Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

Java Coding Assignment- Multi-Threading

Assignment is due June 16th, will accept the 17th at the latest. Whoever accepts the assignment, I will send you example files. If you do not think you can finish the assignment, please give me what you have and I’ll finish the rest the best I can. 

Objectives:

To practice programming cooperating, synchronized multiple threads of execution.Description:In  this  programming  assignment  you  will  simulate  the  deposits  and withdrawals made to a fictitious bank account (I’ll let you use my real bank account ifyou promise to make only deposits! J).  In this case the deposits and withdrawals will be made by synchronized threads.  Synchronization is required for two reasons –(1) mutual exclusion (updates cannot be lost) and (2) because a withdrawal cannot occur if the amount of the withdrawal request is greater than the current balance in the  account.   This  means  that  access  to  the  account  (the shared object)  must  be synchronized.  This application requires cooperation and communication amongst the various threads (cooperatingsynchronizedthreads).  (In other words, this problem is similar to the producer/consumer problem where there is more than one producer and more  than  one  consumer  process  active  simultaneously.)   

If  a  withdrawal  thread attempts to withdraw an amount greater than the current balance in the account–then it must block itself and wait until a deposit has occurred before it can try again.  As we covered in the lecture notes, this will require that the depositorthreads signal all waiting withdrawal threads whenever a deposit is completed. 

assignment

 

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used.

Note: Should be in APA format

Decision Algorithm

Decision tree algorithm used extensively in every filed for instance Computer science (artificial intelligence and data mining), business case studies, finance and medical science. The decision tree helps to formulate the condition which can be used to draw conclusion and filter data sets easily. Use given data set and draw a decision tree using ID3 algorithm.

EH week12 Lab

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

you were introduced to Wireshark and GlassWire, two free network monitor & security tools. Compare and contrast these two tools. explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.

https://www.glasswire.com/

https://www.wireshark.org/

300 words needed

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Discussion week 9 forensic

Research an article from the web or scholar.google.com concerning data forensics.  Briefly summarize the article.  What are you opinions or views on the article.  Be sure to include the link to your article in the post.  Comment on two other classmates posts.

KPI's

Assignment Scenario: You are the web analytics professional for a Fortune 500 company and your company has a Facebook Business Page. You just received the KPI summary for the Facebook account activity. What are these numbers telling you, is the Facebook account working for your company? Please answer the following:

Review the Facebook Management Report located in the KPI Sample-Report.pdf (page 8) to answer this assignment.

Analyze the data from the Facebook Management Report.

Explain the metrics is your company doing well or not and why?

Should your company maintain the Facebook account and should anything be changed to boost Fan Posts?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers. 

IT Process Management

 

Continuing with your case project, research best practices using the readings from the course texts and external resources. Address the following topics in your paper:
– What are the current positive or negative impacts to business operations involving the IT management processes?
– How can Six Sigma or TQM benefit your organization?
– What change management processes are currently in place, or if there are no formal processes, what would you recommend?
– Conclude with your thoughts on how implementing IT process improvement and change management in your business would make a positive impact

Your paper must be 2-3 pages of content (not counting the cover page or references page), use the APA template, and include citations within your writing showing where your references are used. Use unique in-text headings for each question and do not just re-state the questions.

Report on Software Engineering and Artificial Intelligence

 

 

Research Report Guide:

The structure of the paper MUST follow the guide & instructions. Please find attached both documents.

 Include All sections

Front Matter – Title page (with Running head), blank Approval page, Abstract, blank Acknowledgement page, Table of Contents, List of Figures  (if necessary), List of Tables (if necessary)

Chapters 1 – 5

Appendices (if necessary)

References (as per APA)

APA Formatting Guidelines:

The structure of the paper MUST follow APA guidelines. Examples can be found on this website: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

The important APA formats include the following

In text citations

References (with the hanging indents)

Page numbers

Font style and size

Tables and Figures inclusion (must add sources as per APA)

Headings and subheadings format