EH 6 Pap

 In 250 words. ‘Ping sweep tool’,  Explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up 

Computer Science

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology.

Please use APA throughout. 

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count)

exercise work (Cryptography)

  

Crypto Security Architecture Exercise

Scenario

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company. 

You’re assigned this crypto architecture project.

Configuration

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet. 

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

All databases use MySQL and are currently not secured.

Constraints

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

Specific Tasking

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

  1. Describe in detail what new cryptographic      systems you are going to propose, how they work, and how they will enhance      security. Be specific about these      systems weaknesses and how you plan to compensate for the weaknesses.
  2. Describe and explain the impact the new      cryptographic security architecture will have on the current security      features and how this impact will be mitigated.
  3. What new issues will arise as a result of      implementing the new cryptographic solutions and what are the arguments on      either side of these issues?
  4. Show a clear and detailed understanding of      the existing encryption being used such as passwords, and operating      encryption features not being used and whether you plan to use these or      not, and if not why not.
  5. How well will all these new cryptographic      features work together?  Identify      any areas of concern, and how you propose to resolve conflicts and issues.
  6. What if any current security features can      be eliminated cost effectively by the new crypto architecture?

ETCM DISCUSSION-2

Internet-related crime occurs every minute. Cyber criminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cyber criminals?

Discussion should be between 250-to-300 words. And two Replies.

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

Make sure APA format, citations are very key.

Time: 36 hours

PFA., for text book

Industrial Espionage in Cyberspace Question

Solve/Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is  passed over for promotion three times. He is quite vocal in his  dissatisfaction with this situation. In fact, he begins to express  negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s  departure, it is discovered that a good deal of the ABC Company’s  research has suddenly been duplicated by a competitor. Executives at ABC  suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the  interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Requirements:

Write your answer using a WORD document with approximately 400 to 500 words

APA format in-text citations & references

No plagiarism 

Security

 

  • If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?

Pratical connection – Data mining

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.

Assignment: Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Topic:

1)  Can you please  explain about  Data mining topic 

 2 ) i work in IT industry i work for VMware virtualization  , Networking and Storage technologies and AwS ,Azure cloud technologies   how can you apply  in  Data Mining industry