2.  Explain your plan for developing and executing a research strategy by doing

2.  Explain your plan for developing and executing a research strategy by doing

2.  Explain your plan for developing and executing a research strategy by doing the following:
a.  Explain 2–4 criteria that should be considered when finding credible and relevant sources to support this topic.
b.  Explain 2–4 reasons why the information or argument in a source would not be reliable.
c.  Identify 2–4 specific databases, publications, or sites that are likely to yield credible and relevant sources for this topic.
d.  Identify 2–4 search terms or phrases that are likely to yield appropriate sources for this topic.
3.  List 4–6 credible and relevant sources found during the research process, identifying the author, date, title, and source location, as available.
a.  Explain why the author, organization, or publication is credible for each of the sources from part A3.
b.  Explain the relevance of each of the sources from part A3 to your chosen topic.
4.  List two additional sources found during the research process that are not credible, relevant, or useful, identifying the author, date, title, and source location, as available.
a.  Explain why each source from part A4 is not credible, relevant, or useful for your topic.
B.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
C.  Demonstrate professional communication in the content and presentation of your submission.

Understanding the basic tools needed to perform a vulnerability analysis allows

Understanding the basic tools needed to perform a vulnerability analysis allows

Understanding the basic tools needed to perform a vulnerability analysis allows a better understanding of the technical capabilities and limitations associated with scanning technologies.
View the “6-2 Vulnerability Scanning Lab” video, located in Class Resources.
Part 1:
Complete the following:
Perform a vulnerability analysis against the Kioptrix 3 VM using the techniques and programs demonstrated in the video.
Provide screenshots and information related to vulnerabilities found on the Kioptrix 3 VM website and the Kioptrix 3 VM website page source.
Provide screenshots of the programs/commands you used to discover vulnerabilities on the Kioptrix 3 VM. Be sure to include, at minimum, the Nmap, dirb, nikto, searchsploit, and OWASP ZAP execution and output.
Part 2:
Write a 250-to 500-word summary and address the following:
Evaluate the effectiveness of applications if they were directly related to a financial institution, government entity, or an ecommerce website in terms of cybersecurity for preventing crime and abuse.
Describe at least five vulnerabilities discovered during your analysis of the Kioptrix 3 VM.
Identify at least two different potential web extensions that could provide information to an attacker and describe why it is dangerous.
Explain a defensive strategy needed to offset the five vulnerabilities focused on above.
Place all screenshots in a Microsoft Word document and submit it to the assignment. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window; this includes the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located Class Resources if you need assistance.

For this module, your task is to review and try the following: Visit the distrib

For this module, your task is to review and try the following:
Visit the distrib

For this module, your task is to review and try the following:
Visit the distributed intrusion detection system call Dshield (https://www.dshield.org/ ) within the Internet Storm Center. What types of attacks were most prevalent at the time of your visit to the site? Where is the origin of most of the attacks? What is the status of the Internet Storm center at the time of your visit?
Once you have completed your exploration of the tutorial, to finish the project for this module you are to prepare 4 page report covering the following topics:
What types of attacks were most prevalent at the time of your visit to Dshield?
Where is the origin of most of the attacks?
What is the status of Internet Storm at the time of your visit?
What other useful security tools did you find on Dshield?

Web browser Security and Vulnerability Assessment (50 points) As a security arch

Web browser Security and Vulnerability Assessment (50 points)
As a security arch

Web browser Security and Vulnerability Assessment (50 points)
As a security architect, submit an assignment that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.
How would you minimize users clicking on links without considering the risks of their actions?
How would you address Web page addresses that are disguised or take you to an unexpected site?
How would you ensure that third-party software has a mechanism for receiving security updates?
How would you ensure users know how to configure their web browsers securely?
Deliverables:
Your paper should be 5-6 pages in length, not including the title and reference pages.
You must include a minimum of two credible sources and information from the module to support your writing. The Saudi Digital Library is a good source for resources.
please do not plaigraise and use references.

As a security architect, submit an assignment that addresses the questions below

As a security architect, submit an assignment that addresses the questions below

As a security architect, submit an assignment that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.
How would you minimize users clicking on links without considering the risks of their actions?
How would you address Web page addresses that are disguised or take you to an unexpected site?
How would you ensure that third-party software has a mechanism for receiving security updates?
How would you ensure users know how to configure their web browsers securely?
Deliverables:
Your paper should be 5 pages in length, not including the title and reference pages.
You must include a minimum of two credible sources and information from the module to support your writing.
Your paper must follow APA style guidelines, as appropriate.

Module 09: Critical Thinking Assignment In this assignment, you assume the role

Module 09: Critical Thinking Assignment
In this assignment, you assume the role

Module 09: Critical Thinking Assignment
In this assignment, you assume the role of a forensic investigator for the DigiFirm Investigation Company. One of your clients is a small music production company. One day you receive a phone call from Andrea, the owner, and president of the organization. She suspects that someone is providing her competition with her upcoming artist’s music.
Andrea’s competition, Big Shot Music has many new releases that happen to be very similar tracks to Andrea’s upcoming artists. Therefore, Andrea cannot release any new songs due to the similarity and fear of a copyright lawsuit. She suspects someone from the inside is providing Big Shot Music with a copy of the songs they can be released.
All composers use Mac Computers but the servers are Windows-based. There is a T1 Internet line on a Cisco 2911 router that connects to a 3Com 5500G-EI 48-Port Stackable Gigabit Ethernet Switch. Also, there are 4 NETGEAR Wireless Desktop Access Point (WAC104) for everyone to connect hence she allows employees to bring their own devices (BYOD). Everyone in Andreas’s firm uses the Internet for email and social media.
Deliverable:
For this assignment, you are to analyze this situation and create a possible scenario of what could have happened. Make sure you mention any weak links in your assessment that could have facilitated a data breach. Lastly, go over three tools you would use for this investigation.
Your report will be 4-5 pages in length. Your report must adhere to Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.

Use the `Microsoft Threat Modeling’ slides as a reference its uploaded down P.s:

Use the `Microsoft Threat Modeling’ slides as a reference its uploaded down
P.s:

Use the `Microsoft Threat Modeling’ slides as a reference its uploaded down
P.s:
In case the MTM tool installation does not properly work on your end, you can proceed with this alternative online tool:

this packet tracer is called SRWE Final Skills Exam (PTSA) i uploaded a picture

this packet tracer is called
SRWE Final Skills Exam (PTSA)
i uploaded a picture

this packet tracer is called
SRWE Final Skills Exam (PTSA)
i uploaded a picture below
PLEASE DO NOT ACCEPT IF YOU DONT HAVE PACKET TRACER DOWNLOADED OR NOW WHAT IT IS THIS PACKET TRACER TAKE 1HOUR AND 30MINS IM GIVING 3 HOURS TO COMPLETE YOU HAVE MUILTPLE ATTMEPTS TO DO THIS IF YOU GET A BAD SCORE I NEED THIS DONT MY TODAY