Research Paper

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PRU

 

Picnics R Us (PRU) is a small catering firm with five employees. During a typical summer weekend, PRU caters fifteen picnics with twenty to fifty people each. The business has grown rapidly over the past year, and the owner wants to install a new computer system for managing the ordering and buying process. PRU has a set of ten standard menus. When potential customers call, the receptionist describes the menus to them. If the customer decides to book a picnic, the receptionist records the customer information (e.g., name, address, phone number) and the information about the picnic (e.g., place, date, time, which one of the standard menus, total price) on a contract. The customer is then faxed a copy of the contract and must sign and return it along with a deposit (often a credit card or by debit card) before the picnic is officially booked. The remaining money is collected when the picnic is delivered. Sometimes, the customer wants something special (e.g., birthday cake). In this case, the receptionist takes the information and gives it to the owner, who determines the cost; the receptionist then calls the customer back with the price information. Sometimes the customer accepts the price; other times, the customer requests some changes that have to go back to the owner for a new cost estimate. Each week, the owner looks through the picnics scheduled for that weekend and orders the supplies (e.g., plates) and food (e.g., bread, chicken) needed to make them. Th e owner would like to use the system for marketing as well. It should be able to track how customers learned about PRU and identify repeat customers, so that PRU can mail special offers to them. The owner also wants to track the picnics for which PRU sent a contract, but the customer never signed the contract and actually booked a picnic.

Typically, the current system is analyzed, and then requirements set for the new system based on that.

Do a first-pass analysis of this system

 

Part 3: Create a package/deployment diagram.

Design the HCI layer (non-functional prototype is acceptable).

Need it done ASAP

Need help in Homework in emerging threats

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper. 

Need 2 papers.

PowerPoint_1G_Northern_Lights

 

#PowerPoint_1G_Northern_Lights

#PowerPoint 1G Northern Lights

Open   the file Student_PowerPoint_1G_ Northern_Lights.pptx downloaded with this project.

Replace all occurrences of the   text North with Northern and then change layout of Slide   1 to Title Slide.

Apply the Ion theme with the   second, blue variant to the presentation.

Change the Slide Size to   Widescreen (16:9).

Display Slide 2, open the Reuse   Slides pane, and then from your downloaded files browse for and display the   presentation p01G_Slides.pptx. If   necessary, clear the Keep source formatting check box, and then insert the   last two slides.
   Note, Mac users, after importing the slides, delete Slide 3-Alaska Slides

Display Slide 2. In either the   slide pane or in the slide outline,  click at the end of the first bullet   point after the word time. Press   SPACEBAR. Add the words for viewing and then in the same slide, increase the list   level of the second and third bullet points.
 

With Slide 2 still displayed,   select the title and change the Font Size to 32. In the Notes pane, type the   following notes: The lights reach their peak in September and March. Be sure to type the period at   the end of the sentence.
 

Display Slide 3. Select the   paragraph of text, and then change the  Font Color to in the last column, the   third color. Change the Font  Size to 16, and then apply Bold.

In the same paragraph, change the Line Spacing to 1.5, and then   center the paragraph and the slide title.

With Slide 3 still displayed,   format the picture with the Soft Edge Rectangle picture style and the Marker   artistic effect.

Display Slide 4. In the content placeholder on the right, from your   downloaded files, insert the picture p01G_Lights.jpg.   Apply the Reflected Rounded Rectangle picture style.

Move Slide 3 between Slides 1   and 2.
 

Display Slide 4. Insert a New   Slide with the Section Header layout. In the title placeholder, type Visit   Fairbanks and View the Northern Lights! In the text placeholder type With Kodiak   West Travel

Apply the Uncover transition and   change the Effect Options to From  Top. Change the Timing by increasing the   Duration to 01.25. Apply the  transition effect to all of the slides.

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, a Footer with  the text 1G_Northern_Lights and then apply to all the   slides.

Display the Document Properties.   Type northern   lights, Fairbanks   as the Tags.
   Note—Mac users use the Keywords box.

SECURITY POLICY & STANDARTS

Discuss the following questions:

“You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from the speakers.”

After reading  this scenario, answer the following questions:

1.What is the first possible diagnosis that comes to your mind?

2.What is the first step you would take in this situation?

3.What is the second step that you would take in this situation?

4.Please start a thread and respond to your colleagues at-least twice.

 

Please write a one page answer for both the questions above.

Creating good password security

 An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case, and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old PW before creating a new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as a password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations along with 2 references.  Do you agree or disagree with these recommendations? Would you change, add or delete any of these?  Add additional criteria as you see necessary. 

Discussion 5- Proj Risk

Assigned Readings:Chapter 11: Project Risk Knowledge ManagementChapter 12: Cultural Shaping of RiskInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:Risk concerns both positive and negative aspects of a possible event. For example, when the covid 19 crisis took place this offered an unexpected business advantages or new product for certain organizations – a positive risk came to volition for that organization.  For example, when the covid 19 crisis took place this offered an unexpected negative risk, no one would come to your movie theatre, to come to volition for some organizations.  

  1. How should an organization prepare for either type of event?
  2. How should a business avoid negative events occuring and enahnce opportunity for positive events?
  3. Explain the concept of a Pareto Chart – provide an example – explain how the concept of the Pareto Chart might be used in making decisioins about handling negative risks which could impact a project or organization.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text

Title: Managing Project Risks; 464 Pages ISBN: 978-1-119-48975-7 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: Wiley-Blackwell Publication Date: 2019 

Graduate Research & Critical Analysis january 7

Written Assignments Content

  1. Autobiography: Write a 3 paragraph, 500-word autobiography (written in 1st person) that describes:
    • your life to this point including where you were born and an interesting fact about where you were born;
    • your education and experience in your major area of study;
    • and the goals you set for yourself after you obtain your MBA.