Wk 1 – Threats, Attacks, and Vulnerability Assessment

 

Part A:

Select an organization you wish to explore and use throughout the course.

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

Part B:

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page assessment document.

Research and include the following:

  • Tangible assets:
  • Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information systems.
  • Asset descriptions:
  • Include a system model, diagram, and descriptions of each asset included in the assessment scope and existing countermeasures already in place. (Microsoft® Visio® or Lucidhart®)
  • Threat agents and possible attacks
  • Exploitable vulnerabilities
  • Threat history
  • Evaluation of threats or impact of threats on the business
  • A prioritized list of identified risks
  • Countermeasures to reduce threat

Note: The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Delete the assignment instructions from the document. This will improve the originality score from Safe Assign. Make sure to check the SafeAssign originality score. Individual assignments can be submitted more than once to correct any content, quality, or originality issues.

Submit your assignment.

java

 Please read the following requirements carefully and then implement your own customized Array class:

provide the following features:

 Two constructors. One takes the input of the initialized capacity (int) and create the underlying array with that capacity; the other takes no input and creates an array that can hold a single element by default (that is, init capacity == 1);

 Getters and setters and basic methods we discussed during the class including: getCapacity(), getSize(), set(int index), get(int index), isEmpty();

 CRUD operations we discussed during the class including: add(int index), addLast(), addFirst(), remove(int index), removeLast(), removeFirst(), removeElement(int target), removeAll(int target);

 Supports generic types;

Mutable, that is when add element exceeding its capacity, it can resize to accommodate the change.

 Implement a (private or public) swap(int a, int b) method that swaps the two elements in the index a and b if a and b are both admissible; also a public reverse() method that reverses the order of stored elements in-place (means, no additional spaces are allocated).

 A public void sort() method sorts the stored elements in ascending order inO(nlog(n)) time. 

[hint]: Quicksort or Merge sort

SQL challenge

In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:

  1. Data Engineering
  2. Data Analysis

Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.

Data Modeling

Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.

Data Engineering

  • Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints.
    • For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row.
    • Be sure to create tables in the correct order to handle foreign keys.
  • Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors.

Data Analysis

Once you have a complete database, do the following:

  1. List the following details of each employee: employee number, last name, first name, sex, and salary.
  2. List first name, last name, and hire date for employees who were hired in 1986.
  3. List the manager of each department with the following information: department number, department name, the manager’s employee number, last name, first name.
  4. List the department of each employee with the following information: employee number, last name, first name, and department name.
  5. List first name, last name, and sex for employees whose first name is “Hercules” and last names begin with “B.”
  6. List all employees in the Sales department, including their employee number, last name, first name, and department name.
  7. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name.
  8. In descending order, list the frequency count of employee last names, i.e., how many employees share each last name.

Bonus (Optional)

As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:

  1. Import the SQL database into Pandas. (Yes, you could read the CSVs directly in Pandas, but you are, after all, trying to prove your technical mettle.) This step may require some research. Feel free to use the code below to get started. Be sure to make any necessary modifications for your username, password, host, port, and database name:
    from sqlalchemy import create_engine engine = create_engine(‘postgresql://localhost:5432/‘) connection = engine.connect()
  1. Create a histogram to visualize the most common salary ranges for employees.
  2. Create a bar chart of average salary by title.

Epilogue

Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.

Submission

  • Create an image file of your ERD.
  • Create a .sql file of your table schemata.
  • Create a .sql file of your queries.
  • (Optional) Create a Jupyter Notebook of the bonus analysis.

visual basic project done in visual studio

 

The Final Project for this course is the creation of an employee database. This assignment will give you some insight into how Visual Basic programming can be useful in the real world.  

As you work on this application, try to make it presentable like an application you would want to use if you were using an employee database application.  Feel free to incorporate pictures to make it appeal to the user….be creative.  Keep in mind the things you learned such as tab order and exception handling for user experience on the front end.  Also, think about the coding you are doing and make sure you comment your code and follow Visual Basic standard conventions. What if a new developer were to make changes to the application?  Will they understand your intentions and what the code is doing?

Complete the following Programming Challenges:

Programming Challenge #1 – Creating Employee Data found on page 625 of the textbook.

Programming Challenge #2 – Reading Employee Data found on page 625-626 of the textbook.

Programming Challenge #12 – Employee Data, Enhanced found on page 629 of the textbook.

Specifically, be sure to meet the following criteria:

  1. Employee records must be saved to a text file.
  2. Employee records can be retrieved from the text file, display one record at a time.
  3. Employee records can be retrieved from the text file, all records at once.
  4. New employee records can be added to the text file without erasing the existing records.
  5. Users can search employee records by employee ID.
  6. Save/OpenFileDialog must be used at least once.
  7. Users can print all employee records appropriately formatted.

Most students find this easier if all three programming challenges are put into one application.  If you choose to do these as three separate applications, put each one in its own zipped file.

Term Paper

   

1. DEFINITION

This study is an individual work.

In this assignment, you will research applications of experimental design. Through a review of relevant literature, you will find two articles that present practical applications of DOE in industry (i.e. manufacturing, healthcare, banking, entertainment, construction, energy). The studies may target the same or different industries. You will submit one report that addresses the following in your own words:

· Identification of the industry

· Brief problem summary

· Factors studied

· Responses observed

· Experiment design strategy used

· Findings

Each study must be described in a separate section of your report addressing all the items listed above. The articles must include a practical application example. In your search you should focus on more recent publications (published in the year 2012 and beyond are acceptable).

Note that studies with only simple statistical analysis, for example two sample comparisons, are not acceptable for this assignment. The studies you report on must include experimental design methods such ANOVA, factorial design, fractional factorial design, etc.

Your literature material may consist of the following:

1- Peer reviewed research papers (journal papers or conference proceedings) 2- Case study and/or white papers

There must be two publications discussed in your report, and at least one of them must be a peer- reviewed paper.

2. SUBMISSION REQUIREMENTS

· Use a word processing software to prepare your paper

· Provide complete references, use of Harvard citation style for your entries is strongly recommended, but APA citation style may be used if preferred.

· Submit all your documents including the articles referenced (includes reference papers)

   

3. ASSESSMENT

Text Box: Category Advice

   

Problem Statement (30%)

Design (30%)

Experiment

  

· Explain the problem(s) introduced in the reference papers clearly and concisely

· List and discuss the questions addressed

· Explain the methodology(s) introduced in the reference papers clearly and concisely

· Explain choice of factors and levels

· Describe the response variables

· Define the experimental design chosen

   

& Findings · Discuss findings/results presented in the reference papers

· Structure your paper in a clear, easy to follow format

· Include data important to your discussion within the text

· Provide references for any information in your work that is not yours

· Provide your paper in one document prepared using word processor

  

Written Report (10%)

  

software

· Visual Displays (tables, graphs, etc.):

o Use clear headings to identify purpose

o Label the plot (meaningful title, properly labeled axis including units)

o Include meaningful and easy to understand legend if needed

Include captions that are explanatory of information presented (table caption starts the word “Table” followed by table number; figure caption starts with “Figure” followed by figure number) 

Business Intelligence

Discussion

1. What are the privacy issues with data mining? Do you think they are substantiated? half page

Questions and Answer

1.Define data mining. Why are there many names and definitions for data mining?

2. What are the main reasons for the recent popularity of data mining?

3. Discuss what an organization should consider before making a decision to purchase data mining software.

4. Distinguish data mining from other analytical tools and techniques.

5. Discuss the main data mining methods. What are the fundamental differences among them?

Excercise 

6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.

When submitting work, be sure to include an APA cover page and include  APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Information Systems Business and Beyond

Complete the following assignment in the Information Technology and Organizational Learning textbook:

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
  • Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Identify your answers by its chapter # to help the reader find your answers to specific items. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least two pages in length (one page per chapter). The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

Discussion on security culture

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?