You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.
You are going to wrap up your work from the previous parts in Weeks 2, 4, and 6. These pieces will be combined with the one task below to make an overall complete Case Study/Lab Report.
Provide recommendations on mitigations that need to be put in place based on the Week 4 and Week 6 assignments.
Create a final completed Lab Report covering the following:
Introduction of the vulnerability site (business), what threats are against business and the effect is a web application is compromised (Week 2)
Vulnerability assessment (Week 4)
Penetration test (Week 6)
Recommendations for mitigations (Week 8)
Here is a link to OWASP top 10 and each will explain how to prevent each vulnerability and should be included in the recommendation section: OWASP Top Ten | OWASP Foundation
The final Lab Report document should be approximately 12-15 pages in length.
Submission Instructions: Be sure your paper covers ALL of the above requirements, and the following formatting requirements:
8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.
In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.
Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!
Category: Computer science
-
“Vulnerability, Threat, and Security Assessment of a Web Application: Recommendations for Mitigations”
-
“Exploring Object Detection Techniques: A Comparative Analysis of Approaches and Results”
Hello, I have a report. I have written the code and I have my outputs, I just need the report as required. You need to read several papers from Google Scholar on object detection to write the work-related sections. All codes that have been built for the report
so you need just to see results and some theory for some papers using different approaches for object detection images and classification
https://www.vision.caltech.edu/Image_Datasets/Calt… -
Title: Building a Data Enterprise: Prioritizing Projects as the Chief Data Officer As the Chief Data Officer of a fictional firm, I am responsible for overseeing the management and utilization of all data within the organization. Our data enterprise contains both structured
Your post must be at least 200 words. Please include: For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
You have a data enterprise that contains structured and unstructured data
As the CDO, you built your company’s first data warehouse or a data lake
How will your data enterprise support the business?
List the projects that you chose to undertake
Prioritize them
Write a short bullet describing why this project is on your list -
Title: Exploring the Effects of Social Media on Mental Health: A Comprehensive Analysis Introduction: Social media has become an integral part of our daily lives, with millions of people around the world using platforms such as Facebook, Instagram, Twitter, and
Modify and extend “mypaper” to a 8 pages paper with the template paper and the contents. You will add an introduction similar to the template paper. For the abstract, make the format like “given inputs…….we,,,,,, . The problem is…… In related work….. In contrast…. To addresss these questions….. Experiment results….” like the template paper. Add things to later parts.
-
The Importance of Cryptography and Threat Modeling in Cybersecurity The Importance of Cryptography and Threat Modeling in Cybersecurity Cryptography is a crucial aspect of cybersecurity as it plays a significant role in protecting sensitive data from potential threats. It involves the use
nstructions
One of the fundamental tasks of a cybersecurity professional is protecting the organization’s data. There are many things to think about when trying to protect data and plan for potential threats.
In your journal, write about how cryptography is important to cybersecurity. Describe the differences between data in motion and data at rest. Be certain to explain how threat modeling can be used to help protect the organization.
Your entry should be at least two paragraphs long.
Overview
Journals are private and between you and the instructor only. Approach these activities as an opportunity to reflect upon and apply what you learn each week based on the assigned readings, discussions, and activities. As a successful professional, you will need good reflective and writing skills. Journal activities offer you the opportunity to develop these skills further. The journal entries in this course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the journal prompt and write a reflection. Your journal entry should be two paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and appropriate for the intended audience and use a consistent voice that is evident throughout. -
Title: Exploring Information Retrieval Techniques: Text-Based, Sentence-Based, and Semantic-Based Approaches
Information Retrival Techniques (Text-based, Sentence-based and Semantic-based)
paragraph 1:
– define what the information retrieval (IR) method is.
– Why need to use it? The importance of the method
How the process of IR method
The advantages of using IR method
paragraph 2:
Describe what is text-based IR technique
What is the purpose of it?
Describe how to use the technique and what is for
The advantages and disadvantages of text-based technique
paragraph 3:
Describe the sentence-based IR technique
What is the purpose of it?
Describe how to use the technique and what is for
The advantages and disadvantages of sentence-based technique
paragraph 2:
Describe what a semantic web-based IR technique is.
What is the purpose of it?
Describe how to use the technique and what is for
The advantages and disadvantages of semantic web-based technique -
High-Level Network Design for a New Mortgage Finance Company
Scenario
You are to create a high-level network design for a new mortgage finance company. Your design must facilitate a basic understanding of the network and its operation. A public MAN is used to connect the main office to the local branch office. A WAN is used to connect the main office to the remote branch office. The network is connected to the internet.
You must produce a single PDF document that contains the following sections:
Introduction
Requirements
Diagrams
Descriiptions
Message Flow
Troubleshooting
Use Microsoft Word or PowerPoint (or their equivalents) to create the document. When you are ready to submit it, save it as a PDF file and upload the PDF.
The content requirements for these sections are outlined below:
Introduction
This section should include:
Your name
A statement that this project is your own work
First paragraph from the above Scenario section
Requirements
The network includes the following locations:
1 main office in a metropolitan area
1 local branch office in the same metropolitan area
1 remote office too far away to connect to the metropolitan area’s MAN
Each office contains an identical LAN:
1 manager workstation
5 customer service representative (CSR) workstations
2 shared printers
Ethernet protocol
Each office includes wireless communication:
2 wireless access points
The company uses the following software:
Microsoft Windows operating systems
Microsoft Office
Mortgage finance applications
Google Chrome browser
The network contains the following servers (located at the main office):
1 application server
1 web server
The network includes the following security components:
1 edge firewall (to protect the company from the internet)
An intrusion prevention system (IPS)
Norton anti-virus software
Assumptions
Your design will be at a higher-level than specific floor plans.
Someone else will map your design to specific floor plans.
You must decide the bandwidth and cabling types for the various network connections.
You must decide where routers and switches are used.
Diagrams
This section contains the following physical network diagrams:
1 high-level diagram showing the inter-building connections via the MAN and WAN
1 diagram showing the common LAN
1 diagram showing the distinctive office features
All hardware components mentioned in the requirements must be shown.
Do not show software components.
Your drawings can be created using any of the following methods:
LibreOffice Draw Application
Microsoft PowerPoint
Microsoft Visio
Another diagramming tool of your choice
Neatly hand-drawn, clearly visible, scanned images
Descriiptions
Describe the components mentioned in the Requirements section.
Include both hardware and software components.
Order your components in alphabetical order.
Each descriiption must clearly communicate:
The purpose of the component
The main functions of the component
Any special inter-relationships this component has with other components
Message Flow
Select a communications path between any two network endpoints.
Select a type of message that is part of that path’s traffic.
Describe its general message flow across the layers of the TCP/IP protocol stack.
This should include the layers on both the sending and receiving sides.
Describe the function of each TCP/IP layer as it relates to your chosen message.
Include a diagram that relates the TCP/IP layers to their corresponding layer(s) in the OSI model.
Troubleshooting
Identify 2 network troubleshooting scenarios. For each, discuss the strategies and tools you could use to research and resolve them. You must take a screenshot of at least one of the tools discussed in this section.
Include the screenshot in this section.
Explain the diagnostic data available in the captured screenshot.
Notes: You are encouraged to use the LibreOffice Draw Application as this software every student has access to and has used in previous labs. Other tools listed above are not supported but you are free to use if you are more comfortable with using. -
Improving Journal Writing Through Reflection and Personal Examples Title: Reflecting on Data Privacy and Protection: Strategies for Compliance and Ethical Considerations “Voice and Writing Style Assessment”
Please take note of this feedback and use it to improve the journal.
Feedback:
The assignment provides a solid overview of important legislation
and the increasing threats in cybersecurity, with a clear emphasis on
compliance and ethics.
To elevate the work to an exemplary level, consider incorporating
more detailed reflections on personal experiences or specific real-world
examples that illustrate the application of these principles.
Strengthen the personal voice and engagement in writing to make the content more compelling.
Review the organization and transitions to ensure a smoother flow of ideas.
Ensuring data privacy is an essential skill for cybersecurity professionals.
In your journal, you will reflect on data privacy and data
protection. Specifically, you will discuss access controls, data
privacy, and legislation for compliance.
Your journal entry should be three or more sentences per prompt and address the following questions:
How are access controls related to confidentiality?
What is the impact of having access controls in place when using
third-party solutions like cloud computing or software as a service
(SaaS)?
What are strategies for ensuring data privacy when bringing organizations into compliance?
How does data privacy differ between various industries?
Submit your assignment here. For details, see the assignment guidelines and rubric.
Overview
Journals are private and between you and the instructor only.
Approach these activities as an opportunity to reflect upon and apply
what you learn each week based on the assigned readings, discussions,
and activities. As a successful professional, you will need good
reflective and writing skills. Journal activities offer you the
opportunity to develop these skills further. The journal entries in this
course are graded separately.
Prompt
First, complete the assigned readings for the week. Then read the
journal prompt and write a reflection. Your journal entry should be two
paragraphs long and address the prompt provided in each module.
In your response, be certain to address the following critical elements:
Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
Voice: Write in a style that is appealing and
appropriate for the intended audience and use a consistent voice that is
evident throughout.
What to Submit
Submit journal assignments as Word documents with double spacing,
12-point Times New Roman font, and one-inch margins. Responses should be
at least two paragraphs long and address the points indicated in the
journal prompt for each module.
Journal Rubric
Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Critical Thinking and Reflection Supports claims with relevant examples of previous and logical thought processes Supports claims with mostly relevant examples of previous and logical thought processes Supports claims with somewhat relevant examples of previous and logical thought processes Does not support claims with reflection on relevant personal examples 25
Integration and Application Shows excellent depth of knowledge of the module content and exhibits careful consideration of the topic Shows good depth of knowledge of the module content and demonstrates that the module content has been read Shows limited depth of knowledge, indicating the module content may have been reviewed but needs to be explored further Does not address the prompt and reflects that the module content has not been read 25
Voice Writes in a style that is appealing and
appropriate for the intended audience and uses a consistent voice that
is evident throughout Writes in a style that is generally appropriate for the intended audience and makes an attempt to use a consistent voice Writes in a style that considers the audience but is not consistent in voice, and it is difficult to identify the voice Does not attempt to use a style that considers the audience and leaves no evidence of the voice 25
Writing Is free of errors in organization and grammar Is mostly free of errors in organization and grammar; errors are marginal and rarely interrupt the flow Contains errors in organization and grammar, but errors are limited enough so that it can be understood Contains errors in organization and grammar, making it difficult to understand 25
Total: 100% -
Presentation on NIST SP800-53 Control Families and Malicious Code
A) Your presentation should include the following:
Title Slide
Agenda Slide
Introduction Slide: This should motivate to want to see your remaining slides.
Content slides (This could be several Slides)Part 1 NIST SP800-53 Control Families
Part 2 You make the call with the scenario we will discuss in class
Conclusions
References
PART 1 NIST SP 800-53 defines 18 Control families. All controls are important but depending on your environment or situation, some are more important than others. From your experience, what are the three most important control families? Discuss. Here is a link to the special publication: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdfLinks to an external site.
Hint: go to page 35 to find a clickable hyperlinked table.
PART 2 You Make the Call
If you were responsible for this room in your organization, which controls would you implement. After selecting the controls, write an implementation statement on how to implement or use these controls to mitigate a particular risk identified. (Choose 2. Two different families)
EditEdit
2) Discussion Forum 7: Malicious Code
1) In Discussion Forum 7, post your response to the following discussion topic. Reply to at leasttwo classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply. Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability. It is a threat to any Internet-connected device. What are the types of Malware being used today (Name two), and explain in your own words what they do. 2) Respond to at least two other students (at least 50 words each )!
Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice. -
“The Importance of System Software in the World of IT: An Executive Report and Infographic”
Hi, I’m studying IT and I have an assignment for my System Software subject. The assignment considers to have 4 things to submit: Executive Report, Infographic, Video recording and Presentations slides using for recoding. I just need you to do the report and infographic for me. The rubric and instructions are already in the file that I have attached. Please read through and have clear understanding of what it is before accept my order. Thank you!