a database that tracks driver data and insurance details. You will update, add to, and delete records from tables. You will also create queries that aggregate data, find unmatched, and find duplicate values.

     

Start   Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Insurance. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Drivers table, observe the data, and then close the table. Create an   update query based on the Drivers table. Include all of the fields from the   table.

 

Set   the criteria to update Special   drivers to Senior.   Run the query, save it as Update Class,   and then close the query.

 

Create   a make table query based on the Drivers table. Include all of the fields from   the table. Set the criteria to select Senior   drivers. The query should make a new table named Non-Standard   Drivers   in the current database.

 

Run   the query, save it as Make Non-Standard   Drivers   and then close the query.

 

Make   a copy of the Make Non-Standard   Drivers query and save it as Append Non-Standard   Drivers.

 

Change   the query type to Append and   append records to Non-Standard Drivers.   Set the criteria to select Minor   drivers. Run, save, and then close the query.

 

Set   DriverID as the primary key field   of the Non-Standard Drivers table. Save and close the table.

 

Make   a copy of the Append Non-Standard   Drivers query and save it as Delete Non-Standard   Drivers.

 

Change   the query type to Delete. Set the   criteria to select Minor   or Senior drivers. Run, save, and then close the   query.

 

Create   a crosstab query based on the Non-Standard Drivers table. Set Class as the row heading field and Gender as the column heading field.   Summarize the data by counting the DriverIDs. Save the query using the   default name, and view the query results.

 

Modify   the query so that Class displays   as the column heading and Gender   displays as the row heading. Save the query as Non-Standard   Drivers_Crosstab and run the query.

 

Modify   the database (Non-Standard Drivers table) so that the gender M displays as Male and F displays as Female.   Run the crosstab query again to display the changes. Close the query.

 

Create   a find duplicates query based on the Drivers table where there is a repeated   LastName and Street value. Add the DriverID   and FirstName fields to the   query results. Save the query using the default name, and view the query   results. Note that Eric and Kirk Abelson live at the same address, but have   two different DriverIDs. In the Drivers table, expand the Subdatasheet for   Eric and notice that he carries insurance for both household vehicles. Close   the table and the query.

 

Create   an unmatched query to find drivers in the Drivers table who have no insurance   listed in the Insurance table. Include all fields from the Drivers table.   Save the query using the default name, and view the query results.

 

For   the driver named Lawrence Alexander, add a record to the Insurance table.   Enter the InsuranceID number as 10010,   the DriverID as 341890123,   and the Agent as AS8842.   Populate the remaining fields (AutoType, AutoYear, TagID, and TagExpiration)   with data of your choice. Close the table. Run the Drivers Without Matching Insurance query again. Note that   Lawrence Alexander no longer appears in the results, as you have used the query   to identify missing data and corrected the error. Kirk Abelson is covered   under the same policy as Eric, his father. Close the query.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

4 Discussions and 2 Case Study ( NO PLAGIARISM )

Discussion 6.1 (Computer Forensics)

You get a call from a high school student name Michael claiming that he just received an email from another student threating to commit a crime. Michael isn’t sure where the student sent the e-mail from. What should you do first in this situation?

Discussion 4.1 (Computer Forensic)

Explain how to identify an unknown graphics file format that your digital forensics tool doesn’t recognize.

Discussion 6.2 (Computer Forensics)

What are the places where a mobile device’s information might be stored?

Case Study 6.1 (Computer Forensics)

A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. Make sure you adhere to the grading rubric and write the report in APA format.

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited 
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Discussion 6.1 Executive Leader ship

Servant leadership emphasizes being able to serve and lead. In your opinion, is this contradictory or doable?

Discussion 6.2 Executive Leadership

Describe the different generations that make up what some people refer to as “generational diversity” and identify their unique characteristic. What are the implications of generational diversity on effective leadership?

Case Study 6.1 Executive Leadership

YOU make the Ethical Call: Ethical Assessment. Address the two questions associated with the Chapter Ten Ethical Call “Buy American” on page 371. 

Assignment must be in 7th edition APA compliance.

Please use this strategy when you analyze a case: 3-4 Pages

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)