Cyber Security Lab – Shellshock

Please narrate and stake screenshots while doing lab like it says in instruction in PDF

This lab will be done in the SEED lab VM. (Lab pdf, notes, and c code file attached.)

  • Shellshock
  • Environment variables
  • Function definition in Bash
  • Apache and CGI programs

Note: You may need to change void main() to int main() in the C code.

The submission is a lab report that includes screenshots of the steps and a narrative of what is happening.

There are two submissions in case anything goes wrong with the first.

CS 8

 

Please read the Alibaba case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. How does blockchain-based remittance fit into Alibaba’s cloud offerings?2. What unique value does blockchain technology provide in Alibaba’s remittance offering?3. What are other areas of application for blockchain in Alibaba’s cloud business?4. What is Alibaba’s strategy to overcome the “chicken and egg” problem of insufficient transaction liquidity and eventually achieve network effects with its remittance service?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay.

Material:

  https://hbsp.harvard.edu/import/714113 

Project paper – COmputer Science

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Information technology 1010…….2

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

valuable in collecting both live memory images and images of various forms of media

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

dmdis1

 

  • Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.

project

Assignment 2

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of importing, exploring and examining your data to develop a robust familiarization with its potential offering:

Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Getting Started with R Tool

Complete this tutorial to assist with the assignment

· Data Importing Using R – http://www.r-tutor.com/r-introduction/data-frame/data-import

· R Data Type – http://www.r-tutor.com/r-introduction/basic-data-types

· R Data Vectors – http://www.r-tutor.com/r-introduction/vector

· R Data Frame – http://www.r-tutor.com/r-introduction/data-frame

· Data Import – http://www.r-tutor.com/r-introduction/data-frame/data-import

· Data Statistic – http://www.r-tutor.com/elementary-statistics

Compare and Contrast essay (RENG 92)

Develop a three page essay that compare and contrast the lives of the two individuals you selected for the assignment.( File is attached for 2 individual I have selected). You have the freedom to focus on the different areas of the individuals lives of your choice. However, below is a list of suggestions:

  • Compare and Contrast-Childhood
  • Compare and Contrast-Education Background
  • Compare and Contrast-Career

Please type the essay, per MLA Format (Times New Roman Font, Double Spacing, Size 12 Font, Page Numbers, Direct Quotes and In-Text Citations-in each body paragraph, and Works Cited Page) and end with the works cited page. Also, start the thesis statement, each body paragraph, as well as the conclusion paragraph with a transitional word or phrase. Friendly reminder–do not include the following:

  • Contractions
  • First Person, “I”
  • Second Person, “You”
  • Third Person, “We”

Deliverable Length: SPSS 0utputs and 500–1,000-word analysis

 

Use the Explore command to compare the income levels (rincdol) for both genders (sex). Go to the Resources area of the class to download the files that you will need to complete your assignments each week. Open gss.sav in SPSS, and complete the following calculations to determine the differences in the income level between males and females.

Compute the following for each group:

  1. Mean
  2. Median
  3. Quartiles
  4. Range
  5. Variance
  6. Standard deviation
  7. Skewness
  8. Kurtosis

The Explore command will also produce several different types of plots. Click on the Plots button, and create the following plots for each group:

  1. Histograms (include the normal curve on the histogram)
  2. Box plots
  3. Stem-and-leaf plots

Use the calculations and plots to answer the following questions. When discussing a calculation, include the value in the text to bolster your analysis.

  1. What can you determine from the measures of skewness and kurtosis relative to a normal curve?
  2. What are the mean and median?
  3. Does the mean or median seem better to represent the scores? How have extreme scores impacted these values?

Submit your output from all SPSS analysis as an SPSS output file and your Word document.

Database management systems Or DBMS (Network Security- Cybersecurity)

 A database management system is an application that provides users with the means to manipulate, analyze, and query data. Almost all DBMSs in existence today are developed to be used with relational databases.  Describe in a minimum 2-page essay (about 1,000 words, double spaced, APA format) a DBMS that you have dealt with at a company, or as a customer.  How was it used to help you access the data?