QUESTION : 1 Your discussion question response should be at least 200 Words, with another 50 words per reply. An incident is an event that results in an actual or threatened violation of security policy. When an incident occurs, an organization needs to respond. The incident-handling process consists of the following steps: Preparation, Identification, Notification, Response, Recovery and follow-up, and Documentation. If you were tasked with handling an incident, which step would need the most help with, and where would you get the help to do it right? Explain how you came up with your answer. Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. Discussion_Grading_Rubric_Final.docx Download Discussion_Grading_Rubric_Final.docx
Supplemental Material:
-Security Incident Management. https://digitalguardian.com/blog/what-security-incident-management-cybersecurity-incident-management-processLinks to an external site. -ISO/IEC27035-1:2016 https://www.iso.org/standard/60803.htmlLinks to an external site. -Incident Security Policy Example. https://isoconsultantkuwait.com/2020/02/01/example-of-information-security-incident-management-policy-and-procedures/Links to an external site. -Educational Institution Example. https://www.csusm.edu/iits/services/security/program/incident.htmlLinks to an external site. –
QUESTION : 2 Who owns the Internet? What things make up the Internet anyway? Who manages the Internet? Who makes the Internet rules? Is this a good arrangement?
NOTE : I NEED MY ASSIGNMENT IN APA FORMAT. I NEED MY ASSIGNMENT ON TIME.I NEED 900 TO 1200 WORDS PER QUESTION. PLEASE DO NOT COPY FROM THE INTERNET. I NEED MY ASSIGNMENT WITHOUT AI AND PLAGDRISM SHOULD BE LESS THAN 15 %. PLEASE MAKE SURE ABOUT AI. PLEASE MAKE IT IN YOUR OWN WORDS.I NEED MY ASSIGNMENT IN APA FORMAT. DO NOT USE ANY WEBSITE FOR GRAMMER.
Category: Computer science
-
Title: The Incident-Handling Process and Ownership of the Internet
-
Title: “Exploring the Use of Machine Learning in Predicting Stock Market Trends”
Create a Computer Science research project dissertation with chapters including a contextual, technical and literature review; research design and methods; practical implementation and experimentation; artefact project evaluation, academic reflection, discussion and conclusions, disseminated with a short digital presentation.
The submission should represent both the practical and research elements of your project and it must be clear how your project relates to your programme of study.
Detailed instructions for completing the dissertation and presentation are provided in the “PROM06 Dissertation and Presentation Guidelines” document provided.
Dissertation
The guideline word count for the dissertation is 10000 words. This is not a fixed limit so there isn’t a direct penalty for not hitting the exact number of words, with +/- 10% considered acceptable (i.e. 9000-11000 words). The abstract is included in the word count but reference list, figures, screenshots, diagrams, charts, tables, and appendices. are outside of the word count. A copy of your project proposal and any additional supporting documentation should be provided in appendices and referred to, where relevant, in the main body of the dissertation.
Dissertations are required to be written in a standard format and a template is provided that should be used and modified appropriately to match project. Dissertation should be submitted in PDF format. -
Implementing UML Class Diagrams in Java: Cat and Dog Classes Title: Commented Code Assignment
Overview
Unified Modeling Language (UML) class diagrams are useful tools for mapping out different classes for an object-oriented program (OOP). Classes are the individual files that contain the code you write for your application. The UML class diagram displays each class’s attributes and methods and shows relationships between classes. Attributes are the data items a class file contains, and the methods are portions of code designed to accomplish a specific task. In this activity, you will analyze a UML class diagram and implement either the Cat or the Dog class. This activity aims to give you practice interpreting a UML class diagram and implementing a class based on that diagram. Implementing classes based on a UML diagram is a valuable skill to help you work as a part of a development team. This assignment will also help prepare you to implement the Pet class as part of your Project One submission. For this assignment, you do not need to implement or account for the relationships between Cat or Dog and the Pet class.
Directions
For this assignment, you will select either the Cat or the Dog Java class from the UML diagram. Open the Virtual Lab (Apporto) by clicking the link in the Virtual Lab Access module. Then open your Eclipse IDE and create a new class. View the Eclipse IDE Tutorial video in the Supporting Materials section if you need help creating a class in Eclipse.
Before you begin, review the following UML class diagram. Pay attention to each class’s attributes and behaviors. As a reminder, though the diagram illustrates an inheritance relationship between the classes, the class you choose to implement does not have to inherit from the Pet class for this assignment. You will learn more about implementing inheritance in later modules.
Next, you will implement either the Cat or Dog Java class. Your class must meet all the specifications from the UML class diagram. Include the following items in your Cat or Dog class:
All attributes (variables) with appropriate data types Note that the types are not specified in this UML class diagram. You must consider the most appropriate data type for each attribute.
At least one constructor method that initializes values for all attributes
The constructor method is a special method that is run anytime an object is created from a class. The constructor method shares the name of the class it is found in.
Accessors and mutators for all attributes Each attribute should have a corresponding accessor (“getter”) and mutator (“setter”) method. These methods are indicated in the class diagram.
In-line comments and appropriate white space, according to the style guidelines you have learned so far in the course
Commenting code is crucial for several reasons. Commenting code provides human-readable explanations of the code’s functionality. The comments make it easier for other developers or even the original coder to understand and maintain the code after some time. Clear and concise comments act as documentation. Comments offer insights into the logic, purpose, and usage of different sections of the code. Comments become especially valuable in collaborative projects or when handing over code to other developers. Comments can also help identify potential issues, edge cases, or important considerations that help communicate between developers. Well-documented code accelerates the development process and contributes to overall maintainability, which reduces the likelihood of errors and makes code more adaptable to changes and improvements.
What to Submit
Submit your Cat or Dog class as a Java class file. Use the Downloading Files From Eclipse Tutorial in the Supporting Materials section to help you download the file for your submission. The file that you will submit will end with the .java file extension. This file differs from the .class file. The .java file is human-readable code, and the .class file is what the Java compiler creates, which contains machine-readable code. You must also include your commented code.
Supporting Materials
The following resources support your work on this assignment:
Resource: Downloading Files from Eclipse
This tutorial will guide you through the steps to download files from Eclipse and submit them to your instructor via Brightspace.
Video: Eclipse IDE Tutorial: Configuration and First Steps With Eclipse Hello World Program
This video will help you become familiar with Eclipse IDE and create a class in Eclipse.
Resource: Commented Code
This document provides a code sample with code comments. -
Title: “Future Directions and Adoption Criteria for Three Different Softwares”
i have three reports about three diffrent softwars i need you to write the future dirction and conclusion about them discusses each software future directions. What can organization expect about each software’s future directions.
Make conclusions on the criteria for adoption of each reviewed software. Under what conditions is one software suitable for implementation and not the other software. Discuss these conditions. -
Achieving Basic Security Objectives with Information Security Controls
Nist document is located here:
https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
In this activity, you will demonstrate how different types of
information security controls can be used to achieve the basic security
objectives of confidentiality, integrity, and availability (CIA triad).
Prompt
Complete the steps listed below.
View page 8 of the NIST document linked in the Module One Reading
and Resources section of your course. You should specifically refer to
the table labeled “Table 1: Security and Privacy Controls Families.”
Create a simple table that identifies at least 3 of the controls listed in Table 1 in the document.
In your table, ensure that you:
Identify one control that addresses each tenet of the CIA triad.
Justify your control choice.
Provide citations for sources you used for support. You must research at least one source per tenet.
Use the table below as a model for how your finished table should look. Do not reuse the examples below in your submission.
Control Category Justification Source
In this column, include at least 3 of the controls from Table 1 in the document. In this column, identify which CIA triad category the control falls into (confidentiality, integrity, or availability). In this column, justify your categorization using resources that support your categorization. In this column, identify the resource you used for support. (Use either an APA-style reference or a direct link to the source.)
Example: CA – Assessment, Authorization, and Monitoring Example: Confidentiality Example: If the system is not protected from unauthorized users, the data contained within the system can be exposed. Example: Adams, J., & Almahmoud, H. (2023). The Meaning of Privacy in the Digital Era. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1–15. http://doi.org/10.4018/IJSPPC.318675
Note: In order for you to receive credit for this assignment, your finished table must contain at least 3 of the controls from Table 1.
What to Submit
Submit your table in a Word document with 12-point Times New Roman font and one-inch margins.
Module One Activity Rubric
Criteria Requirement Met (100%) Requirement Not Met (0%) Value
Topics Includes at least 3 of the controls from Table 1 in the document Does not include at least 3 of the controls from Table 1 in the document 25
Categories Identifies which CIA triad category the control falls into for at least 3 of the controls Does not identify which CIA triad category the control falls into for at least 3 of the controls 25
Justification Justifies
categorization using information from the document and any other
resources that support categorization for at least 3 of the controls Does
not justify categorization using information from the document and any
other resources that support categorization for at least 3 of the
controls 25
Source Identifies the resource used for at least 3 of the controls Does not identify the resource used for at least 3 of the controls 25
Total: 100% -
“Building an Online Shopping Cart in Java”
Online Shopping Cart
Step 1: Build the ItemToPurchase class with the following specifications:
Attributes
item_name (string)
item_price (float)
item_quantity (int)
Default constructor
Initializes item’s name = “none”, item’s price = 0, item’s quantity = 0
Method
print_item_cost()
Example of print_item_cost() output:
Bottled Water 10 @ $1 = $10
Step 2: In the main section of your code, prompt the user for two items and create two objects of the ItemToPurchase class.
Example:
Item 1
Enter the item name:
Chocolate Chips
Enter the item price:
3
Enter the item quantity:
1
Item 2
Enter the item name:
Bottled Water
Enter the item price:
1
Enter the item quantity:
10
Step 3: Add the costs of the two items together and output the total cost.
Example:
TOTAL COST
Chocolate Chips 1 @ $3 = $3
Bottled Water 10 @ $1 = $10
Total: $13
Your program submission materials must include your source code and screenshots of the application executing the code and the results.
Please make sure you follow the submmition guid and there is a file in the attachment that shows how the submmiton file should look like. -
“Script for Incident Response: Automating the Process for Efficient Resolution” Title: Script for Incident Response: Automating the Process for Efficient Resolution Script: “Automated Incident Response Script” Link: https://github.com/rapid7/automated
Find a script related to incident response. Describe the script and how it can be used for incident response. Include a link to the script
-
“Database Homework Assignments: Minimal Keys to Transactions”
you pretty much have to do all the homework assignments from chapter “minimal keys” till the end. it’s on a website for school so you don’t really have to write anything. It’s just assignments (questions) you have to answer correctly. I’ll provide the writer with the login to the website where the questions are when a suitable writer is found. sharing my info in this case is not really that big of a deal since there are only questions on the website and the results of those questions. the link to the website is: https://infinity.few.vu.nl/databases/ for now, please make sure the writer finishes all the exercises until chapter “Transactions” since that has to be finished before midnight today. When that is done, i would like for the writer to continue to do the exercises until the end. Shouldn’t be that much. for that, the deadline is next week sunday. For now, the deadline is today before midnight for all the exercises until chapter “transactions”
-
Title: “Maximizing Efficiency and Collaboration with Integrated Enterprise Systems” Slide 7: – Title: “What are Integrated Enterprise Systems?” – Summary: This slide should provide a brief overview of what integrated enterprise systems are, such as software
Course Title: Integrated Enterprise Systems
need some help with presentation (3 slides ) already have the slides and information ,need help with summarize and how to present them.
file attached slid numbers 7,8,9 -
“TechWorx ReSale Risk Assessment Plan: Evaluating Threats and Prioritizing Risks for Enhanced Security” Title: “Risk Assessment Plan for Data Center Assets and Activities”
Project Part 2: Risk Assessment
Scenario
You are an IT security analyst working for TechWorx ReSale, Inc. a fictitious IT organization headquartered in Chicago, Illinois, and is a subsidiary of Techworx.
TechWorx ReSale primarily refurbishes old IT equipment and resales it for a profit. TechWorx ReSale has over 777 employees throughout the organization and generates $77 million USD in annual revenue. The company has two additional locations in Lawton, Oklahoma, and Augusta, Maine which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.
Company Products
TechWorx ReSale has two main products: RExchange and RPay,
RExchange is the primary source of revenue for the company. This system is where customers can shop, request, and order equipment.
RPay is a web portal used by the company’s RExchange customers to support the management of secure payments and billing. The RPay web portal, hosted at TechWorx ReSale production sites, accepts various forms of payments and interacts with credit card processing organizations.
TechWorx ReSale customers, which are individuals and commercial organizations, connect to all three of the company’s products using HTTPS connections. All customers can make payments and update their profiles using Internet-accessible HTTPS websites. No government customers and no customers from the EU or California.
Information Technology Infrastructure Overview
TechWorx ReSale operates in three production data centers that provide high availability across the company’s products. The data centers host about 500 production servers, and TechWorx ReSale maintains 1100 corporate laptops and company-issued mobile devices for its employees.
Results from recent audit and inspection:
Consider using the National Vulnerability database and/or the MITRE CVE database to assist you. (also, see pages 50-51 in your textbook)
There has not been a recent Threat assessment, but leadership is concerned with all categories of threats.
Management Request
Senior management at TechWorx ReSale has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.
Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.
The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined
Project Part 2: Risk Assessment Plan
After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan.
TechWorks Resale operates a specialty system called the Repo. The system costs $1500, research has shown these systems fail once every 3 years, the administrators are paid $100/hr and it will take two (2) administrators 2 hours to replace one of these systems. Four (4) employees use this system, and they make $50hr. These employees are completely unproductive while the system is down. Assume the exposure factor for this system is 100%.
A recent audit report identified that many servers were running MS SMB v1.0 which, as you know, is susceptible to MS17-010 Eternalblue. Additionally, they are running They are running Apache HTTP Server 2.4.49. For this part of the project:
Review risk assessment approaches. (see week 5’s discussion for ideas). You may add sections to your report, but please ensure you include:the introduction (step 2)
Scope/Boundaries (step 3)
Risk Assessment results (step 4)
A priority list of Risks (step 5)
Summary/Conclusions (step 7)
Write an introduction to the plan explaining its purpose and importance. This is focused on the risk assessment not a repeat of the Risk management plan’s introduction.
Define the scope and boundaries for the risk assessment.Identify data center assets and activities to be assessed.
Complete a risk assessment using both qualitative and quantitative methods for a total of 4. You will come up with one risk on your own. The three other risks you must develop are based on a threat exploiting these three vulnerabilities: They are running Apache HTTP Server 2.4.49
The Repo (This is a quantitative risk based on the background information. Calculate the Annual Loss Expectancy (ALE) of the specialty server described in the background. Show your work. Identify ARO, SLE, and ALE in your calculations.
The SMBv1 vulnerability (Eternal Blue) You will have three qualitative risks. Use Tables 5-1 and 5-2 for probability and impact. You may come up with your own probability and impact scales, but please explain. Prioritize the four risks after completing the risk assessment. In other words, what is the order of the risks that we must deal with first to last?
Summary/Conclusions.
Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.