Ethical hacking

Required Readings

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Wk 1 Research Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Need help with Hadoop lab

Import the Device table from MySQL 

1. Open a new terminal window if necessary. 

2. Get familiar with Sqoop by running the sqoop command line

 $Sqoop help

3. List the table in Loudacre database:

 $ sqoop list-tables

   –connect jdbc:mysql://localhost/loudacre  

   –username training –password training 

4. Run the sqoop import command to see its options: 

 $ sqoop import –help 

5. *Use Sqoop to import the device table in the loudacre database and save it in HDFS under /loudacre:

Assignment 1 Dropbox

This is an individual assignment.Purpose: Whatever field you go into, you will likely be a part of selecting and/or purchasing computing equipment and/or software. This assignment will help you gain some insight into this process. Tasks:You are an IT consultant and you are attempting to snag your first client.  You must create specifications and a price quote for the purchase of three (3) computers from three (3) vendors. After collecting your information, you will end up with a 3×3 matrix (table), or a total of nine (9) price quotes.  You will attach the price information to the client proposal.  In the proposal, you will state the purpose of your proposal and give your recommendation to the client for one of each of the computers to include your reasoning as to why of the three computers in that category, the client should trust you to purchase and set up that particular model.Scenario:Mr & Mrs Nouveau Rich’s only daughter is heading off to CSU this fall. Mr. Rich made his money on TikTok producing videos of his wife. He sells a new line of exercise equipment and Keto-friendly drink mixes to people who have been forced to stay at home because of the coronavirus. These TikTok followers have seen their weight skyrocket due to Publix grocery stores selling buy-one-get-one free (BOGO) Oreo cookies, ice cream, doughnuts and pasta meals and now want to eat right, exercise and take the weight off.The Rich’s, being stuck at home with everyone else, need to prepare so send their daughter off to college while ramping up their work from home business.  Their side hustle has become a money train. They contacted you after viewing a YouTube video you produced for a class at CSU and liked your technical talent. They called and asked you to help them with the following:

  • Their daughter, Fonda B Rich, is headed off to college and needs a laptop.  Dad is partial to Microsoft and Dell products.  You know what kind of laptop the daughter is “Fonda” of – aren’t all college students?  So dad needs some options to prove to his daughter that there is more than one type of laptop out in the world that does NOT involve standing for hours at a bar for Geniuses to learn how to use a fruit…
  •  Mr. Rich (Known as Richey to his friends) is tired of creating and editing his TikTok videos on his iPhone 11.  He is getting older and his eyesight isn’t what it used to be and let’s face it, he has fat fingers. Richey Rich needs a souped up, powerful machine that he can load some sophisticated movie and music production software on and still have some power left over to play Solitaire. He also figures that his son and daughter, Ima B and Will B (nicknamed Willie), will use the desktop to play some Disney, Pokemon, and Super Mario games.
  • Mrs. Shirley B. Rich is the mastermind behind the entire Rich enterprise. With a keen head for business, she started the whole empire when she videoed herself taking the Laxed Siren Beat (by Jawsh 685) Challenge Dance in her workout active wear while making a Keto Protein Shake. When she posted it, It went viral and got over 100k followers in 48 hours. Shirley needs a business computer where she can run typical Office software and financial applications to keep up the business’ financial records as well track her Instagram and TikTok videos that Richey produces for her. She needs to be able to be on the Internet researching new recipes, new activewear looks and new TikTok dances and music. Oh, and email her fans that write asking for new Keto recipes and support on their weight lose journey. She has a weight loss blog called “Losers Win in the End.”

Use one of the Report templates in Microsoft Word or word processing software that can save files as .doc or .docx (Google Docs will work for this).Part 1 – Hardware

  1. Create a list of specifications for the three needed (3) computers. The computers will be used in the following scenarios:  
    1. A computer for a college student that can be used to take notes in class, do homework, complete assignments
    2. A computer to be used in an office for animated movies. This computer will be used to work on character design and animation sequences
    3. A computer for home business and personal use 
  2. Build a table to compare and contrast computer offerings from three (3) different vendors (Dell, HP, Apple, Toshiba, Microsoft, etc) for each of the three use cases. (For each person, you will select three options from the different vendors. For example, you might select a Dell, a Toshiba, and an Apple for Mrs. Rich, 2 different Dells and an HP for Mr. Rich, etc.). You will want to include the technical specifications for each selected computer as well as the price. You may add any peripherals you think might be needed (for example, if the computer doesn’t have a built in webcam, you will need to find and include the price for an appropriate webcam if one is needed by the client).   
    1. Hint: use the “Business” section of the vendor site for the office workstation
    2. You can choose among different “form factors” such as desktop, small form factor, tablets, all-in-one computers, traditional desktop, laptop, tower 
  3. Enter computer specs and prices into the Word document  
    1. Add hyperlinks to the vendor sites and computer specs you used
    2. specify the ““form factor” (desktop or laptop or all-in-one, etc.) you recommend and why you think this machine is a good fit for the customer

                4. Provide detail (technical description and price) for the following hardware:                           a. CPU       b. RAM       c. Hard drive (type and size)    d. Optical drive     e. Monitor     f. Operating SystemPart 2 – Software Research and recommend the appropriate productivity software that matches the computer you selected.  What software would each member of the Rich need loaded on their computer in order to do their particular tasks.  Include the software and the price – is it a one time purchase or is it a monthly or annual subscription.  

linux

 For this discussion board you will need to research some best practices in allocating hardware you virtual machines. In your initial post make sure to identify what your research showed as a best practice and if it is hypervisor specific be sure to include the hypervisor.   Your initial post needs to be at least 250 words  

 For this lab you will research and compare the features of the various commercial Type 1 hypervisors available on the market.   You will choose at least 3 Type 1 hypervisors and look at the features, hardware requirements and options and write up a comparison between them.  Ultimately after you have written up your comparison you need to make a recommendation as to which hypervisor you would use and explain why.  Write up your research including references and submit it for a grade 

System Programming

BACKGROUND: A shell provides a command-line interface for users. It interprets user commands and executes them. Some shells provide simple scripting terms, such as if or while, and allow users to make a program that facilitates their computing environment. Under the hood, a shell is just another user program as you know from Minor2 assignment. The file /bin/bash is an executable program file for the bash shell. The only thing special about your login shell is that it is listed in your login record so that /bin/login (i.e., the program that prompts you for your password) knows what program to start when you log in. If you run “cat /etc/passwd”, you will see the login records of the machine.

PROGRAM DESCRIPTION

GROUP COLLABORATIVE PORTION: In this assignment, you will implement the shell “engine” as the group component, where all members are responsible for the following functionality.

A Command-Line Interpreter, or Shell

Your shell should read the line from standard input (i.e., interactive mode) or a file (i.e., batch mode), parse the line with command and arguments, execute the command with arguments, and then prompt for more input (i.e., the shell prompt) when it has finished. This is what Minor 2 program should do with addition of batch processing which means just reading a batch line by line and calling the same interpretation logic.

  1. Batch Mode

In batch mode, your shell is started by specifying a batch file on its command line. The batch file contains the list of commands that should be executed. In batch mode, you should not display a prompt, but you should echo each line you read from the batch file back to the user before executing it. After a batch is finished the shell will exit.

  1. Interactive Mode

No parameters specified on command line when the shell is started. In this mode, you will display a prompt (any string of your choice) and the user of the shell will type in a command at the prompt.

You will need to use the fork() and exec() family of system calls. You may not use the system() system call as it simply invokes the system’s /bin/bash shell to do all of the work. You may assume that arguments are separated by whitespace. You do not have to deal with special characters such as ‘, “, , etc. You may assume that the command-line a user types is no longer than 512 bytes (including the ‘n’), but you should not assume that there is any restriction on the number of arguments to a given command.

INDIVIDUAL PORTIONS

Build-in Commands: Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them.

In this assignment, each member of the group will implement one of the following section and commit in GitLab the code that supports those commands:

  1. Add a new built-in alias command that allows you to define a shortcut for commands by essentially defining a new command that substitutes a given string for some command, perhaps with various flags/options. The syntax is as follows: alias alias_name=’command’. For example, you can define an alias with alias ll=’ls –al’, so that the user can then enter ll at the prompt to execute the ls -al command. Specifying alias with no arguments should display a list of all existing aliases. You may remove a single alias with the command alias -r alias_name or all defined aliases with alias -c.
  2. Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.
  3. Add a new built-in path command that allows users to show the current pathname list. The initial value of path within your shell will be the pathname list contained in the PATH environment variable. path + ./dir appends the ./dir to the path variable. You may assume that only one pathname is added at a time. You will need to add it to the “real” PATH environment variable for executables in the path to work correctly. path – ./dir removes the pathname from the path variable. You may assume that only one pathname is removed at a time. Also, you need to restore your PATH environment variable to its original state when the user exits your shell.
  4. Add a new built-in history command that lists your shell history of previous commands. It is up to you to select what number of prior commands to keep in history. history –c command should clear your history list. history N, where N is number, displays your prior N-th command starting with the last one. history N -e executes your prior N-th command.

OPTIONAL assignments for extra credits:

  1. Extend your shell with I/O redirection: <, >, >> (+20%).
  2. Extend your shell with pipelining | (+20%).

DEFENSIVE PROGRAMMING (GROUP COLLABORATIVE EFFORT): Check the return values of all system calls utilizing system resources. Do not blindly assume all requests for memory will succeed and that all writes to a file will occur correctly. Your code should handle errors properly. In general, there should be no circumstances in which your C program will core dump, hang indefinitely, or prematurely terminate. Therefore, your program must respond to all input by printing a meaningful error message and either continue processing or exit, depending upon the situation. Many questions about functions and system behavior can be found in the manual pages. You should handle the following situations:

  • An incorrect number of command line arguments to your shell program;
  • The batch file does not exist or cannot be opened.
  • A command does not exist or cannot be executed.
  • A very long command line (over 512 characters including the ‘n’).

REQUIREMENTS: Your code must be written in C.

GRADING: Your C program file(s), README, and makefile shall be committed to our GitLab environment as follows:

  • Your C program file(s). Your code should be well documented in terms of comments. For example, good comments in general consist of a header (with your name, course section, date, and brief description), comments for each variable, and commented blocks of code.
  • A README file with some basic documentation about your code. This file should contain the following four components:

Your name(s);

Organization of the Project. Since there are multiple components in this project, you will describe how the work was organized and managed, including which team members were responsible for what components – there are lots of ways to do this, so your team needs to come up with the best way that works based on your team’s strengths. Note that this may be used in assessment of grades for this project.

Design Overview: A few paragraphs describing the overall structure of your code and any important structures.

Known Bugs or Problems: A list of any features that you did not implement or that you know are not working correctly.

  • A Makefile for compiling your source code, including a clean directive.
  • Your program will be graded based largely on whether it works correctly on the CSE machines.

PAPER

 

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or another list format.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the https://libguides.nec.edu/az.php Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Phd: Research paper-2

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

• Be approximately 5-6 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. 

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Please attach the grammarly score screenshot at the end of the research paper.

assignment 1003

  

Assignment: 

Write a 3-4 page APA formatted paper comparing your organization’s disaster recovery and business continuity plans with the best practices outlined in your course text. Content should include, but not be limited to: selecting the DR. team, assessing risks and impacts, prioritizing systems and functions for recovery, data storage and recovery sites, developing plans and procedures, procedures for special circumstances, and testing the disaster recovery plan. Your paper should include an abstract and a conclusion and a reference page with 3-5 references:

Comments: 

· For help with APA formatting, see the information links on iLearn. They are located on the left sign of iLearn in Information tab. There is a sample paper as well as link to a site that has extensive APA documentation.

Please pay careful attention to the due dates and times for this assignment 

Bus Cont Plan&Disas Recov Plan 107

 When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?