The Project will be a website (multiple pages with good navigation) that include

The Project will be a website (multiple pages with good navigation) that include

The Project will be a website (multiple pages with good navigation) that includes the access to and the ability to update an SQL database. You should be able to: Use login procedures Register for the site Add records to at least two tables Search the database using at least two criteria Update the database, including changing and deleting records from at least two tables Create a page with the result of joining multiple tables The database should include a minimum of four related tables, connected by foreign keys, that include a variety of data types. Minimally, there will be text, numeric, and date or time. All tables will have primary keys, and at least one table will have a key that is an auto-incremented field. Every project must contain documentation. It can be a word document, or any text document. You must explain the MySQL file structure, and each page in the website. For each page, you must document the data elements (variables), and any logic and/or calculation that you use. Potential projects are: A forum about a topic, and including subtopics A social site, including images and comments An auction site, including images, products and bids Any other PRE-APPROVED site

ASSIGNMENT: For this Touchstone, you will learn how to effectively plan, design,

ASSIGNMENT: For this Touchstone, you will learn how to effectively plan, design,

ASSIGNMENT: For this Touchstone, you will learn how to effectively plan, design, develop, and test an original program of your choosing. This program is your choice and it can be as complex as you wish. The goal is to start with an idea for your program and then step through the process of most phases of the development lifecycle to turn your idea into an actual program. This includes planning out the algorithm using pseudocode, coding your program using everything you learned from Units 1-3, and finally, testing and debugging your program to make sure it fulfills your intended purpose. You will fill out a journal (template link below) which has five sections that correspond to the five steps you will complete for your final project. Use this template to write your journal responses for each section of the project. When you have finished, you will submit this journal as a Word .doc/docx.
Java Journal Template
The following Example Java Journal Submission will be helpful to you as you work on this assignment and shows acceptable submissions for each entry.
Example Java Journal Submission
Being able to create your own program can be beneficial in any career field. Anything that can be programmed or automated in any industry could make your work a lot easier. Even as a hobby, it can give you a reference point to have a better understanding of how to deal with common issues. Using basic Java to automate menial tasks can save you time and money! Whether you were in this class to learn programming at a professional level or if it’s just for fun, you will benefit from learning coding as a foundation of your technical skills.
In order to foster learning and growth, all work you submit must be newly written specifically for this course. Any recycled work will be sent back with a 0, and you will be given one attempt to redo the Touchstone.
A. Directions
Step 1: Download and review the Java Journal Template.
Step 2: Review Section C (Requirements) to get acquainted with the requirements for this Touchstone before you begin writing your journal entries.
Step 3: Follow the directions for each part of the journal template. Make sure to include in your response all the elements listed under the Requirements section. Prompts in the Inspiration section are not required; however, they may help you to fully think through your response.
Follow the journal creation process that is presented in your Unit 4 lessons to ensure you write a thorough journal entry. There is also an example of a successful journal entry for each submission in Section D (Additional Resources).
Review Section B (Rubric) to make sure you have an understanding of how each journal entry will be graded.
Step 4: Once your journal is complete, including the code link, submit your journal for grading.
There is a help video on “How to submit your Touchstone” in the first lesson of Unit 4 (Java Touchstone Overview).
*. Once you submit the final Replit link, users will be able to see the person who submitted the file so please create a replit profile and use the name: Jerrell Young.

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 references in the section at the end. Use the instructions below: ###Instructions:### Search the Web for two or more sites that discuss the ongoing responsibilities of the security administrator. What other components of security management can be adapted for use in the security management model?

Write a two-page essay detailing the hardware requirements for the application s

Write a two-page essay detailing the hardware requirements for the application s

Write a two-page essay detailing the hardware requirements for the application software you are prototyping. Discuss the type of hardware, the operating system, RAM requirements, and any pertinent information as it relates to your prototype. Use APA format.

Part 1: Statutes, Regulations, and Contract Compliance Outcomes addressed in thi

Part 1: Statutes, Regulations, and Contract Compliance
Outcomes addressed in thi

Part 1: Statutes, Regulations, and Contract Compliance
Outcomes addressed in this activity:
Course Outcome:
IT591M4-4: Analyze technical scenario elements for industry standards, compliance regulations, and laws to determine strategy.
Purpose
It is important to understand how compliance and penalties differ across statutes, regulations, and contractual obligations, as this will affect decisions that need to be made in security controls that an organization will need to implement and will also have an impact on performing an accurate risk assessment. In this assessment, you will provide a specific example of a statute, a regulation, and a contractual agreement for an industry of their choice. You will discuss the differences in the origin of each, the compliance requirements of each, and the penalties for each within that specific industry.
Assessment Instructions
Select an industry of your choice (retail, education, military, healthcare, financial, government) and briefly describe that industry in today’s world and discuss any changes occurring within the industry that are relevant for security.
For that industry, identify one specific relevant statute, one relevant regulation, and one relevant contractual obligation that might exist.
Create a header for Statute, Regulation, and Contractual Obligation. For each, describe the origin of the statute, regulation, or need for contract. Discuss the compliance requirements for the statute, the regulation, and the contract. Discuss the penalties that exist for the lack of compliance under each.
Describe the statute, regulation, and contractual obligation in terms of how it might affect a security risk assessment for the organization.
Assessment Requirements
4–5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
At least 1 credible source cited and referenced
No spelling errors
No grammar errors
No APA errors
Part 2: Organizational Impact of Regulations
Purpose
For this assessment, you will have an opportunity to compare and contrast organizations in two different domains and evaluate the organization in terms of the information they collect, process, and store and to evaluate the organizations’ risk, audit/regulation requirements within each domain, and necessary security controls. This leaves you with a well-rounded view of the organizational impact of regulation across domains. You will also analyze areas related to risk analysis, standard compliance, and control implementation where conflict resolution may be necessary.
Assessment Instructions
Part 1:
Pick two organizations (they can be real or hypothetical in nature). Make sure they are different types of organizations (like those listed below).
Municipality
Educational institution (e.g., university, community college, high school, etc.)
Police station
Retail store
Government research
Hospital
Utility
Bank
Manufacturing facility
Convention center
Airline
Military installation
Describe the organizations in moderate detail.
Identify the types of information that these two businesses use, process, or store that must be protected by one of the regulatory requirements previously discussed in this course.
List the types of information and how the info is collected, used, processed, or stored.
Identify the risk exposure for each of these two organizations. Compare and contrast these risks.
List the risks (of the information being lost, corrupted, stolen, etc.) by different methods.
Identify the impact of not adequately protecting this information (consequences and costs).
Identify the compliance frameworks that would apply to these organizations based upon their information needs and applicable rules, regulations, and standards (e.g., ISO, COBIT, HIPPA, PCI, SOX, etc.).
List the requirements or standards that apply to the two organizations based on their businesses and the information that they use or process.
Identify and list the types of controls that would be the most important to implement to safeguard this information to comply with regulations and to minimize risk to the organizations.
Summarize the internal controls that would need to be established to achieve these compliance goals (including physical, administrative, technological, and auditing controls that would have to be in place).
Summarize how the differences in business requirements, information needs, and regulatory environment affect business priorities, operations, and structure.
Close the paper with a conclusion, summary of lessons learned, and/or personal observations or opinions of the team.
Part 2:
Conflict Management Skills Evaluation
Consider the process of identifying risks, identifying relevant standards, and identifying and implementing security controls (both process and technology). In addition to identifying risks, standards, and controls, there is also a people element, and often there is tension between business needs and processes and security controls. Discuss the types of inter-departmental conflicts that might arise during this process. Using the library resources and the Internet, find and summarize five conflict management skills. Be certain to cite your sources. Focus on one of the industries discussed in part 1, and discuss which of these conflict resolution skills that might be required to successfully implement effective security for an organization.
Assessment Requirements
5–6 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
At least 1 credible source cited and referenced
No spelling errors
No grammar errors
No APA errors
For more information on APA formatting and citation style, refer to the resources in the Academic Tools area of this course. Also, review the university policy on plagiarism. If you have any questions, please contact your professor.

simnet projects excel projects 1-6 access projects 1-6 word projects 1-6 this is

simnet projects excel projects 1-6 access projects 1-6 word projects 1-6 this is

simnet projects excel projects 1-6 access projects 1-6 word projects 1-6 this is access and word and excel project they must all be completed with 100% as the first attempt score I will tip generously if it is completed on time

Choose a financial organization Executive Overview (introduction and purpose) Fr

Choose a financial organization
Executive Overview (introduction and purpose)
Fr

Choose a financial organization
Executive Overview (introduction and purpose)
Framework Enhancement Proposal
Cybersecurity Framework Report
Simulation Program Design
Include practice processes and procedures to:
communicate plan of vulnerabilities
counterattack initiatives
Cybersecurity Policy Report
Cybersecurity Technology Report
Enterprise Cybersecurity Program Report

Answering 10 questions plus writing an 1–2 pages on the following: How can a lar

Answering 10 questions plus writing an 1–2 pages on the following: How can a lar

Answering 10 questions plus writing an 1–2 pages on the following: How can a large global organization protect themselves against passive Reconnaissance attacks?
I will add the lab screenshots
Part 1
Section 1
Insert Lab screenshots
Section 2
After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
Describe the different capabilities of Low Orbit Ion Cannon. Search and identify at least one other product that allows you to conduct denial of service attacks, and identify two differences between the products. Provide appropriate citations.
In this lab you performed TCP, UDP, and HTTP flood attacks. Research and describe three different ways that an organization can prepare against denial of service attacks. Describe how the defense strategies against denial of service attacks differ based on the types of attacks. Provide appropriate citations.
While using tcpdump in step 9 of the lab, search and identify what –nntttt, -s 0 and –w options are supposed to do.
What steps should an organization take when it is actively under a DDOS attack? Provide appropriate citations.
Review the sources below and write out five questions that you would need to answer in your pen test plan.
Korpela, K., & Weatherhead, P. (2016). Planning for Information Security Testing—A Practical Approach. ISACA Journal, 5, 1-10. Retrieved from https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-information-security-testinga-practical-approach
Pentest Standard: Pre-engagement. (n.d.). Retrieved from http://www.pentest-standard.org/index.php/Pre-engagement
Part 2
Section 1a
Insert Lab screenshots
Section 1b
Write an additional 1–2 pages on the following: How can a large global organization protect themselves against passive Reconnaissance attacks?
Section 2
After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
What is the purpose of banner grabbing? Identify two tools/methods/commands to perform banner grabbing in addition to Nmap, Zenmap, netcat and telnet, which you used in the lab. Provide an example of one of them.
When would you use the Nmap scriipting engine? Describe a commonly used scriipt and give an example of its use syntax.
Why are there timing and performance options in Nmap? When would you perform a paranoid scan? Give an example of an Nmap scriipt that performs the paranoid scan.
Why would you use a wordlist with John the Ripper? Give an example of the syntax of John the Ripper with a wordlist.
Identify how you arrived at the conclusion that the firewall is redirecting to both the Windows®and Linux® machines in the lab. Provide screenshots from your Nmap scans to support your argument.

Hi, Please update pages 55-60 create a project graphs sheet and task sheet to go

Hi, Please update pages 55-60 create a project graphs sheet and task sheet to go

Hi, Please update pages 55-60 create a project graphs sheet and task sheet to go along with my paper recommendations. Please also include a fitcious budget that the School District will be using to implement recomendations. I also need a 25 slide presentation for my paper. Please also update the appendix page with all figures.