Develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources.

Develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources.

Your team received an assignment to develop and deliver a new company Web application for outsourced suppliers to use as they help support your company’s production resources. The IT director recently returned from an OWASP conference in India and insists that the app will have strong security. As he walked out the door from your initial project briefing the IT director said, “I do not want to wait 200 days after an exploit to hear about it. If something happens, I want to know yesterday.”
Instructions
The project specs require a multi-page design. The app will need to provide an interface to your company’s supply database for reading and entering data remotely as well as the ability to contact, via the e-mail server, your company supply managers. In an effort to save money, management decided that the team will use some open-source software library modules.
Provide at least six steps in the SDLC during which security-strengthening behaviors will be applied.
Explain the specific security-relevant actions taken during each step, including the people involved, the considerations taken, and the security assurance methods used.
Identify and briefly explain at least three different security testing methods and indicate which methods analyze the app’s front end, source code, or vulnerabilities while the app is running. Justify when you would use each method.
Explain at least six different vulnerabilities that could potentially affect your app and actions that your team could take to prevent each.

Develop a cybersecurity project idea that addresses a specific cybersecurity challenge or problem.

Develop a cybersecurity project idea that addresses a specific cybersecurity challenge or problem.

 In this assignment, you will have the opportunity to develop a cybersecurity project idea that addresses a specific cybersecurity challenge or problem. This project will require you to research, plan, and propose a solution to a real-world cybersecurity issue. Your final submission will include a detailed project proposal with specifications and a presentation outlining your project’s objectives, methodology, and expected outcomes.
Objectives:
To demonstrate your understanding of fundamental cybersecurity concepts.
To encourage creative thinking and problem-solving in the field of cybersecurity.
To develop practical project management skills.
To enhance your ability to communicate and present technical information effectively.
Part 1: Project Proposal Submission 
For this part of the assignment, you are required to submit a brief project idea that addresses a specific cybersecurity challenge or problem. Your project idea should include the following information:
Project Title: A concise and descriptive title for your cybersecurity project.
Project Description: A clear and concise description of the cybersecurity issue or challenge your project will address.
Proposed Solution: A brief overview of the solution you plan to implement to address the problem.
Project Scope: An outline of the scope of your project, including what aspects of cybersecurity it will cover.
Expected Outcomes: Your anticipated outcomes and benefits once the project is completed.
Topic:  Cybersecurity Awareness Training Platform:
Develop an interactive platform for cybersecurity awareness training, including modules on best practices and simulations of common threats.
Submission Guidelines:
Submit your project  proposal as separate documents in PDF format.
Use proper formatting, citations, and references following an appropriate citation style (e.g., APA, MLA).

Your manager at work is extremely impressed with your computer skills since you

Your manager at work is extremely impressed with your computer skills since you

Your manager at work is extremely impressed with your computer skills since you took a computer course. The company is installing computers in its production facility, and she has asked you to create a brief PowerPoint presentation that shows tips for working in the new software. Specifically, she wants the layout and topics for the presentation to be organized as shown below.
Slide 1: Include a title slide.
Slide 2: Describe the basics of computer software and what software does.
Slides 3–4: Describe basic functions and techniques that will be used when creating and editing documents in Microsoft Word.
Slides 5–6: Provide what you think are the top tips for creating aesthetically pleasing PowerPoint presentations.
Slide 7: Outline the basics of opening a blank workbook and using Formulas to work with data in Microsoft Excel.
Slide 8: Discuss some basic features of Microsoft Access (e.g., tables, queries, forms) and how employees might utilize this software to track production.
Slide 9: Include a reference slide.

  Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.

NASCAR

Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option  

Picked   Blockchain for Data Security

In your role as a consultant in your chosen business scenario, write an informational email to the project manager that includes:
The benefits that business derive from crowdsourcing
The different types of crowdsourcing
Examples of how crowdsourcing can be used to enhance or promote technology solutions
How bias exists in technology solutions
 
Assessment Requirements/Submission Requirement:
750-word minimum
2 scholarly references

Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding.

Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding.

Conduct research and cite supporting sources in APA format where appropriate.
Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.” 
Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Which algorithm was used to hash the password?
What is the maximum number of days the password is valid?
What is the date that this account will expire?

Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding.

Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding.

Conduct research and cite supporting sources in APA format where appropriate.
Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.” 
Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Which algorithm was used to hash the password?
What is the maximum number of days the password is valid?
What is the date that this account will expire?

Discuss the importance of understanding the type of data and appropriate descriptive statistics in data analysis.  

Discuss the importance of understanding the type of data and appropriate descriptive statistics in data analysis.  

Find  a dataset of interest to you that includes at least one nominal, one  ordinal, and one interval or ratio variable. This dataset can be sourced  online, from your work, or even be a dataset you create yourself.    Analysis: Conduct a univariate analysis of each variable you identified. This should include:    
Creating a frequency distribution for the nominal and ordinal variables.
Calculating common summary measures (e.g., mean, median, mode, standard deviation, variance) for the interval or ratio variable. 
Interpretation:  Provide an interpretation of your findings. What can you infer from the  distribution and summary measures? How does the type of data (nominal,  ordinal, interval/ratio) influence the kind of analysis you can perform  and the insights you can gain?
    Reflection: Discuss the importance of understanding the type of data and appropriate descriptive statistics in data analysis.  
 Submission Format: Your submission should be a maximum of 500-600 words. Submit your assignment in APA format as a Word document or a PDF file. Include  both your written analysis and any visualizations or tables that  support your findings. If you use any software for your calculations  (like R, Python, Excel), please include your code or formulas as well.  

You are currently working at a small company of about 100 employees.Your company just lost a very large client and therefore they need to let go of five employees in your department.

You are currently working at a small company of about 100 employees.Your company just lost a very large client and therefore they need to let go of five employees in your department.

Part I:
Review the “7 Steps to Solving a Problem” attachment above
Part II:
Read the story below: 
You are currently working at a small company of about 100 employees. Your company just lost a very large client and therefore they need to let go of five employees in your department.

The workload of the five employees has been divided up between you and a fellow employee. Your fellow employee is very upset about this because now they must take on more work and not get a pay raise. This employee wants you to join them and fight your boss together for more money. You don’t feel comfortable doing this because you love your job. You would like to make more money, but you do not want to upset anyone and lose your position. On top of this situation, there is a big project that needs to be completed in three days!
How would you solve the above problem?

Review the “7 Steps to Solving a Problem” attachment. Reflect on, and discuss, how the problem described above can be resolved using the steps.
Analyze and explain your application of each of the 7 steps in the “7 Steps to Solving a Problem” attachment to solving the problem described in the above story
Your submission should be a minimum of one page of content in length. Please type the question as well as your answer. Properly cite any source utilized in APA format.

Discuss three situations for uses of different operating system installs in a virtual environment while at the same time securing the operating system installation.

Discuss three situations for uses of different operating system installs in a virtual environment while at the same time securing the operating system installation.

Discuss three situations for uses of different operating system installs in a virtual environment while at the same time securing the operating system installation.
For example, think about why a system administrator would install several different versions of Microsoft Windows VM’s? Or maybe a developer installing different distributions of Linux? Think about the different IT departments an organization may have and what can be done to save time, money, and resources when they utilize virtual machines.

Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit

Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit

 In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. 
 1. Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit
2. Read the week 1 article on installation and deployment of Windows Server 2012 and list 5 concerns that could result in vulnerabilities during installation.
Article: Install and Deploy Windows Server 2012 R2 and Windows Server 2012
3. Discuss three basic network components and how they are used today                                                   The report must be at least 300 words.