Computer Security – Industrial Espionage In Cyberspace

 

Solve/Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is  passed over for promotion three times. He is quite vocal in his  dissatisfaction with this situation. In fact, he begins to express  negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s  departure, it is discovered that a good deal of the ABC Company’s  research has suddenly been duplicated by a competitor. Executives at ABC  suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the  interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Requirements:

Write your answer using a WORD document with approximately 400 to 500 words

APA format in-text citations & references

No plagiarism 

Discussion

Initial Post

There are countless graphs and charts to choose from when converting raw data into a visual format. For many, it can be difficult to decide whether to rely on a straightforward pie chart or bar graph or to opt for a more spatially complex chart type.

Two common questions we often hear are: “How do you know which graph to use?” and “How do you know which chart to use?” The answer, as always, depends on the nuances of your readership, including their experience level and familiarity with big data analytics.

Based upon your understanding of data visualizations, what are 5 Data Visualization pitfalls? What would you do to fix these pitfalls? How can you avoid making future mistakes in your own visualizations?

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

3 Discussions ,, 1 case study,, 1 Weekly Summary and 1 Book Review.

Discussion 3.1

In the book, there are seven steps of an attack.  What are they?, Which step do you think is the most important?  Why?  Which one do you think is the least important?  Why?

Discussion 3.2

How would you use automation during the reconnaissance phase? Why would you use automation?  Should you rely solely on automation?   Why or why not?  

Discussion 3.3

What are shell scripts? How are shell scripts used in hacking? find an example of a UNIXLinux shell script that asks you your name and then prints your name in the output of the script. Describe what is happening in the shell script. Test the example in your work environment. An extra 5 points will be added to your  discussion grade if the script in your environment runs.

Case Study 3.1

In these chapters, you just read about the reconnaissance phase.  You are an attacker and want to break into a company’s network.  In a 3 to 4 page paper describe how you proceed in the reconnaissance phase.  Include the different items you would look for, steps you would take to get those items, and what you would do with those items once you acquired them.    Be sure to cite references.  Make sure you use APA format and adhere to the writing rubric.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least 2-3 peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Weekly Summary 3.1 

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

This is not a review of the book this is to be your personal views on the lectures and presentations.

Book Review Chapter 3

After reading, chapter 3, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on the topics found on pages 75 and 76 of the Don’t’ Forget section book.

Incident Response Cloud

 

Discuss in 500 words or more the best practices for incident response in the cloud.

Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

New Practical Connection Assignment

 Need it to be completed in next 2 hours 

  1. Assignment:
    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
    Note:
    Subject name: Analyzing and visualizing Data
    My Job: Selenium Automation Tester
    No Plagiarism please..

    Requirements:
    Provide a 500 word (or 2 pages double spaced) minimum reflection.
    Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
    Share a personal connection that identifies specific knowledge and theories from this course.
    Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
    You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Assembly Language

 Write an assembly language program that reads move review information from a text file and reports the overall scores for each movie as well as identifying the movie with the highest total score. There are four movie reviewers numbered from 1 to 4. They are submitting reviews for five movies, identified by the letters from “A” through “E”. Reviews are reported by using the letter identifying the movie, the review rating, which is a number from 0 to 100, and the reviewer’s identifying number. For example, to report that movie B was rated a score of 87 by reviewer 3, there will be a line in the text file that looks like this:

B,87,3

The fields within each record are separated from each other by a comma.

Your program must store the movie review scores in a two-dimensional array (4 rows by 5 columns). Each row represents a reviewer. Each column represents a movie. Initialize the array to zeroes and read the movie review information from a file. After reading and processing the whole file, display a report that shows the total score for each movie and the movie that had the highest total score.

Section 9.4 of our textbook discusses two-dimensional arrays. Section 9.4.2 discusses Base-Index Operands and even contains an example of how to calculate a row sum for a two-dimensional array.

Chapter 11 contains an example program named ReadFile.asm that will show you how to prompt the user for a file name, open a file, read its contents, and close the file when you are done. Look in section 11.1.8, Testing the File I/O Procedures.

Each record in a text file is terminated by the two characters, Carriage Return (0Dh) and Line Feed (0Ah).

Assume that you wish to process a text file named “reviews.txt” that is stored on the “C:” drive in the “Data” folder. If you are using a Windows computer, you have two ways to identify the path to the file’s location:

C:/Data/reviews.txt        OR C:\Data\reviews.txt

Double backslash characters () are needed because a single backslash is defined as being the first part of an escape sequence such as newline (n).

This code can be used to load a reviewer’s score into the array of movie reviews:

; Insert score at reviews[rowIndex][colIndex]

mov      edx,rowSize           ; row size in bytes

    mov      eax,rowIndex         ; row index

    mul      edx                   ; row index * row size

    mov      index,eax             ; save row index * row size

    mov      eax,colIndex         ; load col index

    shl      eax,2                 ; eax = colIndex * 4

    add      eax,index             ; eax contains offset

    mov      edx,score             ; edx = reviewer’s score

    mov      ebx,OFFSET reviews   ; array of review scores

    mov      [ebx + eax],edx       ; Store score for movie

Sample Data for Review.txt

D,84,2
A,90,3
A,87,4
B,35,4
B,100,1
C,75,1
D,84,1
B,87,2
A,0,2
C,25,2
D,45,3
E,35,3
A,90,1
B,100,3
C,75,3
E,35,1
C,78,4
E,35,2
D,100,4
E,0,4

persuasive essay

Instructions

Select one of the papers/articles provided in this section. Based on the argument of the author, take a position and write persuasive essay (1000 +/- 10% words). 

there are two links to Web Sites where you can find steps and guidelines for writing a persuasive essay.

http://www.studygs.net/wrtstr4.htm

The essay would be graded 0 to 10 points. If you submit late your highest grade would be six out of ten points.

While writing your essay, please do not read/use other references. This is not an English writing or a research assignment. This is a business writing assignment. Review the PowerPoint presentation (Persuasive essay structure) on how to write a persuasive essay. 

Steps

1.  Visit the web sites to find out how to write a persuasive essay.

     https://www.hamilton.edu/academics/centers/writing/writing-resources/persuasive-essays

     https://learning.hccs.edu/faculty/jason.laviolette/persuasive-essay-outline

2.  Review the PowerPoint presentation on a persuasive essay structure. This is not an English writing assignment. It is Business Writing assignment, and your essay should have the proposed structure.

3.  Please read the rubric before start working on your essay.

4.  Select an article that compels you to write an essay with your opinion.

5.  Write your persuasive essay (1000 +/- 100 words).

6.  Submit your essay to the Writing Center (see how on BB) request a “grammar and mechanics” review. Reviews from the LRC are not accepted. We need the “grammar and mechanics” feedback

7.  Use Project 4 link to submit your two files: 1) File with the “grammar and mechanics’ feedback from the Writing Center and 1) Your updated (if needed) essay on a Word document (no PDFs) file.

IISP Discussion-4

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization. 

Strict APA format please with citation and references.

 

Discussion should be between 250-to-300 words.

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

No text book for this, please refer scholarly source. 

Need Two Replies