Please go through the attached documents completely before providing the answer
SQL Discussion
Complete the queries
help 10 pages excluding citations
Please refer the help doc.
DNA
Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Your written assignment should be 3-4 paragraphs and 100-250 in your own words.
cloud computing
one paper on
IaaS vs. PaaS vs, SaaS
ms08-067 exploit using metasploit
Based on the vulnerabilities found via nmap, use Metasploit to compromise the Windows XP machine. Gain shell access and transfer a file of your choice from the target machine to your Kali machine. Also, perform a remote screen capture using Metasploit of the compromised machine. You will need to use an auxiliary module to do this. Finally, install the persistence Meterpreter service. Be sure to document each step you take with both screen shots and descriptions of the commands employed. Tip: In metasploit you can use “search” keyword to find the exact vulnerability and payload you want to use Tip 2: You can exploit any vulnerability on the WinXP machine, but MS08-067 works very well.
What to Submit: Provide a report of your work. For each task, give a complete description of your steps, include all commands used, the reason why each command was used, and screenshots of the steps employed during your attack using the Metasploit framework. Perform screen captures of both the Metasploit and target machine, show the commands used and results to prove that you have accomplished each of the following steps: PAGE 3 OF 3 [20 pts] Obtain shell access to the Windows XP machine using the Meterpreter payload and set all necessary Metasploit options correctly. [10 pts] Transfer a file of your choice from the target machine to your Kali machine. [10 pts] Perform a remote screen capture of the compromised machine using Metasploit. This can be done in various ways; one way is to using an auxiliary module. [20 pts] Install the persistence Meterpreter service on the Windows XP machine that will automatically connect back when the system boots. Reboot the Windows XP machine and show that it automatically connects back to the Kali machine.
Week 6
1. Discuss the Sarbanes-Oxley Act and how it impacts you.
2. Discuss FISMA and how it impacts you and/or your work.
Security Design principles
After reading chapter 1, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.
Page 34-37 serves as good introduction to the topic
Any problem/challenges in Cloud computing
Need poster presentation for now
Emergency Operations Plans
The Emergency Operations Plans can have many first steps. Name 3 that would be important at your work location.