Submission
You should submit precisely 3 files individually (do NOT zip them):
1. Two page report (only references may appear on a third page) in pdf format using either the latexDownload latex or word Download word template provided.
2. Code (a version that will run – either an .ipynb notebook (preferred) or a .py script; do NOT submit any data).
3. Class predictions for the test data. This must be in exactly the same format as the provided example file sample_valid_predictions.csv and must be named predictions.csv.
Category: Computer science
-
“Submission for Assignment Prompt”
-
“Setting Up a Home Network: Diagramming and Configuring Devices for Optimal Connectivity and File-Sharing”
Instructions
Scenario:
Your sister just moved into a new home and needs you to
help her get all of her computer devices connected to the network and the
Internet.
Your sister and her family have the following devices:
2 laptops: one for work,
one for gaming and video streaming
2 mobile devices: one
Apple-iPad, one Samsung Android tablet
2 mobile phones: one
iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be
used as projectors
Instructions:
For this assignment, you must diagram a network depicting
the physical device configuration of your sister’s home network using cloud
services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network
diagram.)
You must then create a second diagram of the floor layout
with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the
router and each device should be configured so they have access to the Internet
and file-sharing capability.
Length: 3-5 page pager with an embedded original network
diagram
The completed assignment should address all of the
assignment requirements, exhibit evidence of concept knowledge, and demonstrate
thoughtful consideration of the content presented in the course. The writing
should integrate scholarly resources, reflect academic expectations and current
APA standards, and adhere to Northcentral University’s Academic Integrity
Policy. -
“Navigating the Ethical and Legal Implications of Big Data Analytics in Healthcare” Introduction: The use of big data analytics has revolutionized the healthcare industry, providing valuable insights and improving patient care. However, the collection and analysis of large amounts
Description
U4DB
Primary Response is due by Thursday (11:59:59pm Central), Peer Responses are due by Saturday (11:59:59pm Central).
Primary Task Response: Within the Discussion Board area, write 400-500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Although the use of big data offers many advantages in the health care field, it also poses many concerns with regard to privacy and compliance with the Health Insurance Portability and Accountability Act (HIPAA).
Discuss concerns about big data analytics with regard to privacy and HIPAA compliance based on this week’s readings and other scholarly articles. Recommend best practices in using big data within the health care field. -
“Step-by-Step Guide: Running an Application on Android Studio”
I have a project ready, but I want you to make a video on how to run the application using (Android Studio). And send me a video
-
“Design and Implementation of a Web-Based Attendance Management System Using Microcontrollers and Biometric Technology”
A web based attendance management system using microconllers.
Component are R503 capactive fingerprint, arduino nano, ESP8266 Wifi module.
APA citation, Reference must support diagram, I use MangoDB for database -
“Completing an Elective Course: Meeting the Deadline”
It’s a elective course 5 units needs to be accomplished by today willing to pay extra if everything is accomplished
-
Exploiting Windows and Linux Systems: Meterpreter Scripts, Privilege Escalation, and Post Modules
Answer All questions by typing commands in the answer sheet, then provide print screens to show the implementation.
1) Exploit windows XP by using:
A) a scraper Meterpreter script, then provide registry information, password hashes, and network information that you have gained from this exploitation.
B) checkvm, getcountermeasure, getgui, hostsedit, Killav, and winenum Meterpreter scripts. Show the exploitation detail for each script attack.
2) Exploit Ubuntu, then use the following Linux Post Modules to get useful information. Explain information you have gained from each Module:
i) Checkvm
ii) enum_configs
iii) enum_network
iv) enum_protections
v) enum_system
3) How the Meterpreter session can get the system privileges? Provide example
4) Provide example for Udev Privilege Escalation on Linux
5) What is a Pass the Hash technique? Provide an example for Linux and example for Windows.
6) Provide example for Exploiting Open phpMyAdmin
7) What is the Attacking XAMPP? Provide example for supporting your answer -
Title: Demonstrating Academic Excellence and Leadership for the Benedict College Scholarship
Benedict College seeks to match strong academic students with Founders and Trustee Scholarships. Our past recipients demonstrated academic excellence by taking the most challenging curriculum offered by their high school and applying classroom knowledge to project-based learning. A project example can be participating in science fairs sponsored by your school, local community, regional or national events. Moreover, students have used project-based learning from their involvement in their civic engagement through Community Based Organizations.
In 100 – 150 words, tell us about your commitment to academic success and examples of how you have demonstrated academic excellence.
Benedict College’s transformative learning environment is fostered in real-world experiences, and solving real problems affects the communities our students derive from across the U.S.A. and abroad. What are your real-world experiences, and what issues in your community would you like to resolve?
In 100 – 150 words, tell us about one problem in your community and how you would like to resolve it.
Benedict College’s students demonstrate personal leadership traits by standing affirmed in who they are; while exploring structured leadership paths and pioneering uncharted leadership paths through their groups. Please explain your leadership experiences (formal or informal) in support of your pursuit of a top scholarship at Benedict College.
In 100 – 150 words, tell us about your formal or informal leadership experiences and your plans to extend those experiences at Benedict College. -
Title: Legal and Ethical Considerations in Network Forensic Investigations: A Case Study Analysis
Prompt
For this assignment, students will write a 2,500-3,000 word research paper that covers legal and ethical components of network forensic investigations. Consider the following scenario.
Through your investigations, you discovered illegal activity on your network, stemming from a couple of computers that had been taken over by cyber criminals. Ports were left open and exploited in order to steal company assets and attempt to sell them online. Your task is to address the legal requirements you have in order to ensure that evidence can be admitted in court. Additionally, you must address ethical issues surrounding the search and seizure of equipment and end-user data. Finally, the proper chain of custody must be followed: create a plan that maintains this important component of forensic investigation.
Your paper will consist of the following sections.
Legal Aspects of Network Forensic Analysis – Discuss legal aspects of forensic analysis, tying your analysis to network forensic analysis and the case study. Analyze the legal steps required in the process of gathering evidence, search and seizure, and the interviewing of suspects.
Ethical Components – Analyze the ethical components of network forensic analysis: what challenges could you face when trying to gather evidence of a crime? When does the prosecution of a crime override privacy or protection of personal data? How can these hurdles be overcome? Provide suggestions using relevant research.
Chain of Custody – Explain the importance of a chain of custody for digital forensic evidence in network forensics. Be sure to explain the process of documenting, collecting and storing evidence from a crime scene (e.g., a laptop computer). Describe the consequences of not following a proper chain of custody, connecting to the case study.
Related Lessons
You may draw upon the lesson Legal Aspects of Digital Criminal Evidence, however much of your evidence should be from peer-reviewed sources.
Formatting & Sources
Please write your paper in the APA format. You may refer to the course material for supporting evidence, but you must also use five to seven outside sources and cite them using APA format. Please include a mix of both primary and secondary sources, with at least one source from a scholarly peer-reviewed journal. If you use any Study.com lessons as sources, please also cite them in APA (including the lesson title and instructor’s name).
Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
Secondary sources come from peer-reviewed scholarly journals, such as Journal of Forensic Sciences, Journal of Digital Forensics, Security, and Law and International Journal of Cybersecurity and Forensics. You may use sources like JSTOR, Google Scholar, to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.) -
Forensic Analysis Report: The Curious Mr. X at the Arctic Nuclear Fusion Research Facility (ANFRF)
Review the case study: The curious Mr. X at the end of Chapter 5. Write a forensic report to be delivered to the Arctic Nuclear Fusion Research Facility (ANFRF) that clearly outlines the findings. You need to answer the following question within your report. Your report needs to be formatted as a report and not simply a “question and answer” document. You can find a template here.
What systems have been compromised?
What did the attacker find out about the network architecture?
Was any there any data exfiltration, if so where did the data come from?
What was the duration of the attack?
What are the next steps to ensure that the organizations data is no longer at threat of being stolen?
Below is an example of a PCAP Network Packet Capture Analysis Forensic Report conducted by Sriram Raghavan on 5/22/2008.
http://securecyberspace.org/yahoo_site_admin/assets/docs/phishing-case.334153800.pdf
Review the case study: HackMe, Inc. at the end of Chapter 6 and answer the following questions.
What are the BSSID and SSID of the WAP of interest?
Is the WAP of interest using encryption? Can you identify what encryption is being used?
What stations are interacting with the WAP and/or other stations on the WLAN?
Are there patterns of activity that seem anomalous? If so, what are they?
How are they anomalous: Consistent with a malfunction? Consistent with malicious activity?
Can you identify any potential bad actors? If so, who are they?
Can you determine if a bad actor successfully executed an attack? If so, how?