Category: Computer science

  • “Completing an Elective Course: Meeting the Deadline”

    It’s a elective course 5 units needs to be accomplished by today willing to pay extra if everything is accomplished

  • Exploiting Windows and Linux Systems: Meterpreter Scripts, Privilege Escalation, and Post Modules

    Answer All questions by typing commands in the answer sheet, then provide print screens to show the implementation.
    1) Exploit windows XP by using:
    A) a scraper Meterpreter script, then provide registry information, password hashes, and network information that you have gained from this exploitation.
    B) checkvm, getcountermeasure, getgui, hostsedit, Killav, and winenum Meterpreter scripts. Show the exploitation detail for each script attack.
    2) Exploit Ubuntu, then use the following Linux Post Modules to get useful information. Explain information you have gained from each Module:
    i) Checkvm
    ii) enum_configs
    iii) enum_network
    iv) enum_protections
    v) enum_system
    3) How the Meterpreter session can get the system privileges? Provide example
    4) Provide example for Udev Privilege Escalation on Linux
    5) What is a Pass the Hash technique? Provide an example for Linux and example for Windows.
    6) Provide example for Exploiting Open phpMyAdmin
    7) What is the Attacking XAMPP? Provide example for supporting your answer

  • Title: Demonstrating Academic Excellence and Leadership for the Benedict College Scholarship

    Benedict College seeks to match strong academic students with Founders and Trustee Scholarships. Our past recipients demonstrated academic excellence by taking the most challenging curriculum offered by their high school and applying classroom knowledge to project-based learning. A project example can be participating in science fairs sponsored by your school, local community, regional or national events. Moreover, students have used project-based learning from their involvement in their civic engagement through Community Based Organizations.
    In 100 – 150 words, tell us about your commitment to academic success and examples of how you have demonstrated academic excellence.   
    Benedict College’s transformative learning environment is fostered in real-world experiences, and solving real problems affects the communities our students derive from across the U.S.A. and abroad. What are your real-world experiences, and what issues in your community would you like to resolve?   
    In 100 – 150 words, tell us about one problem in your community and how you would like to resolve it.  
    Benedict College’s students demonstrate personal leadership traits by standing affirmed in who they are; while exploring structured leadership paths and pioneering uncharted leadership paths through their groups. Please explain your leadership experiences (formal or informal) in support of your pursuit of a top scholarship at Benedict College.  
    In 100 – 150 words, tell us about your formal or informal leadership experiences and your plans to extend those experiences at Benedict College.   

  • Title: Legal and Ethical Considerations in Network Forensic Investigations: A Case Study Analysis

    Prompt
    For this assignment, students will write a 2,500-3,000 word research paper that covers legal and ethical components of network forensic investigations. Consider the following scenario.
    Through your investigations, you discovered illegal activity on your network, stemming from a couple of computers that had been taken over by cyber criminals. Ports were left open and exploited in order to steal company assets and attempt to sell them online. Your task is to address the legal requirements you have in order to ensure that evidence can be admitted in court. Additionally, you must address ethical issues surrounding the search and seizure of equipment and end-user data. Finally, the proper chain of custody must be followed: create a plan that maintains this important component of forensic investigation.
    Your paper will consist of the following sections.
    Legal Aspects of Network Forensic Analysis – Discuss legal aspects of forensic analysis, tying your analysis to network forensic analysis and the case study. Analyze the legal steps required in the process of gathering evidence, search and seizure, and the interviewing of suspects.
    Ethical Components – Analyze the ethical components of network forensic analysis: what challenges could you face when trying to gather evidence of a crime? When does the prosecution of a crime override privacy or protection of personal data? How can these hurdles be overcome? Provide suggestions using relevant research.
    Chain of Custody – Explain the importance of a chain of custody for digital forensic evidence in network forensics. Be sure to explain the process of documenting, collecting and storing evidence from a crime scene (e.g., a laptop computer). Describe the consequences of not following a proper chain of custody, connecting to the case study.
    Related Lessons
    You may draw upon the lesson Legal Aspects of Digital Criminal Evidence, however much of your evidence should be from peer-reviewed sources.
    Formatting & Sources
    Please write your paper in the APA format. You may refer to the course material for supporting evidence, but you must also use five to seven outside sources and cite them using APA format. Please include a mix of both primary and secondary sources, with at least one source from a scholarly peer-reviewed journal. If you use any Study.com lessons as sources, please also cite them in APA (including the lesson title and instructor’s name).
    Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
    Secondary sources come from peer-reviewed scholarly journals, such as Journal of Forensic Sciences, Journal of Digital Forensics, Security, and Law and International Journal of Cybersecurity and Forensics. You may use sources like JSTOR, Google Scholar, to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

  • Forensic Analysis Report: The Curious Mr. X at the Arctic Nuclear Fusion Research Facility (ANFRF)

    Review the case study: The curious Mr. X at the end of Chapter 5. Write a forensic report to be delivered to the Arctic Nuclear Fusion Research Facility (ANFRF) that clearly outlines the findings. You need to answer the following question within your report. Your report needs to be formatted as a report and not simply a “question and answer” document. You can find a template here.
    What systems have been compromised?
    What did the attacker find out about the network architecture?
    Was any there any data exfiltration, if so where did the data come from?
    What was the duration of the attack?
    What are the next steps to ensure that the organizations data is no longer at threat of being stolen?
    Below is an example of a PCAP Network Packet Capture Analysis Forensic Report conducted by Sriram Raghavan on 5/22/2008.
    http://securecyberspace.org/yahoo_site_admin/assets/docs/phishing-case.334153800.pdf
    Review the case study: HackMe, Inc. at the end of Chapter 6 and answer the following questions.
    What are the BSSID and SSID of the WAP of interest?
    Is the WAP of interest using encryption? Can you identify what encryption is being used?
    What stations are interacting with the WAP and/or other stations on the WLAN?
    Are there patterns of activity that seem anomalous? If so, what are they?
    How are they anomalous: Consistent with a malfunction? Consistent with malicious activity?
    Can you identify any potential bad actors? If so, who are they?
    Can you determine if a bad actor successfully executed an attack? If so, how?

  • “Vulnerability, Threat, and Security Assessment of a Web Application: Recommendations for Mitigations”

    You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.
    You are going to wrap up your work from the previous parts in Weeks 2, 4, and 6. These pieces will be combined with the one task below to make an overall complete Case Study/Lab Report.
    Provide recommendations on mitigations that need to be put in place based on the Week 4 and Week 6 assignments.
    Create a final completed Lab Report covering the following:
    Introduction of the vulnerability site (business), what threats are against business and the effect is a web application is compromised (Week 2)
    Vulnerability assessment (Week 4)
    Penetration test (Week 6)
    Recommendations for mitigations (Week 8)
    Here is a link to OWASP top 10 and each will explain how to prevent each vulnerability and should be included in the recommendation section: OWASP Top Ten | OWASP Foundation
    The final Lab Report document should be approximately 12-15 pages in length.
    Submission Instructions: Be sure your paper covers ALL of the above requirements, and the following formatting requirements:
    8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.
    In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.
    Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.
    Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!

  • “Exploring Object Detection Techniques: A Comparative Analysis of Approaches and Results”

    Hello, I have a report. I have written the code and I have my outputs, I just need the report as required. You need to read several papers from Google Scholar on object detection to write the work-related sections. All codes that have been built for the report
    so you need just to see results and some theory for some papers using different approaches for object detection images and classification
    https://www.vision.caltech.edu/Image_Datasets/Calt…

  • Title: Building a Data Enterprise: Prioritizing Projects as the Chief Data Officer As the Chief Data Officer of a fictional firm, I am responsible for overseeing the management and utilization of all data within the organization. Our data enterprise contains both structured

    Your post must be at least 200 words. Please include: For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
    You have a data enterprise that contains structured and unstructured data
    As the CDO, you built your company’s first data warehouse or a data lake
    How will your data enterprise support the business?
    List the projects that you chose to undertake
    Prioritize them
    Write a short bullet describing why this project is on your list

  • Title: Exploring the Effects of Social Media on Mental Health: A Comprehensive Analysis Introduction: Social media has become an integral part of our daily lives, with millions of people around the world using platforms such as Facebook, Instagram, Twitter, and

    Modify and extend “mypaper” to a 8 pages paper with the template paper and the contents. You will add an introduction similar to the template paper. For the abstract, make the format like “given inputs…….we,,,,,, . The problem is…… In related work….. In contrast…. To addresss these questions….. Experiment results….” like the template paper. Add things to later parts.

  • The Importance of Cryptography and Threat Modeling in Cybersecurity The Importance of Cryptography and Threat Modeling in Cybersecurity Cryptography is a crucial aspect of cybersecurity as it plays a significant role in protecting sensitive data from potential threats. It involves the use

    nstructions
    One of the fundamental tasks of a cybersecurity professional is protecting the organization’s data. There are many things to think about when trying to protect data and plan for potential threats.
    In your journal, write about how cryptography is important to cybersecurity. Describe the differences between data in motion and data at rest. Be certain to explain how threat modeling can be used to help protect the organization.
    Your entry should be at least two paragraphs long.
    Overview
    Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.
    Prompt
    First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.
    In your response, be certain to address the following critical elements:
    Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
    Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
    Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout.