Category: Technology

  • In Chapter 2 of Law, Policy & Technology: Cyberterrorism, Information Warfare, a

    In Chapter 2 of Law, Policy & Technology: Cyberterrorism, Information Warfare, a

    In Chapter 2 of Law, Policy & Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, Eduardo Gelbstein discusses the resulting economic costs consequential to information security incidents, and in Chapter 8, Pauline Reich discusses the lack of harmonious definitions on a global basis and its impact on cyber laws. Read the Draft United Nations Convention Against Cybercrime and the definitions found in the Computer and Fraud Abuse Act (“CFAA”), 18 U.S.C. Section 1030. Then, keeping mind Ms. Reich’s comments about the lack of harmonious definitions.
    Q1. Could legitimate activities like penetration testing be considered “access without authorization” under either legal framework? Why or why not?
    Q2. Write a brief essay, using a Word document in APA format, not to exceed 3 paragraphs, on an article from a contemporary academic or media source which demonstrates one or more concept(s) and/or topic(s) discussed in the assigned reading for this week. If the article cannot be accessed from a url (i.e. an article from a professional association where you are a member), please upload a pdf of the article. Be sure to write a few sentences identifying the basis for selecting this article and how the events described in the article specifically correlate to a concept/topic/idea from the current week’s course materials.
    NOTE: Please provide one source for question and answer them separately in same page.

  • You are required to write a 5 to 10-page, double-spaced (excluding Cover page, T

    You are required to write a 5 to 10-page, double-spaced (excluding Cover page, T

    You are required to write a 5 to 10-page, double-spaced (excluding Cover page, Table of Contents (TOC), Reference page, and Index) paper on a technical topic of your choice using Microsoft Word. You are to use the built-in features of MS Word for the Cover page, TOC, Reference page, and Index. For the body of the paper all Headings must use the Styles feature of MS Word. It is reasonable to ask that there be one reference per page. This will amount to a total of five in-text citations. However, I will accept no less than 3 in-text citations. Use Times New Roman, 12 Point font, 1-inch margins all around. Also, please do not include images unless you are proficient using that feature of MS Word.
    All these assignments are cumulative, which means they build on each other as follows:
    TOPIC : This first submission should be your Topic written as an Introduction in your Microsoft Word document. The Introduction should discuss what your topic is and why you chose it. Your submission should have a Cover page, TOC, with one entry (Introduction) and one page with a Heading 1 titled “Introduction”.
    OUTLINE : This would be your updated Table of Contents with multiple entries as Headings (level 1, 2, and 3 if necessary). Each Heading 1 should have a paragraph explaining what you will be discussing. Your Outline should have at least 5 Heading 1s.
    FIRST or Rough DRAFT : Your document is coming together and should be very close to completion. The TOC is almost complete. Each Heading has prose written under it, and you should have in-text citations, figures, tables (if appropriate), and a Reference page.
    INDEX : This is added to your First Draft using the Index feature of MS Word and will appear in the TOC.
    FINAL PAPER : This is the completed MS Word document with a Cover Page, Introduction, TOC, List of Tables and Figures (if any), Body, Reference page, and Index. VERY IMPORTANT: Don’t forget to include a Heading 1 that discusses the Scope and Principal features of Technical Writing in general, not specific to your paper. You have two shots at submitting your Final draft. I expect your First Final Draft will have the updates from my rough draft feedback. I suggest you take advantage of this opportunity for additional feedback.
    Remember, any Information Technology related topic is fine!
    What do you find interesting in the information technology industry?
    Take a look at the Gartner link and other interesting links provided in the COURSE MATERIALS area in the LESSONS section for some ideas.
    Review IT-based literature. These websites will give you some thoughts on Technology.
    Go to PCMagazine.com (http://www.pcmag.com/),
    PCWorld.com (http://www.pcworld.com/),
    ITWorld.com (http://www.itworld.com/).
    Also, what are you experiencing in your day-to-day operation in technology?

  • 1.What is relationship cardinality? Describe different types of relationship in

    1.What is relationship cardinality? Describe different types of relationship in

    1.What is relationship cardinality? Describe different types of relationship in terms of cardinality. Illustrate each type using ER Assistant.
    2.What is a strong or weak relationship, and what is a strong or weak entity? Illustrate with appropriate ERD using ER Assistant.

  • IP addresses to attack 10.6.1.50 on Kali OpenVas VM 10.6.1.100 on Metasploitabl

    IP addresses to attack
    10.6.1.50 on Kali OpenVas VM
    10.6.1.100 on Metasploitabl

    IP addresses to attack
    10.6.1.50 on Kali OpenVas VM
    10.6.1.100 on Metasploitable VM
    Introduction
    In this section, create an overview and discuss the scope of your network scan. Note the operating system of your attack machine and describe the tools that you will use (Zenmap, OpenVAS). Remember that this report will be reviewed by nontechnical people who may not know about Zenmap or OpenVAS.
    Target
    In this section, list the IP address and hostname of the target system as well as the IP address assigned to your attack machine. Focus on the open ports and describe the corresponding services associated with the open ports. Maintain the tone you set in the introduction, keeping in mind that the report will be reviewed by some who will not know about FTP or SSH or what functions those services provide on a network. Place the information about the ports and corresponding services into a table and label it appropriately.
    Zenmap Scan
    In this section, use Zenmap to scan the victim machine as well as a screenshot of the connection to the victim system. Show a labeled screenshot of the Zenmap scan. Explain the results and how the vulnerabilities might impact the client.
    OpenVAS Scan
    In this section, use OpenVAS to scan the victim machine as well as a screenshot of the connection to the victim system. Show a labeled screenshot of the OpenVAS scan. Explain the results and how the vulnerabilities might impact the client.
    Open Socket
    Now that you have scanned the system with Zenmap and OpenVAS, go back to either of the reports and look for a port that provided little information about the banner or provided you with an unknown. By manually connecting to the IP and port (socket), you can sometimes discover a vulnerability not listed by the tool. This shows you the importance of not just relying on a tool. Show a labeled screenshot of a connection to a socket providing results using a browser or netcat, etc. If you find something concerning, explain that to the client.
    Recommendations
    In this section, you will suggest that the client amend the contract to add a full penetration test. Explain that you are confident that you will be able to exploit the system and take proprietary data from the network.
    References
    In this section, validate your recommendations using industry standard techniques by including at least two to three references in IEEE format.
    Delete the instructional text from the template before you submit

  • Hardware Design: Definition of the UGS high-level requirements to accomplish the

    Hardware Design:
    Definition of the UGS high-level requirements to accomplish the

    Hardware Design:
    Definition of the UGS high-level requirements to accomplish the mission
    Descriiption of the UGS hardware components and their functions
    Overview of the hardware design process, including component selection and integration
    Discussion of any specific design challenges and solutions
    Please reference the attached paper. I identified the problem my proposed new Uncrewed Ground Systems (UGS) design will solve.
    Now, you will describe the mission, requirements (configurations, systems, components), and their rationales for operating this new system. Start by outlining the specific mission and problem this new system will solve in two to three single mission statements.
    Next, choose several high-level requirements that will govern the design of your new UGS design. These may include performance requirements such as speed, endurance, and payload capacity, as well as functional requirements such as sensor capabilities, communication systems, and control interfaces. Remember to consider the environment in which the system will operate and the stakeholders who will be impacted by its success or failure when developing requirements.
    Throughout the report, it is important to clearly state the rationale behind design decisions and the expected benefits and limitations of the proposed design. Describe how trade-offs between different configurations could accomplish the mission (e.g., wheels vs. tracks). Be sure to consider Human-Robot Interactions (HRI) in your requirements. This may be more important in accomplishing some missions (e.g., helper robots). It may be helpful to use a decision matrix or other decision-making tool to compare the relative benefits and drawbacks of different design options.
    Your paper should be two to three pages in length. Use your original words or cite your sources using current APA formatting.
    Your paper will automatically be evaluated through Turnitin.

  • -In this assignment, you will analyze the IT building blocks of IBM. You will di

    -In this assignment, you will analyze the IT building blocks of IBM. You will di

    -In this assignment, you will analyze the IT building blocks of IBM. You will distinguish among the hardware and software, telecommunications and networking, and data resources used to support the business. In addition to your required sources for the assignment, research a minimum of one additional credible source on IBM’s IT infrastructure. It may be difficult to find specific information on an organization’s IT infrastructure. However, you can make assumptions based on your own observations, your understanding of the Week Two course concepts, and your research. Include the following elements in your paper supporting your statements with evidence from your sources.
    -Create an assessment of the IT building blocks for IBM.
    -Develop a high-level diagram of the major building blocks used by the organization.
    -Provide an analysis of how the major building blocks are being used.
    -Explain how each building block is essential to the business.
    -Evaluate the issues inherent to IBM’s current IT operations, and provide a possible alternative.

  • ISSC221 Final Project At the end of the course (week 8) you will submit a final

    ISSC221 Final Project
    At the end of the course (week 8) you will submit a final

    ISSC221 Final Project
    At the end of the course (week 8) you will submit a final project report in appropriate APA formatting.
    Exercises Included in Your Final Project (You will cover these in the order presented below).
    Chapter 1
    Lab 1 Motherboard Components: Using a picture of a modern desktop mother board of your choice identify or label as many components as possible.
    Lab 2 Memory Modules: Find and label pictures of as many classes of modules as you can (minimum of 4). Note significant facts about each.
    Chapter 2
    Lab 2: Optical Disc Capacities
    Prepare a list to include as many varieties as possible of recordable or rewritable CDs, DVDs, and BDs, both single-layer and double-layer. What is the maximum capacity of each disc and compare to its stated capacity?
    Lab 4: Drive Installation and Preparation
    Prepare a drive for use, including partitioning and formatting. Either partition the entire drive as one volume and then perform the primary/extended partitioning
    Confirm the partition(s) are available in My Computer (or similar) and that you can write information to each one. (Provide a screen shot showing the partitions in each case).
    Chapter 3
    Lab 1 Computer Interfaces: Using a picture of I/O interfaces in a computer of your choice identify or label as many components as possible.
    Lab 2 Video Interfaces: Using pictures of video interfaces in identify or label as many different types as possible.
    Chapter 5
    Lab 2 Workstation Specifics: List two features that should be enhanced for each of the following: graphic and CAD/CAM workstations, audio/video editing workstations, virtualization workstations, gaming PCs, home theater PCs, and home server PCs.
    Chapter 6
    Lab 1 Network Topologies: List advantages and disadvantages of the four primary network typologies (bus, star, ring and mesh).
    Lab 2: OSI Model: List the OSI model layers in order from the bottom up. Describe what each one is used for.
    Chapter 7
    Lab 1 IP Addressing: Connect to the Internet. After your connection is complete, fill out the table below using WINIPCFG or IPCONFIG (depending upon the operating system you have installed).
    IP address (What class is it?).
    Subnet mask (Is it the default subnet mask?)
    Default gateway_____.
    DNS server_________.
    DHCP server_________.
    Do you have an IPv6 address? If so, what is it? _______________
    Chapter 8
    Lab 2 Wireless Networking: Locate the wireless access points and wireless routers on your network. Do they allow sufficient coverage for everyone who needs access? Do they use the same SSID or different SSIDs? Do they broadcast their SSIDs? Is a password required to get on the wireless network?
    Chapter 9
    Lab 4 Laptop Video: Determine if your laptop uses shared video memory. If so, how much is being reserved for the video card? Where do you configure it?
    Lab 5 Laptop Hardware: Identify the following internal laptop components, and determine what you can upgrade them to (if anything).
    • Hard drive
    • Memory
    • Processor
    • Expansion slots
    • Wireless network card
    • Video card
    • CMOS battery
    Chapter 12
    Lab 1 Beep Code: Identify the BIOS version of your motherboard. Look up the beep codes this motherboard uses on the manufacturer’s website.
    Remember, you must submit this final project in proper APA formatting, to include Cover Page, Reference Page(s), properly labeled figures and tables, in-text citations, double spacing throughout the paper, etc. If you want to include a Table of Contents and Abstract, you may but they also need to be in proper APA formatting.
    End of Final Project Assignment for ISSC2

  • Describe the network topologies, the devices, cabling, and connectors used in ne

    Describe the network topologies, the devices, cabling, and connectors used in ne

    Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network troubleshooting.