How to detect and prevent industrial esponage

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

discussion

 explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3? 

SQL challenge

In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:

  1. Data Engineering
  2. Data Analysis

Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.

Data Modeling

Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.

Data Engineering

  • Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints.
    • For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row.
    • Be sure to create tables in the correct order to handle foreign keys.
  • Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors.

Data Analysis

Once you have a complete database, do the following:

  1. List the following details of each employee: employee number, last name, first name, sex, and salary.
  2. List first name, last name, and hire date for employees who were hired in 1986.
  3. List the manager of each department with the following information: department number, department name, the manager’s employee number, last name, first name.
  4. List the department of each employee with the following information: employee number, last name, first name, and department name.
  5. List first name, last name, and sex for employees whose first name is “Hercules” and last names begin with “B.”
  6. List all employees in the Sales department, including their employee number, last name, first name, and department name.
  7. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name.
  8. In descending order, list the frequency count of employee last names, i.e., how many employees share each last name.

Bonus (Optional)

As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:

  1. Import the SQL database into Pandas. (Yes, you could read the CSVs directly in Pandas, but you are, after all, trying to prove your technical mettle.) This step may require some research. Feel free to use the code below to get started. Be sure to make any necessary modifications for your username, password, host, port, and database name:
    from sqlalchemy import create_engine engine = create_engine(‘postgresql://localhost:5432/‘) connection = engine.connect()
  1. Create a histogram to visualize the most common salary ranges for employees.
  2. Create a bar chart of average salary by title.

Epilogue

Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.

Submission

  • Create an image file of your ERD.
  • Create a .sql file of your table schemata.
  • Create a .sql file of your queries.
  • (Optional) Create a Jupyter Notebook of the bonus analysis.

cryptography

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT. 

DISCUSSION

 

Topic of Discussion

We studied the network criteria: performance, Reliability, and security. In the very early days of the network technologies, in your opinion, which of the three criteria was more considered, and how the other criteria started to get considered as well?

Submission Instructions

  • Post your responses, examples, ideas, and discussions. on this topic on the blackboard.

Cybersecurity Planning

 

A.)   FINAL WRITTEN PROJECT

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

B.) Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not.

JAVA Programming Scrabble Help: The file dictionary.txt contains all of the words in the

 

JAVA Programming

Scrabble Help: The file dictionary.txt contains all of the words in the Official Scrabble Player’s Dictionary, Second Edition. Note: this list contains some offensive language. Write   a class, WordLists, in Java that generates useful word lists for scrabble players using this list.

Your class should contain the following methods:

  • WordLists(String fileName): a constructor that takes the name of the dictionary file as the only parameter.
  • lengthN(int n): returns an ArrayList of all length n words (Strings) in the dictionary file.
  • endsWith(char lastLetter, int n): returns an ArrayList of words of length n ending with the letter lastLetter
  • containsLetter(char included, int index, int n): returns an ArrayList of words of length n containing the letter included at position index.  So for example the word “cannon” would be on the list returned by  containsLetter(‘o’,6,4) because it contains the letter ‘o’, at index 4,  and is length 6.
  • multiLetter(int m, char included): returns an ArrayList of words with at least m occurrences of the letter included.

Use  the included template for your WordLists.java file. Write   your own  test class for your WordLists class that tries these methods out and  writes the word lists (the ArrayLists of strings) to   text   files.

What to hand in:

A  Template for the WordLists.java file is in the Assignment 5 workspace  on Codio. You must create   your own test class (separate file with main  method) that tests each of your methods and writes the results to a  text file. In addition to the source files include a text file named  readMe.txt with an explanation of how your program works. That is, write  in plain English, instructions for using your software, explanations  for how and why you chose to design your code the way you did. The  readMe.txt file is also an opportunity for you to get partial credit  when certain requirements of the assignment are not met.

 

The dictionary.txt file contains like this:

aa

aah

aahed

aahing

aahs

aal

aalii

aaliis

aals

aardvark

aardvarks

aardwolf

aardwolves

aargh

aas

aasvogel

aasvogels

aba

abaca

abacas

abaci

aback

abacus

abacuses

abaft

abaka

abakas

abalone

abalones

abamp

abampere

Big Data Research assignment

We studied Apache Pig in lecture # 4. You are supposed to do online research and find out one case study where Apache Pig was used to solve a particular problem. I am expecting 4 page write-up. Please provide as much technical details as possible about solution through Apache Pig. Please draw technical diagrams to explain the solution. 

 

I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up.

 

Please draw your own diagrams and don’t go more than 4 pages in total.