Edudorm Facebook

Questions and Topics We Can Help You To Answer:
Paper Instructions:

1. Performing Reconnaissance from the WAN
2. Scanning the Network on the LAN
3. Enumerating Hosts Using Wireshark, Windows, and Linux Commands
4. Capturing and Analyzing Network Traffic Using a Sniffer
5. Performing a Denial of Service Attack from the WAN
6. Using Browser Exploitation to Take Over a Host’s Computer
7. Attacking Webservers from the WAN
8. Exploiting a Vulnerable Web Application
9. Performing SQL Injection to Manipulate Tables in a Database
10. Attacking the Firewall and Stealing Data Over an Encrypted Channel

Each page needs to individual to the topic, do not merge any topics, keep them separate. 

111 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Introduction

Visit your favorite climate portal and find, assess, and comment on a project or report related to the effects of El Nino on a particular sector (such as agriculture, utilities, human health, etc.,) due, in part, to anthropogenic climate change. El Nino (and its counterpart La Nina), are natural phenomena that affect seasonal weather and long-term climate patterns around the world. You'll likely need to explore the basics of El Nino before reviewing your article (See: https://www.climate.gov/enso). You'll come across many reports attributing serious impacts to El Nino; and many will go a step further by tying events to climate change. But do these reports present the science and impacts effectively and truthfully? As you explore how organizations treat El Nino, think about some of the real-world economic impacts and reasonable options to respond to them.

There are three objectives for this assignment: 1) discover climate portals that publish on advanced climate-services related topics; 2) evaluate and critique your project/report of choice in light of the knowledge gained from the materials assigned for this module; and 3) comment on the relationship between El Nino and climate impacts (if any). You can pick virtually any report as long as its author/s offers ample and credible support for their findings.

The report must be fairly recent (at the most, 12 months old).


A brief description of the project or report you are introducing;

Your assessment of the credibility/veracity of the report (not all organizations are alike!);
Your assessment of the substantive points made in by the author/s; and

A brief account of the nexus between El Nino and impacts on a given critical sector. Does the project or report acknowledge uncertainties? 

Does it explore the science in an understandable way? If not, what do you think are the reasons for these omissions?

Must follow instructions.  Please utilize 3 questions to frame paper
Must Identify a Country directly impacted by El Nino

4 scholarly sources in addition to climate portal

342 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

This is the proposal that was written for this paper a few months ago.  Now what we need to do is conduct the research and write the paper.  You also listen some possible sources for this paper that you could use.  Please add to these sources as well.  Make a bibliography for this paper at the end of the paper and also make sure to use footnotes within the paper as well.

The topic that will be focused on and fully researched for the seminar paper this semester will be the intelligence operations of the Gulf War which began in the year 1990 upon the invasion of Kuwait by the country of Iraq.  The paper will also discuss the role of the CIA within the time period of this war and how the organization was involved.  It will also discuss various ethical issues that were involved within this war that has to do with intelligence as well as the support that was provided by the intelligence obtained and how several threats were uncovered during this time of war. How intelligence also assisted in monitoring political developments and military deployments during the period preceding the war will also be examined as well as how intelligence was used strategically to guide US policy an actions during the times of the war.  Finally, the paper will also examine whether or not the intelligence that played a role within the war provided factual and accurate information.


References:

Budahl, B.  (2019).  Counterintelligence operations in the Persian Gulf War and the Iran-contra operation.  Modern Diplomacy.  Retrieved from https://moderndiplomacy.eu/2019/08/12/counterintelligence-operations-in-the-persian-gulf-war-and-the-iran-contra-operation/

Coia, R.  (1995).  The critical analysis of the I MEF intelligence performance in the 1991 Persian Gulf War.  Retrieved from https://fas.org/irp/eprint/coia.htm

The George Washington University.  (2001).  Operation Desert Storm:  10 years later.  The National Security Archive.  Retrieved from https://nsarchive2.gwu.edu/NSAEBB/NSAEBB39/

Quinn, R.  (2014).  Intelligence center provides support to Desert Shield/Desert Storm. US Army.  Retrieved from https://www.army.mil/article/118182/intelligence_center_provides_support_to_desert_shielddesert_storm

Ball, D.  (1991).  The intelligence war in the Gulf.  Strategic and Defence Study Centre.  Retrieved from http://sdsc.bellschool.anu.edu.au/sites/default/files/publications/attachments/2016-03/078_The_intelligence_war_in_the_gulf_%28Canberra_papers_on_strategy_and_defence%29_Desmond_Ball_105p_0731512065.pdf

357 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

You will be developing, designing, building and querying your own personal database. Here are the instructions:

1. Select a very narrow domain for your database. Limit 5 entities.

2. Create a description of the domain of the database including the key entities. Describe the entities  including the relevant attributes of each entity and the attribute which defines a single instance of the entity.

3. Narratively  describe the relationships between the entities, including the cardinality of the relationships.  

4. Narratively describe the types of questions that users of the database could answer using the database. 

5. List three specific question that can be answered only by looking at data from two or more tables of the database. 

6. Once you have completed the narrative description of your database, use the MySQL ERD modeling module to create an ERD depicting the database.

7. Next, forward engineer the database, and create an Excel spreadsheet containing between 5 and 10 records for each table.use MySQL to load the data from the Excel spreadsheets into your database. Once the data has been loaded, create a data dictionary for your database. Finally, write a query to answer each of the three questions you described in the first part of the project.

217 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Part 1
Read the following blog post -  https://news.sophos.com/en-us/2015/03/03/anatomy-of-a-ransomware-attack-cryptolocker-cryptowall-and-how-to-stay-safe-infographic/
Then answer the following questions -
1. 1)    How does ransomware work?
Based on the article the first step is for the malware to be installed, then is sets keys in the windows registry to start up every time the computer starts. The next step is to contact the server of the malware owner, identify each other and create & exchange cryptographic keys. With these keys the malware can now start encrypting every file it comes across. The last step is the ransomware extorting the user for payment in order to get their data back. 
2) How would you know you've been affected by ransomware?
3) How can local election offices prepare themselves BEFORE being a victim?
4) What do you do once you've been attacked?
5) How would you recover from ransomware to become fully operational?
Part 2
Next, take this quiz then snap a pic + upload your results -  https://phishingquiz.withgoogle.com/
Part 3
Read the attached benchmarking report and answer the following questions -
1) What is the number #1 threat action uses in successful breaches?
2) Describe the testing methodology in the report in 20 words or less.
2a) Do you agree with the testing methodology?  Why or Why not? Be prescriptive.
3) Which industry performed the worst?  Which industry performed the best?
4) What is the best way to improve an organization's defense to phishing attacks?
5) Every organization is susceptible to phishing - T / F   Explain - why did you choose your answer?
6) Did results improve or worsen compared to international results for the same industries?
7) There are a number of Executive takeaways.  List your Top 3 and explain - why did you choose your three?
8) How would you plan a phishing exercise in your organization?  What steps would you take?

324 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:



  1. What is the difference between data, information, and knowledge?

    2. What are the characteristics of a relational database?

    3. Explain the difference between type 1 and type 2 Hypervisors.

    4. What are the advantages of virtualization technology?

    Helpful links

    What is virtualization?
    https://www.redhat.com/en/topics/virtualization/what-is-virtualization

    Guide to Hypervisors 
    https://www.serverwatch.com/server-trends/guide-to-hypervisors.html

    Virtual Infrastructures: Hyper-V vs VMware
    https://www.solarwindsmsp.com/blog/virtual-infrastructures-hyper-v-vs-vmware

    Introduction to Virtualization and VMware Hypervisor Architecture (vSOM) (5:50)
    https://www.youtube.com/watch?v=EvXn2QiL3gs

    What Is Hyper-V & How Do You Use It? A Beginner’s Guide
    https://www.cloudwards.net/hyper-v/

    Hyper-V Technology Overview
    https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-technology-overview
104 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Case Study Guidelines
Examine the case study of the Cyber Espionage/Cyber Terrorism event called Shamon 2012.
•    In your case study detail the chronology of the incident, the threat actor or suspected threat actor, motives, target, technical means and non-cyber aspects.  
•    Detail the victim organisation/s response including what worked well and what did not.  
•    Suggest how the victim organisation/s could have been better prepared, detected the event earlier and responded more effectively.

Remember the case study is a academic research and writing assignments. What this means is that any time you make a factual claim, this claim should be supported by relevant supporting evidence. 
This is true even if you are offering recommendations—rather than tell the reader what you think might help address a problem, show the reader what the research has demonstrated to be an effective solution. 
For the most part, this evidence should be drawn from peer-reviewed research, which you can find in relevant academic journals and monographs.
While newspaper articles can be useful, they should be a secondary (rather than your primary) source of evidence. Also, where possible, you should try to synthesise information from multiple sources, rather than just repeating the claims of one source to support a given argument.

Please note to include at least 10 academic references, also it is to be in 12-point font, double spaced with Harvard referencing and the word limit is 2000 words. 

246 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

When asked about Google releasing personal information to law enforcement agencies, Google’s CEO Eric Schmidt told CNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place”. Discuss Mr. Schmidt’s perspective.

53 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course. 

Scenario
“We Make Windows”, Inc. (referred to as “WMW”) has hired you as an IT consultant for implementing their Windows network infrastructure. WMW is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WMW with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern – WMW wishes to implement the “right” solution to fit their needs now and for the next 2-3 years.

There are several details about WMW which will have an impact on your choices:
•    WMW will start with 90 employees, in the following departments:
o    Executives (9 employees) – manage and run the company
o    Accounts and Sales Department (15 employees) – perform market research and maintain accounts
o    Creative, Media and Production Department (49 employees) – advertising
o    Human Resources and Finances (12 employees) – perform HR and financial duties
o    IT (5 employees) – manage IT for the company
o    WMW will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.
•    Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity. Please be sure to state these assumptions.
•    Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
•    Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company’s financial details). You may make assumptions about how data should be shared or kept private, but they must be stated in your paper.
•    Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2016 operating system should be used for all aspects of the solution.

The topics include:

New Features of Windows Server 2016
•    Describe new features of Windows Server 2016 that WMW can take advantages of.

Deployment and Server Editions
•    How many total servers are needed? Which roles will be combined?
•    What edition of Windows will be used for each server (e.g., Standard, Datacenter)?
•    Will Server Core be used on any servers?
•    Where are each of the servers located (which of the two sites)?
•    How will the servers be deployed? Manual or automated?

Active Directory
•    Number of AD domains?
•    Will there be any Read-Only Domain Controllers?
•    How will the second site factor into domain controller placement? How will AD sites be configured?
•    How will AD organizational units be organized (considering how group policy will be used and users will be organized)?

DNS and DHCP
•    DHCP scope design (e.g., lease times, number of scopes, address range)
•    Will a form of DHCP fault tolerance be implemented?
•    Will DHCP reservations be used for servers?
•    DNS namespace design (e.g., domain name(s) chosen, split DNS for Internet/intranet, zones)
•    How will DNS be handled for the second site?

Application Services
•    How will applications be deployed? If using Group Policy, what are the details on how Group Policy will be used to deploy the software? Which software applications will likely be needed?

File and Printer Sharing
•    What shares might be needed?
•    Explain File Permissions

Assignment Requirements
There are specific requirements for the assignment: The final submission should contain at least 6 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.
•    At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader’s understanding of the proposal. Additional diagrams, images, or tables are welcome.
•    The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.
•    The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.
•    At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.
•    Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMGC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus. In its simplest form, if you are using text from a source, you must cite and/or quote it. 

1094 Words  3 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Our research is about discussing how tesla uses its hardware and software with their integration with each other as new emerging technology. As an emerging technology, the main focal point must be on the technological side i.e. hardware and software and their integration to create the Tesla car system. You need to discuss what are these components, how they integrate with each other to create the entire system of electronic motorized vehicle. You need to explain exactly what the parts of the system of the tesla car are and how they work with one another. You also talk about the benefits of this technology of electric cars versus normal fuel powered cars and continuously reference it through out to contrast the vast difference and highlighting that the electric car is the way of the future. Also discuss the challenges and difficulties of the tesla hardware and software, then discuss how these challenges need to be improved to create the perfect eco-friendly car. The research should NOT exceed 5 pages inclusive of the reference page. You should be innovative when choosing the title of this research

1-Abstract [also need to add keywords for the research, important terms not known to common readers]
2-Introduction
•    Overview of the tesla car
•    Description of the hardware components
•    Description of the software components
3-Benefits
•    How the hardware and software integrate
•    Electric VS Fuel powered car
4-Challenges
•    What are the barriers and obstacles of this technology
•    What must be done to fix or mitigate the problems
5-Conclusion
•    Opinion on the research carried out.
6-Refereces page
Please provide 7-10 references no less.

Grading will be based on the following:
Content depth and analysis [60%] | Content organization [10%] | Language accuracy[10%] | Presentation[15%] | Language accuracy[5%]

308 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

It is intended as an informal introductory discussion to some of the basics of ICS.  We will look at the five functional areas of ICS as well as terms and acronyms used by Incident Commanders and Emergency Management personnel.  Please do the following:

1.  List the five functional areas of the Incident Command System.  Describe each of them briefly.
2.  Choose one of the functional areas and elaborate on the responsibilities of the area you chose.  
3.  List and describe acronyms that are commonly used by Incident Commanders and Emergency Management personnel.  This could likely have come from your previous experience during an actual response. For those with limited or no ICS experience, report on terminology that you could see your area of involvement (fire, police, public health, TSA, emergency management, etc.) using during an emergency response.  This might help us all to understand the acronyms and jargon used during an ICS response by other agencies a little better.

171 Words  1 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

analyzing several scenarios and determining what technologies would work well together to solve these problems. For each answer, back up your reasoning with why you chose each technology, strategy, etc.

Scenario 1: Logging
In this scenario, you are tasked with creating a logging server for any number of other arbitrary pieces of technologies.

Your logs should have some common fields, but support any number of customizeable fields for an individual log entry. You should be able to effectively query them based on any of these fields.

How would you store your log entries? How would you allow users to submit log entries? How would you allow them to query log entries? How would you allow them to see their log entries? What would be your web server?

Scenario 2: Expense Reports
In this scenario, you are tasked with making an expense reporting web application.

Users should be able to submit expenses, which are always of the same data structure: id, user, isReimbursed, reimbursedBy, submittedOn, paidOn, and amount.

When an expense is reimbursed you will generate a PDF and email it to the user who submitted the expense.

How would you store your expenses? What web server would you choose, and why? How would you handle the emails? How would you handle the PDF generation? How are you going to handle all the templating for the web application?

Scenario 3: A Twitter Streaming Safety Service
In this scenario, you are tasked with creating a service for your local Police Department that keeps track of Tweets within your area and scans for keywords to trigger an investigation.

This application comes with several parts:

An online website to CRUD combinations of keywords to add to your trigger. For example, it would alert when a tweet contains the words (fight or drugs) AND (SmallTown USA HS or SMUHS).
An email alerting system to alert different officers depending on the contents of the Tweet, who tweeted it, etc.
A text alert system to inform officers for critical triggers (triggers that meet a combination that is marked as extremely important to note).
A historical database to view possible incidents (tweets that triggered an alert) and to mark its investigation status.
A historical log of all tweets to retroactively search through.
A streaming, online incident report. This would allow you to see tweets as they are parsed and see their threat level. This updates in real time.
A long term storage of all the media used by any tweets in your area (pictures, snapshots of the URL, etc).
Which Twitter API do you use? How would you build this so its expandable to beyond your local precinct? What would you do to make sure that this system is constantly stable? What would be your web server technology? What databases would you use for triggers? For the historical log of tweets? How would you handle the real time, streaming incident report? How would you handle storing all the media that you have to store as well? What web server technology would you use?

Scenario 4: A Mildly Interesting Mobile Application
In this scenario, you are tasked with creating the web server side for a mobile application where people take pictures of mildly interesting things and upload them. The mobile application allows users to see mildly interesting pictures in their geographical location.

Users must have an account to use this service. Your backend will effectively amount to an API and a storage solution for CRUD users, CRUD 'interesting events', as well as an administrative dashboard for managing content.

How would you handle the geospatial nature of your data? How would you store images, both for long term, cheap storage and for short term, fast retrieval? What would you write your API in? What would be your database?



reference answer:
https://github.com/zijing2/CS554/blob/master/lab8/Huang_Zijing_CS554_A.pdf
https://github.com/bradford-smith94/cs554/blob/master/Lab8/bsmith8_cs554-lab8.tex
https://github.com/rsutariy/CS-554-Web-Programming-2/blob/master/LABs/Lab-8/Sutariya_Ruchika_Lab8.pdf

650 Words  2 Pages

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Project Deliverables
Note: All Phases and sections MUST be covered.
The project requires students to perform three phases: (a) requirements analysis, (b) system and database design, and (c) a project plan. Note that in the phase 3, students are required to use the MS Project software for their project schedule.
The deadline for the Individual Project can be found in the schedule section of the class syllabus.
The following layout format covering a title page and all three phases is recommended for the project.
Title page (project name, author, and date)

Phase 1: Requirement analysis
A. Problem definition
B. Issues
C. Objectives
D. Requirements
E. Constraints
F. Description of the proposed system
G. Logical model design
1.    Data flow diagrams
•    Context diagram
•    Diagram 0
o    Diagram 1 (Diagram 1 is optional)
•    Descriptions of processes in each diagram
2.    Descriptions of outputs/inputs/performance/security or controls
H. Specific requirements, if any (interface, operational, resource, performance, etc.)

Phase 2: System and database design
A. User interface
Design an overall user interface consisting of screens, commands, controls, and features to enable users to use the system.
1.    How data will be input to the system?
•    The physical layout for each input
•    The input design and procedures
2.    How data will be output from the system?
•    The physical layout for each output
•    The output design and procedures
B. Data design
Develop a plan for data organization, storage, updating, and retrieval.
1.    Database design 
•    Database tables with their attributes should be presented
•    Primary key(s) should be identified in each table, if any
•    Three steps of normalization should be included.
2.    Entity-relationship diagrams
3.    Data file storage and access
C. System architecture
Determine the architecture of the system as Web-based interface, client/server architecture, Internet/Intranet interface, network configuration, etc.

Phase 3: Project plan
A list of tasks or activities needed for implementing the proposed system
Estimating completion time and costs
A project schedule for performing those activities (Gantt charts or PERT charts)
Note that there is no other required software package except the MS Project software in this ITEC-630 course. As a result, you are only required to use the MS Project software to handle the scheduling part of the project and for other parts, you can use any word editing software or any drawing tools software.

400 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...