Discussion-Replies-writing-homework-help

Must be 150 words each

1) Lynda.com Vulnerability Scanning Sandra

Hello everyone! This video was interesting gave me some useful information on example commercial and free scanners such as SAINT and NESSUS and Acunetix and using Microsoft Baseline Security Analyzer 2.3 used by IT professions. And Qualy’s browser checker did not know there was one for the browser good to know. According to the video Vulnerability probes targets the network by detecting open ports, determines software, operating system and versions and identifies knows vulnerabilities.

A brief description of Information Systems as software, decision making on DBMS, DSS and MIS

Information Technology is dealing with hardware, computer networking devices.

Two types of Scans

Unauthentication Scans

Finds basic configuration issues

Use no user names or passwords

Simple to run

Will miss many vulnerabilities

Authentication Scans more powerful

Uses user names or passwords

Mimics a user on the system or website

More aggressive can be used inside the system

Some are Brute Force techniques

More thorough and provides comprehensive reports

Type depends on Objectives

Initial Unauthentication

High Level Unauthentication

Compliance Requirement Authentication

User Stimulations Authentications

Attacks can be active or passive

Goal exploiting a vulnerability

Achieves some end results

Denial of Service

Data inspectors, modifications or theft

2) Chapter 2 Ping of Death

Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command. While PoD attacks exploit legacy weaknesses which may have been patched in target systems. However, in an unpatched systems, the attack is still relevant and dangerous. Recently, a new type of PoD attack has become popular. This attack, commonly known as a Ping flood, the targeted system is hit with ICMP packets sent rapidly via ping without waiting for replies.

3) Chapter 2 ICMP flood attack

Hi instructor and class, the ICMP flood attack is similar to the SYN flood attack. An ICMP flood takes place when an attacker overloads its victim with a huge number of ICMP echo requests with spoofed source IP addresses. This type of attack has caused a lot of headaches to network administrators in the past therefore it is the first attack that has been “fought and killed” nowadays, using various methods. The simplest one was to completely disable ICMP from untrusted interfaces and the more complicated one was to policy the rate of transmission of ICMP requests and limit down this rate in case of aggression.


4) Module 2 canonicalization erro

A canonicalization error is an application vulnerability that occurs when an application parses a filename before the operating system has canonicalized it. Operating systems canonicalize filenames when processing a file to identify the absolute, physical path of the given file given a virtual or relative path. Files can be accessed using multiple names. For example, if your application uses one of the methods to validate whether the user has access to the file, an attacker could potentially use one of the other synonymous names. Canonicalization attack can be avoided however, if characters were listed in the application that are allowed rather than creating a blocking list. The best way to identify the canonical bug is by tricking the parser using a variation of the same input data on which your application is making essential security decisions, such as try to bypass the checks resorting to backslash instead of forward slash, or try different encoding schemes to trick the parser.


5) Module 2 Security Policy Implementation


Without formal information security policies and standards, an organization cannot effectively secure its critical information assets. The simple fact that policies and standards are the necessary foundation of effective information protection is why:

  • Legal compliance with Information security regulations like HIPAA require information security policies and standards
  • MasterCard and Visa require organizations that accept their credit and debit cards to have information security policies and standards
  • Every information security effective practice contains a requirement for organization wide information security policies and standards
  • In the event of an information incident negatively affecting 3rd -parties, it may be argued that the absence of information security policies and standards is evidence of information negligence

6) Module 2 Cyber security roadmap by Cisco

I thought I would share some information that the class might be interested in. I was reading the 2017 Cisco Cybersecurity Roadmap and pulled out this statement:


Another thing to consider: your organization’s business transactions rely on reputation, and your brand. If you think that value can’t be quantified, check out how much the top 100 brands are worth. Just the top 10 brands combined are worth over $700 Billion Dollars. That’s more than the GDP of all but 18 countries

I thought this was interesting as I have seen and been witness to professionals in the cyber security business, ignore brand reputation and business in some of our aspects of our careers. It is very important that if we work for an organization, we remember that the organization is a brand and that brand matters. Without it, we don’t have a jobs.

There is a lot more interesting information in the document, so I suggest it as a read.

7) Module 2 Network Security Breach Effect Business Continuity

Business continuity and security work in tandem, both help mitigate costs and impact of data breaches. Organizations need security to prevent, protect, detect and for emergency response and crisis management. Business continuity is critical for dealing with the impact, and recovery. Speed and agility are key enablers in cyber incident response, and business continuity enables agile, rapid response limiting financial and reputational impact on the enterprise.

Many of the things considered during disaster contingency planning are identical to the things information security analysts routinely evaluate:

  • Threat evaluation
  • Risk assessment
  • Mitigation planning
  • Service prioritization

No cybersecurity effort is complete without user education and coordination; likewise, no business continuity plan can expect to succeed without users who both have input on important components of the plan and who are well-versed in its execution.

8) Learning Team

Hello everyone! Describe approaches to prevent or mitigate a DDoS attack.Explain your response.

DDoS distributed denial of service attack is liking your home being flooded, without warning attackers can upend your company. You would need a faster more immediate means of threat detection to prevent severe damage. DDoS attack is affecting the services and not failing server or application. The actual mitigation of the threat starts to take effect. Application layer attacks are much harder to detect.

Variety of methods allow security teams to gain insight. One approaches is flow sampling as viturally routers support some form of Flow technology, such s NetFlow, IPFIX or sFlow.process the router samples packets and exports a datagram contains information about that packet. For depth security analysis purpose relying on samples is serious concession missing a large piece of information as your receive one packet. A flow analytics device has to evaluate the behavior of a traffic stream over longer period of time.

Log-in-to-the-blackboard-finish-2-Discussion-and-chapter-

1. Log in to the blackboard and finish 3-1 Discussion: The Tort of Negligence and 3-2 Small Group Discussion Workspace: Negligence: McDonald’s Hot Coffee Case.

2. Finish chapter.

( learning modules-module three )

ID: pengcheng.hu

password: 02031995

Wireless-Quiz

Quiz online

Styles-of-Policing-

You are a patrol officer in a middle- to lower-class community, which is a suburb of a much larger metropolitan city. During the past 6 months, you have noticed an increase in what might be the beginning of gang activity in your community. You have begun to see gang-style graffiti painted on walls, buildings, and street signs. You have noticed that more young adults are gathering on street corners and appear to be dressing in clothing often associated with gang involvement. While no gang violence has occurred yet, you suspect it is not far away.

As discussed in your text, there are three distinct styles of policing. They are the watchman style, the legalistic style, and the service style.

In a single posting, describe in detail how you would address this growing problem using each of the policing styles listed above. Explain which approach is best, using research to substantiate your postings, citing your sources following APA format.

compare-and-contrast-LANGSTON-HUGHES-Harlem-CLAUDE-MCKAY-If-We-Must-Die

Its comparing two poems and doing a literary analysis of those three poems using three poetic devices like themes, similes or metaphors, and tones.

my selection is :

LANGSTON HUGHES Harlem

CLAUDE MCKAY If We Must Die

Please include thesis statement

Spare-Parts-

In 250-350 words, tell us about Fredi Lajvardi from Spare Parts book. First, comment on their physical attributes and appearance. Then, tell us what is shared about their background, family and relationships with others. Next, tell us what makes this character unique and what struck you as very interesting about them. Be sure to explain their uniqueness and/or how you were impressed by citing specific actions they did in the book or words they said.

Pneumoconiosis-100-words

all I need is a response relating the video to the scenario that I wrote above. 100 words

new patient (male, 52yo, 67in., 65Kg) reports to the community clinic with a chief complaint of persistent cough (3 months), difficulty breathing, and weight loss. He appears thin, pale, and moderately ill but in no acute distress. RR 22, BP 138/88, Temp. 37.6, SpO2 89%. Suggest specific personal histories that could outline a diagnosis for this disease.



Attack-and-Penetration-Test-Plan

Scenario:

You are the owner and operator of a small information security consulting firm. You have received a request from one of your clients, Infusion Web Marketing, to provide a written proposal for performing a penetration test on the company’s production Web servers and corporate network.

Environment:

Scope

Production e-commerce Web application server, the e-commerce Web application server is acting as an external point-of-entry into the network:
• Ubuntu Linux 16.04 LTS Server (TargetUbuntu01)
• Apache Web Server running the e-commerce Web application server
• Credit card transaction processing occurs on all web servers

Intrusive or Non-Intrusive

Intrusive. The test will include penetrating past specific security checkpoints.

Compromise or No Compromise

No compromise. The test can compromise with written client authorization only.

Scheduling

Between 2:00 a.m-6:00 a.m. weekend only (Saturday or Sunday)

Deliverables:

Using the information from the scenario above, provide a written attack and penetration testing plan, describing your firm’s approach to performing the penetration test and what specific tasks, deliverables, and reports you will complete as part of your services. The plan should include these sections:

  1. Table of Contents
  2. Project Summary
  3. Goals and Objectives
  4. Tasks
  5. Reporting
  6. Schedule

Your penetration testing plan should be 2-3 pages in length, not including the title and references pages, and cite at least three credible sources other than the course materials. It should follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

It is strongly encouraged that you submit all assignments to the Turnitin Originality Check prior to submitting it to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, please review the Turnitin Originality Check Student Guide for step-by-step instructions.

* Please include proper introduction and labeled conclusion.

Helpful Resources:

The SANS Institute provides several resources that you might find helpful for this assignment: http://www.sans.org/reading-room/whitepapers/testing

The National Institute for Standards and Technologies (NIST) also provides some guidance on this topic: http://csrc.nist.gov/publications/nistpubs

Marketing-Mix-Place-

so my topic is Reducing meat consumption and the focus is to reduce gas house emissions. I have done all the Marketing mix except for Place.

Place: Making access convenient. Creating convenient opportunities to engage in the targeted behaviours and/or access products and services, including developing partnerships for distribution channels and reinforcing desired behaviours

So for e.g how do you deliver the produce to the customer? how to get behavioural offering to the customer? delivering messages at the point of decision. or for e.g make delicious meals with less meat. We can try to emulate Jamie Oliver

Complete-Business-Management-Powerpoint-NO-PLAGIARISM

Motivation

Please complete ONE of the following assignments, incorporating ideas and concepts from the week’s lecture and/or articles. Please feel free to incorporate outside resources as well. When submitting your assignment, please indicate which of the three options you have chosen. For Options 2 and 3, please make sure to double space your papers.

Option 1: Get Creative

Design and format a 10 – 15 slide Microsoft PowerPoint presentation on one of the learning objectives found in the Getting Started – This Week’s Activities folder for this week. The requirements below must be met for your presentation to be accepted and graded:

  • Design and format each slide for a presentation, see example below.
  • The notes sections must total a minimum of 250 words for the entire presentation. Use these sections to explain and support information provided on your slides.
  • Include a cover slide and reference slide (these slides do not count toward the 10 – 15 slide requirement).
  • At least 60% of your paper must be original content/writing.
  • No more than 40% of your content/information may come from references.
  • Use at least two references from outside the course material, preferably from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the two reference requirement.
  • Identify sources on slides that contain reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) and list them on a reference slide.

Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must be from sources like scholarly journals found in EBSCOhost, online newspapers such as The Wall Street Journal, government websites, etc. Sources such as Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable.

Weekly Related Articles

The Best Ways to Motivate People
What can managers do to motivate employees when they have lost the previous ability to provide financial incentives?
http://www.forbes.com/sites/lisaquast/2011/03/07/the-best-ways-to-motivate-people-and-it-isnt-with-money/

Motivation = Empowerment
Motivation in the workplace isn’t about what you do for your employees; it’s about the work you empower your employees to do for you.
http://www.inc.com/resources/leadership/articles/20070801/musselwhite.html

Motivate Your Employees like Jack Welch
Follow the former GE CEO’s advice and energize your staff by helping them believe in the mission and understand how to achieve it.

http://www.bloomberg.com/news/articles/2008-05-23/motivate-your-employees-like-jack-welchbusinessweek-business-news-stock-market-and-financial-advice