Discuss sqlmap, an automated tool for sql injection and database takeover in 500 words or more

 How does it work? Where do you get it? How much does it cost? Who developed it? For what purpose? Are there other ‘tools’ like this available?

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Please do not use attachments unless requested.

Reorganization

USPS has been around for a long time delivering tradition mails for everbody in the United States. They seem to be losing money every year because USPS is run like a government agency without accountability to anyone. Recently they were in the news laying off workers, cutting the delivery days, doing little things to offset the expenses but they are still losing daily.  Emails are being used heavily instead of paper mails, chat features are reducing the need for paper mails. and video chats are instantaneous and acceptable by the public now.  

In 80 words or more if you were the Chief Executive of USPS what would you do to help turn around this organization? 

Database SQL essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?  Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)
With atleast 3 references 

Operating Security

 An information technology (IT) security policy framework is the foundation of an organization’s information security program. Organizations use these documents to build processes, determine acceptable technologies, and lay the foundation for enforcement. The security policy framework documents and their implementation express management’s view of the importance of information security.

  • Describe the role of a policy framework in an information security program
  • Describe the different types of policies used to document a security program
  • What business factor(s) do YOU think should be considered when building an organizational IT security policy framework?  Explain
  • What is the difference between risk tolerance vs risk appetite? 

Cryptography Reflection

Assignment:

Provide  a reflection of at least 500 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of cryptography course have been applied, or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

·  Use of proper APA formatting and citations. If supporting evidence from  outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

·  Demonstrate a connection to your current work environment. If you are  not employed, demonstrate a connection to your desired work environment.

·  . The assignment asks that you reflect how the knowledge and skills obtained through meeting cryptography course objectives were applied or could be applied in the workplace.

plagiarism report must

Game

Explain all the folders that would be present when creating a game application in Python. 

ARS.jpg

A Raisin in the Sun Structuralism Project

 

For this project, complete the following steps. Note my examples of each step at the bottom of the page:

1: IDENTIFY a textual moment (I define this as a chunk of dialogue of any length spoken by one character)

2: Pluck out any three words from that dialogue

3: Define each as you THINK the character defines them (you THEORIZE)

4: Fill in the blank with a word or concept of YOUR choice, that you would be willing you defend: This character’s philosophy of _______ FRAMES his or her perception of the textual moment

5: Determine what the anchor is that HOLDS the fixed structure together—“the thing without which nothing holds”; describe and defend in three-to-five sentences (you THEORIZE, basically, what a force is that binds HOW words can mean within your character’s philosophy. For instance, within a Christian philosophy, we might define “Jesus” as “Son of God,” “Mary” as “Mother of Jesus,” “Bible” as “Word of God,” and “marriage” as “union of man-woman.” However, the symbol of G-O-D is such that, without it, the words we just mention can NO LONGER be defined as the simplistic, joined-at-the-help definitions we created. Funnily enough, though, if we try to DEFINE G-O-D in this Christian scheme, we’d have little success, because being of Christian philosophy requires our subservience to G-O-D, at least in theory; the second that G-O-D is allowed to be defined and made possible through language, the word loses its allure, the scheme loses its majesty, and the whole fixed structure topples. Words like Jesus/Bible/Mary/marriage had their unitary definitions made possible by G-O-D, but if the latter is “just another word,” anything is able to “mean” anything else–everything becomes discourse, chaos. So structuralism relies on the existence of such a force as G-O-D; let’s call it, “the G-O-D factor)

My example of each step (follow along in book):

1: (Act 1, Scene 1).

ARS.jpg

2: Three words I’ll pluck out from Walter: tired/man/woman.

3: To Walter, in that moment,

tired→ financially frustrated

man→ economic provider of household

woman→ emotionally subordinated to husband.

4:  Walter’s philosophy of marriage FRAMES his perception of this textual moment.

5: THE GOD FACTOR: MONEY, in which I would advance a theory that MONEY is the thing without which tired would NO LONGER mean how I defined it in step 3, within Walter’s philosophy of marriage. I would defend this point in up to three sentences.

^I would repeat this process for the other two words, with up to THREE sentences per word. Simply provide me three paragraphs of text–one per word–with up to three sentences per paragraph. In-text citations are encouraged but not required.

DIRECTIONS and EVALUATION~

In addition to the blue text above, the only way I want you to format this is simply to CREATE numbers 1-5 in a blog entry, and add in all text in a range and format similar to my example, above.  written reports should be completed in 600-700 words

Assignment

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Active Directory (AD) and the Azure Active Directory (AAD). What are they? How do they relate? What is their purpose within the context of Application Security?
  2. How can AD and AAD be used to make a custom application more secure?  (Hint: talk about Groups, Group Policies, Group Policy Objects, and the concept of Least Privilege)
  3. Discuss authentication and authorization in the context of Application Security.

    Need to write 1000 words APA Format