Cyber Security: Kali Linux Lab

I have a Lab assignment that has to do with Kali Linux. 

Youll have to watch 2 walkthrough videos:

The first video is regarding setting up Kali Linux

The second video is regarding setting up WordPress.

Once you successfully watch the two videos, you will then start the lab. The procedures of the lab are in the attachment section. 

Data Mining Assignment

Provide a real world example of a probability distribution based on your readings for the week. Consider the data instances that is different from uniform (i.e., equal probability).

Instructions for participation: You must post an INITIAL POST and then respond to at least ONE POST. In both postings, you MUST provide citable academic literature to defend your use case. Please do not use the same source over again, especially when most times there is absolutely no applicability from one post to the next. 

Week 2 discussion 2

Research the NIST Special Publications website and provide a list of 800-series publications that address the following regulatory and compliance requirements:

  • PCI DSS Compliance
  • HIPAA Compliance
  • Cloud Security Compliance

Note: There may be more than one 800-series publication associated with each.

From the perspective of a CISO, provide a strategy you would use to ensure your company complies with all three regulations. 

microsoft excel graders

I have two graders that I have to get done by midnight.  They have to be done correctly and in the correct format .xsls The last guy did not do them right and I did not pass them.,

Research paper of 10 pages along with powerpoint presentation

  Topic: Hardware Firewalls

· Investigate how that type of firewall works.

· Investigate the vendors that provide that type of firewall. Is there a top vendor for that type?

· Investigate what types of situations are best suited for that type of firewall. What situations is it not well suited for?

· What other types of firewalls work best in conjunction with that type? Are there types that it does not work well with?

· What are the pros and cons of that type of firewall?

Research Paper Format

· The paper must be in the APA format

· At least ten pages in length plus cover, abstract and references.

· Graphs, illustrations, and spreadsheets are allowed, but will not count toward the 10-page requirement.

  • Research Paper must have      at least 5 works cited of which 2 must be peer-reviewed works/articles      (note your book can be included as a reference)

PowerPoint Presentation

· 30-minute team presentation with PowerPoint slides (All participants must present a topic). 

· Must align with your paper

· Provides the highlights of your paper

Discussion and Assignment 5

Discuss the overall process of developing new software. Please note the differences between software development and methods.

Need 125 words on this topic with references and in a separate document.

Assignment 1:

Q1::

How is the IT function organized in your school or place of employment? Create an organization chart showing how the IT organization fits into your overall organization. Comment on how centralized or decentralized the IT function is.

Q2::

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?

The above assignments should be one page submitted in a single Word document with references. 

Assignment 2:

Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. (Information Technology and Organizational Learning)

Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important? (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each question) and adhere to APA formatting standards with references included.

Research Paper: Server Virtualization

 

complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
  • Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper subject enterprise risk management

 

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Mini Case Study

Read the mini-case, Innovation at international Foods (pp. 234-238).

Submit a Word document with answers to questions one and two on page 238. Your answer to question one should include strategies for overcoming each of the IT related problems and be about two pages long. Your answer to question two should be about two pages long.

Your submission must meet the following criteria: 

  • Use APA level one headings to separate your answers to each question.
  • Comply with the APA and writing standards for this course. Use   Dr. Straw’s APA and writing checklist for guidance.
  • Have two scholarly sources, not including our textbook.

Questions:

1. In discussion with Josh, Tonya foreshadows “some serious obstacles to overcome.” Describe these obstacles in detail.

2. How can Josh win support for his team’s three-point plan to use technology to help IFG reach its customers?