Description
need return function in c++ 100 as the value of people in the disaster zone and 25 as the number of people killed, the function should return .75 as the percentage of people who survived. It must return the total amount of people, survivors and the amount of people that are dead. must label each accordingly.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Attached.
C++ Code
#include
using namespace std;
// The function to calculate the total amount of people,...
Completion Status:
100%
Review
Review
Anonymous
I was having a hard time with this subject, and this was a great help.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Java (system calls and run the program with the NetBeans)
Hi, I need help:1> Comments: Comment in the code at every "Comment Here" section. 2> Running the code: run the pro ...
Java (system calls and run the program with the NetBeans)
Hi, I need help:1> Comments: Comment in the code at every "Comment Here" section. 2> Running the code: run the program (code) with the NetBeans IDE, successfully.
University of Phoenix Wk5 Temperature Conversion Functions Project
In this lab you will implement a temperature converter. Five UI elements are declared for you in the template:Element desc ...
University of Phoenix Wk5 Temperature Conversion Functions Project
In this lab you will implement a temperature converter. Five UI elements are declared for you in the template:Element descriptionElement's IDText input field for Celsius temperatureCInputText input field for Fahrenheit temperatureFInputButton that, when clicked, converts from one temperature to the otherConvertButtonDiv for displaying an error message when temperature cannot be convertedErrDivImage corresponding to the temperatureWeatherImageImplement the conversion functions (2 points)Implement the ConvertCtoF and ConvertFtoC functions to convert between Celsius and Fahrenheit. ConvertCtoF takes a single numerical argument for a temperature in Celsius and returns the temperature in Fahrenheit using the following conversion formula:°F = °C * 9/5 + 32Similarly, ConvertFtoC takes a single numerical argument for a temperature in Fahrenheit and returns the temperature in Celsius using the following conversion formula:°C = (°F - 32) * 5/9Register conversion button's click event in bodyLoaded() (2 points)When the page loads, the bodyLoaded function is called. Implement bodyLoaded to register a click event handler for the Convert button (id="ConvertButton"). Use addEventListener(), not onclick.When the Convert button is pressed, the text box that contains a number should be converted into the opposing temperature. So if a number is in the Celsius text box (id="CInput"), the temperature should be converted into Fahrenheit and displayed in the Fahrenheit text box (id="FInput") and vice versa. Use parseFloat() to convert from a string to a number and do not round the result.Ensure that only one text field contains a value (2 points)Ensure that only one text field contains a value at any moment in time unless the Convert button has been pressed. For example, when the Celsius field has a number and the user enters a Fahrenheit entry, the Celsius field should be cleared as soon as the user begins to type. This will require implementing an input event handler for each of the text fields that clears the opposing text field when a change occurs. Register each input event handler in the bodyLoaded function. Use addEventListener(), not oninput.Change the image to reflect the temperature (2 points)When the temperature is converted, change the image to reflect the temperature in Fahrenheit. Each image is in the same directory as your .html page.Below 32 F32 - 50 FAbove 50 Fcold.gifcool.gifwarm.gifHandle bad input (2 points)When parseFloat() returns a NaN for the temperature to be converted, set ErrDiv's textContent to the message: "X is not a number", where X is the string from the text input. When parseFloat() returns a valid number, set ErrDiv's textContent to an empty string. The image below shows a sample error message.
CPT 200 Ashford University Number Analysis Program using Python Code Project
For this interactive assignment, you will design a program that asks the user to enter a series of 20 numbers. The program ...
CPT 200 Ashford University Number Analysis Program using Python Code Project
For this interactive assignment, you will design a program that asks the user to enter a series of 20 numbers. The program should store the numbers in a list and then display the following data:The lowest number in the list.The highest number in the list.The sum of the numbers in the list.Once you have completed the program, take a screen shot of the completed functionality (including the input and the output) and save it in a Word document, along with the script.In your initial post,Attach your Word document.Describe your process in developing the program.
EEGR 415 Morgan State University Java Programing Applications Lab Report
I am stuck on how to code this project correctly. Please help provide the correct code with notes.
EEGR 415 Morgan State University Java Programing Applications Lab Report
I am stuck on how to code this project correctly. Please help provide the correct code with notes.
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverabl ...
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverable.Part 1: Review QuestionsBefore diving into a lab exercise, complete the following review questions:Security Control TypesThe concept of defense in depth can be broken down into three different security control types. Identify the security control type of each set of defense tactics.Walls, bollards, fences, guard dogs, cameras, and lighting are what type of security control?Security awareness programs, BYOD policies, and ethical hiring practices are what type of security control?Encryption, biometric fingerprint readers, firewalls, endpoint security, and intrusion detection systems are what type of security control?Intrusion Detection and Attack indicatorsWhat's the difference between an IDS and an IPS?What's the difference between an Indicator of Attack and an Indicator of Compromise?The Cyber Kill ChainName each of the seven stages for the Cyber Kill chain and provide a brief example of each.Stage 1:Stage 2:Stage 3:Stage 4:Stage 5:Stage 6:Stage 7:Snort Rule AnalysisUse the provided Snort rules to answer the following questions:Snort Rule #1alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5820 (msg:"ET SCAN Potential VNC Scan 5800-5820"; flags:S,12; threshold: type both, track by_src, count 5, seconds 60; reference:url,doc.emergingthreats.net/2002910; classtype:attempted-recon; sid:2002910; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #2alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET POLICY PE EXE or DLL Windows file download HTTP"; flow:established,to_client; flowbits:isnotset,ET.http.binary; flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:"MZ"; within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; distance:-64; within:4; flowbits:set,ET.http.binary; metadata: former_category POLICY; reference:url,doc.emergingthreats.net/bin/view/Main/2018959; classtype:policy-violation; sid:2018959; rev:4; metadata:created_at 2014_08_19, updated_at 2017_02_01;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #3Your turn! Write a Snort rule that alerts when traffic is detected inbound on port 4444 to the local network on any port. Be sure to include the msg in the Rule Option.Part 2: "Drop Zone" LabIn this lab exercise, you will assume the role of a Jr. Security Administrator at an indoor skydiving company called Drop Zone.Your company hosts a web server that takes online reservations and credit card payments. As a result, your company must comply with PCI/DSS regulations which requires businesses who take online credit card payments to have a firewall in place to protect personally identifiable information (PII).Your network has been under attack from the following three IPs: 10.208.56.23, 135.95.103.76, and 76.34.169.118. You have decided to add these IPs to the drop zone within your firewall.The first requirement of PCI/DSS regulations is to protect your system with firewalls. "Properly configured firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization." PCI DSS Quick Reference GuideSet Up:For this lab you will use the Network Security Lab located in Azure.Once logged in, launch an instance of the machine firewalld from the HyperV Manager and login with the following credentials:Username: sysadminPassword: cybersecurityReference: https://manpages.debian.org/testing/firewalld/firewall-cmd.1.en.htmlInstructions:The Senior Security Manager has drafted configuration requirements for your organization with the following specification.You need to configure zones that will segment each network according to service type.Public ZoneServices: HTTP, HTTPS, POP3, SMTPInterface: ETH0Web ZoneSource IP: 201.45.34.126Services: HTTPInterface: ETH1Sales ZoneSource IP: 201.45.15.48Services: HTTPSInterface: ETH2Mail ZoneSource IP: 201.45.105.12Services: SMTP, POP3Interface: ETH3You also need to drop all traffic from the following blacklisted IPs:10.208.56.23135.95.103.7676.34.169.118Uninstall ufwBefore getting started, you should verify that you do not have any instances of ufw running. This will avoid conflicts with your firewalld service. This also ensures that firewalld will be your default firewall.Run the command that removes any running instance of ufw.Enable and start firewalldBy default, the firewalld service should be running. If not, then run the following commands:Run the commands that enable and start firewalld upon boots and reboots.Note: This will ensure that firewalld remains active after each reboot.Confirm that the service is running.Run the command that checks whether or not the firewalld service is up and running.List all firewall rules currently configured.Next, lists all currently configured firewall rules. This will give you a good idea of what's currently configured and save you time in the long run by not doing double work.Run the command that lists all currently configured firewall rules:Take note of what zones and settings are configured. You many need to remove unneeded services and settings.List all supported service types that can be enabled.Run the command that lists all currently supported services to see if the service you need is availableWe can see that the Home and Drop Zones are created by default.Zone ViewsRun the command that lists all currently configured zones.We can see that the Public and Drop Zones are created by default. Therefore, we will need to create Zones for Web, Sales, and Mail.Create Zones for Web, Sales and Mail. (Hint look at the manpage in the instructions)Run the commands that create Web, Sales and Mail zones.Use the manpage link provided above for assistance.Set the zones to their designated interfaces.Run the command that sets your interface to your zones.Use the configurations provided at the beginning of the instructions.Add services to the active zones.Run the commands that add services to the public zone, the web zone, the sales zone, and the mail zone.Use the configurations provided at the beginning of the instructions.Add your adversaries to the Drop Zone.Run the command that will add all the blacklisted IPs to the Drop Zone.Make rules permanent then reload them:It's good practice to ensure that your firewalld installation remains nailed up and retains its services across reboots. This ensure that the network remains secured after unplanned outages such as power failures.Run the command that reloads the firewalld configurations and writes it to memory.View active ZonesNow, we'll want to provide truncated listings of all currently active zones. This a good time to verify your zone settings.Run the command that displays all zone services.Block an IP addressUse a rich-rule that blocks the IP address 138.138.0.3 on your public zone.Block Ping/ICMP RequestsHarden your network against ping scans by blocking icmp ehco replies.Run the command that blocks pings and icmp requests in your public zone.Rule CheckNow that you've set up your brand new firewalld installation, it's time to verify that all of the settings have taken effect.Run the command that lists all of the rule settings. Run one command at a time for each zone.Are all of the rules in place? If not, then go back and make the necessary modification before checking again.Congratulations! You have successfully configured and deployed a fully comprehensive firewalld installation.Part 3: IDS, IPS, DiD, and FirewallsAnswer the following review questions.IDS vs. IPS SystemsName and define two ways an IDS connects to a network.Describe how an IPS connects to a network.What type of IDS compares patterns of traffic to predefined signatures and is unable to detect Zero-Day attacks?Which type of IDS is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?Defense in DepthFor each of the following scenarios, provide the layer of Defense in Depth that applies:A criminal hacker tailgates an employee through an exterior door into a secured facility, explaining that they forgot their badge at home.A zero-day goes undetected by antivirus software.A criminal successfully gains access to HR’s database.A criminal hacker exploits a vulnerability within an operating system.A hacktivist organization successfully performs a DDoS attack, taking down a government website.Data is classified at the wrong classification level.A state sponsored hacker group successfully firewalked an organization to produce a list of active services on an email server.Name one method of protecting data-at-rest from being readable on hard drive.Name one method to protect data-in-transit.What technology could provide law enforcement with the ability to track and recover a stolen laptop.How could you prevent an attacker from booting a stolen laptop using an external hard drive?Firewall Architectures and MethodologiesWhich type of firewall verifies the three-way TCP handshake? TCP handshake checks are designed to ensure that session packets are from legitimate sources.Which type of firewall considers the connection as a whole? Meaning, instead of looking at only individual packets, these firewalls look at whole streams of packets at one time.Which type of firewall intercepts all traffic prior to being forwarded to its final destination. In a sense, these firewalls act on behalf of the recipient by ensuring the traffic is safe prior to forwarding it?Which type of firewall examines data within a packet as it progresses through a network interface by examining source and destination IP address, port number, and packet type- all without opening the packet to inspect its contents?Which type of firewall filters based solely on source and destination MAC address?Bonus Lab: "Green Eggs & SPAM"This bonus activity is a culmination of the topics and tools covered during the following Unit 11 activities:Alert - FTP File ExtractionAlert - ET INFO Executable DownloadAlert - C2 BeaconInvestigation, Analysis, and Escalation ActivityThreat Hunting - Cyber Threat IntelligenceIn this activity, you will target spam, uncover its whereabouts, and attempt to discover the intent of the attacker.You will assume the role of a Jr. Security administrator working for the Department of Technology for the State of California.As a junior administrator, your primary role is to perform the initial triage of alert data: the initial investigation and analysis followed by an escalation of high priority alerts to senior incident handlers for further review.You will work as part of a Computer and Incident Response Team (CIRT), responsible for compiling Threat Intelligence as part of your incident report.InstructionsLog into the Security Onion VM and use the following Indicator of Attack to complete this portion of the homework.Locate the following Indicator of Attack in Sguil:Source IP/Port: 188.124.9.56:80Destination Address/Port: 192.168.3.35:1035Event Message: ET TROJAN JS/Nemucod.M.gen downloading EXE payloadAnswer the following questions:What was the indicator of an attack?Hint: What do the details of the reveal?What was the attacker's motivation?Describe observations and indicators that may be related to the perpetrators of the intrusion. Categorize your insights according to the appropriate stage of the cyber kill chain, as structured in the following table.TTPExampleFindingsReconnaissanceHow did they attacker locate the victim?WeaponizationWhat was it that was downloaded?DeliveryHow was it downloaded?ExploitationWhat does the exploit do?InstallationHow is the exploit installed?Command & Control (C2)How does the attacker gain control of the remote machine?Actions on ObjectivesWhat does the software that the attacker sent do to complete it's tasks?What are your recommended mitigation strategies?Cite your references here.
College Database ERD
OPTION #2: COLLEGE DATABASE ERDA small college needs a database system designed. The design starts with e visualized conce ...
College Database ERD
OPTION #2: COLLEGE DATABASE ERDA small college needs a database system designed. The design starts with e visualized conceptualization carried by an entity-relationship diagram (ERD). Create this ERD by completing the following steps:Identify all involved in the database system so your ERD accurately “captures” the entire process, actors, and relationships (e.g., faculty, students, staff, courses, facilities, etc.Identify and list entities and attributes for each entity.Make sure you designate an attribute to serve as a primary key per each entity. Explain why that attribute “deserves” to be designated a primary key.Briefly define business rules. (Example: One instructor can’t teach more than one class at a time.)It is important that you have a clear understanding of key concepts such as entity, attribute, primary key, foreign key, referential integrity, relationships, ERD, etc., before starting to work on the assignment. Example: Entity – RoomAttributes: Room Number (Primary Key), Capacity, Building, Accessibility, etc.The ERD should be created using one of the following options:Draw using a free drawing tool available online, such as SmartDraw (Links to an external site.)Links to an external site. or Lucid Chart (Links to an external site.)Links to an external site..Draw using software you already own, such as Visio (Links to an external site.)Links to an external site. or Argo UML (Links to an external site.)Links to an external site..Draw by hand and take a snapshot with a camera.It is not important how you draw the diagram, as long as it effectively conceptualizes the database system design and “captures” the system accurately. The diagram must be imported or inserted into a Word document and accompanied by an APA-formatted cover page. Review the rubric in the Module 3 folder for specific grading criteria.6 days ago
Similar Content
Inverted Index Program Project
Problem Statement:An inverted index is a mapping of words to their location in a set of documents. Most modern search engi...
ITEC 225 Towson University Html CSS Question
Intro to Web Development
Homework 5 (100 pts)
In this assignment, simply create a simple html version flyer to be distribu...
University of Sunderland Why Do We Analyze Data Structures Questions
Why do we analyze data structures and algorithms?What do we keep track of?How do we do the analysis?Explain how the growth...
I have assignment three problems in C++ ?
1)Question one Follow the link to access the problem's requirements: https://github.com/xaviermerino/ECE2551-SoftHardDesi...
IT 306 GMU Data Structures and Algorithms in Java Question
IT 306 Fall 2021
Data Structures and Algorithms in Java
Assignment 5
Due: 10/27/2021
In this assignment you are asked to c...
CIS 301 De Anza College Binary Search to Store Data Base for Employees
Abstract
Complete the EmployeeDB class to store Employee Objects. The EmployeeDB class will store Employee objects using a...
Royslide2 Autosaved
Powershell commands are the main cmdlets that are used to staart major processes in an operating system. Get –process �...
Rayanalmajed
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the a...
Final Bs Plan
The world runs on the wheel, and almost all automotive wheels necessarily require tires. Production of rubber and rubber p...
Related Tags
Book Guides
The Underground Railroad
by Colson Whitehead
The Adventures of Huckleberry Finn
by Mark Twain
Big Little Lies
by Liane Moriarty
The English Patient
by Michael Ondaatje
All the Kings Men
by Robert Penn Warren
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
One Flew Over the Cuckoos Nest
by Ken Kesey
Into Thin Air
by Jon Krakauer
How to Win Friends and Influence People
by Dale Carnegie
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Java (system calls and run the program with the NetBeans)
Hi, I need help:1> Comments: Comment in the code at every "Comment Here" section. 2> Running the code: run the pro ...
Java (system calls and run the program with the NetBeans)
Hi, I need help:1> Comments: Comment in the code at every "Comment Here" section. 2> Running the code: run the program (code) with the NetBeans IDE, successfully.
University of Phoenix Wk5 Temperature Conversion Functions Project
In this lab you will implement a temperature converter. Five UI elements are declared for you in the template:Element desc ...
University of Phoenix Wk5 Temperature Conversion Functions Project
In this lab you will implement a temperature converter. Five UI elements are declared for you in the template:Element descriptionElement's IDText input field for Celsius temperatureCInputText input field for Fahrenheit temperatureFInputButton that, when clicked, converts from one temperature to the otherConvertButtonDiv for displaying an error message when temperature cannot be convertedErrDivImage corresponding to the temperatureWeatherImageImplement the conversion functions (2 points)Implement the ConvertCtoF and ConvertFtoC functions to convert between Celsius and Fahrenheit. ConvertCtoF takes a single numerical argument for a temperature in Celsius and returns the temperature in Fahrenheit using the following conversion formula:°F = °C * 9/5 + 32Similarly, ConvertFtoC takes a single numerical argument for a temperature in Fahrenheit and returns the temperature in Celsius using the following conversion formula:°C = (°F - 32) * 5/9Register conversion button's click event in bodyLoaded() (2 points)When the page loads, the bodyLoaded function is called. Implement bodyLoaded to register a click event handler for the Convert button (id="ConvertButton"). Use addEventListener(), not onclick.When the Convert button is pressed, the text box that contains a number should be converted into the opposing temperature. So if a number is in the Celsius text box (id="CInput"), the temperature should be converted into Fahrenheit and displayed in the Fahrenheit text box (id="FInput") and vice versa. Use parseFloat() to convert from a string to a number and do not round the result.Ensure that only one text field contains a value (2 points)Ensure that only one text field contains a value at any moment in time unless the Convert button has been pressed. For example, when the Celsius field has a number and the user enters a Fahrenheit entry, the Celsius field should be cleared as soon as the user begins to type. This will require implementing an input event handler for each of the text fields that clears the opposing text field when a change occurs. Register each input event handler in the bodyLoaded function. Use addEventListener(), not oninput.Change the image to reflect the temperature (2 points)When the temperature is converted, change the image to reflect the temperature in Fahrenheit. Each image is in the same directory as your .html page.Below 32 F32 - 50 FAbove 50 Fcold.gifcool.gifwarm.gifHandle bad input (2 points)When parseFloat() returns a NaN for the temperature to be converted, set ErrDiv's textContent to the message: "X is not a number", where X is the string from the text input. When parseFloat() returns a valid number, set ErrDiv's textContent to an empty string. The image below shows a sample error message.
CPT 200 Ashford University Number Analysis Program using Python Code Project
For this interactive assignment, you will design a program that asks the user to enter a series of 20 numbers. The program ...
CPT 200 Ashford University Number Analysis Program using Python Code Project
For this interactive assignment, you will design a program that asks the user to enter a series of 20 numbers. The program should store the numbers in a list and then display the following data:The lowest number in the list.The highest number in the list.The sum of the numbers in the list.Once you have completed the program, take a screen shot of the completed functionality (including the input and the output) and save it in a Word document, along with the script.In your initial post,Attach your Word document.Describe your process in developing the program.
EEGR 415 Morgan State University Java Programing Applications Lab Report
I am stuck on how to code this project correctly. Please help provide the correct code with notes.
EEGR 415 Morgan State University Java Programing Applications Lab Report
I am stuck on how to code this project correctly. Please help provide the correct code with notes.
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverabl ...
Lewis University Intrusion Detection and Attack indicators Questions
Homework: Network SecuritySubmission GuidelinesPlease complete and submit the Submission File for your homework deliverable.Part 1: Review QuestionsBefore diving into a lab exercise, complete the following review questions:Security Control TypesThe concept of defense in depth can be broken down into three different security control types. Identify the security control type of each set of defense tactics.Walls, bollards, fences, guard dogs, cameras, and lighting are what type of security control?Security awareness programs, BYOD policies, and ethical hiring practices are what type of security control?Encryption, biometric fingerprint readers, firewalls, endpoint security, and intrusion detection systems are what type of security control?Intrusion Detection and Attack indicatorsWhat's the difference between an IDS and an IPS?What's the difference between an Indicator of Attack and an Indicator of Compromise?The Cyber Kill ChainName each of the seven stages for the Cyber Kill chain and provide a brief example of each.Stage 1:Stage 2:Stage 3:Stage 4:Stage 5:Stage 6:Stage 7:Snort Rule AnalysisUse the provided Snort rules to answer the following questions:Snort Rule #1alert tcp $EXTERNAL_NET any -> $HOME_NET 5800:5820 (msg:"ET SCAN Potential VNC Scan 5800-5820"; flags:S,12; threshold: type both, track by_src, count 5, seconds 60; reference:url,doc.emergingthreats.net/2002910; classtype:attempted-recon; sid:2002910; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #2alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET POLICY PE EXE or DLL Windows file download HTTP"; flow:established,to_client; flowbits:isnotset,ET.http.binary; flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:"MZ"; within:2; byte_jump:4,58,relative,little; content:"PE|00 00|"; distance:-64; within:4; flowbits:set,ET.http.binary; metadata: former_category POLICY; reference:url,doc.emergingthreats.net/bin/view/Main/2018959; classtype:policy-violation; sid:2018959; rev:4; metadata:created_at 2014_08_19, updated_at 2017_02_01;)Break down the Sort Rule header. What is this rule doing?What stage of the Cyber Kill Chain does the alerted activity violate?What kind of attack is this rule monitoring?Snort Rule #3Your turn! Write a Snort rule that alerts when traffic is detected inbound on port 4444 to the local network on any port. Be sure to include the msg in the Rule Option.Part 2: "Drop Zone" LabIn this lab exercise, you will assume the role of a Jr. Security Administrator at an indoor skydiving company called Drop Zone.Your company hosts a web server that takes online reservations and credit card payments. As a result, your company must comply with PCI/DSS regulations which requires businesses who take online credit card payments to have a firewall in place to protect personally identifiable information (PII).Your network has been under attack from the following three IPs: 10.208.56.23, 135.95.103.76, and 76.34.169.118. You have decided to add these IPs to the drop zone within your firewall.The first requirement of PCI/DSS regulations is to protect your system with firewalls. "Properly configured firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization." PCI DSS Quick Reference GuideSet Up:For this lab you will use the Network Security Lab located in Azure.Once logged in, launch an instance of the machine firewalld from the HyperV Manager and login with the following credentials:Username: sysadminPassword: cybersecurityReference: https://manpages.debian.org/testing/firewalld/firewall-cmd.1.en.htmlInstructions:The Senior Security Manager has drafted configuration requirements for your organization with the following specification.You need to configure zones that will segment each network according to service type.Public ZoneServices: HTTP, HTTPS, POP3, SMTPInterface: ETH0Web ZoneSource IP: 201.45.34.126Services: HTTPInterface: ETH1Sales ZoneSource IP: 201.45.15.48Services: HTTPSInterface: ETH2Mail ZoneSource IP: 201.45.105.12Services: SMTP, POP3Interface: ETH3You also need to drop all traffic from the following blacklisted IPs:10.208.56.23135.95.103.7676.34.169.118Uninstall ufwBefore getting started, you should verify that you do not have any instances of ufw running. This will avoid conflicts with your firewalld service. This also ensures that firewalld will be your default firewall.Run the command that removes any running instance of ufw.Enable and start firewalldBy default, the firewalld service should be running. If not, then run the following commands:Run the commands that enable and start firewalld upon boots and reboots.Note: This will ensure that firewalld remains active after each reboot.Confirm that the service is running.Run the command that checks whether or not the firewalld service is up and running.List all firewall rules currently configured.Next, lists all currently configured firewall rules. This will give you a good idea of what's currently configured and save you time in the long run by not doing double work.Run the command that lists all currently configured firewall rules:Take note of what zones and settings are configured. You many need to remove unneeded services and settings.List all supported service types that can be enabled.Run the command that lists all currently supported services to see if the service you need is availableWe can see that the Home and Drop Zones are created by default.Zone ViewsRun the command that lists all currently configured zones.We can see that the Public and Drop Zones are created by default. Therefore, we will need to create Zones for Web, Sales, and Mail.Create Zones for Web, Sales and Mail. (Hint look at the manpage in the instructions)Run the commands that create Web, Sales and Mail zones.Use the manpage link provided above for assistance.Set the zones to their designated interfaces.Run the command that sets your interface to your zones.Use the configurations provided at the beginning of the instructions.Add services to the active zones.Run the commands that add services to the public zone, the web zone, the sales zone, and the mail zone.Use the configurations provided at the beginning of the instructions.Add your adversaries to the Drop Zone.Run the command that will add all the blacklisted IPs to the Drop Zone.Make rules permanent then reload them:It's good practice to ensure that your firewalld installation remains nailed up and retains its services across reboots. This ensure that the network remains secured after unplanned outages such as power failures.Run the command that reloads the firewalld configurations and writes it to memory.View active ZonesNow, we'll want to provide truncated listings of all currently active zones. This a good time to verify your zone settings.Run the command that displays all zone services.Block an IP addressUse a rich-rule that blocks the IP address 138.138.0.3 on your public zone.Block Ping/ICMP RequestsHarden your network against ping scans by blocking icmp ehco replies.Run the command that blocks pings and icmp requests in your public zone.Rule CheckNow that you've set up your brand new firewalld installation, it's time to verify that all of the settings have taken effect.Run the command that lists all of the rule settings. Run one command at a time for each zone.Are all of the rules in place? If not, then go back and make the necessary modification before checking again.Congratulations! You have successfully configured and deployed a fully comprehensive firewalld installation.Part 3: IDS, IPS, DiD, and FirewallsAnswer the following review questions.IDS vs. IPS SystemsName and define two ways an IDS connects to a network.Describe how an IPS connects to a network.What type of IDS compares patterns of traffic to predefined signatures and is unable to detect Zero-Day attacks?Which type of IDS is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?Defense in DepthFor each of the following scenarios, provide the layer of Defense in Depth that applies:A criminal hacker tailgates an employee through an exterior door into a secured facility, explaining that they forgot their badge at home.A zero-day goes undetected by antivirus software.A criminal successfully gains access to HR’s database.A criminal hacker exploits a vulnerability within an operating system.A hacktivist organization successfully performs a DDoS attack, taking down a government website.Data is classified at the wrong classification level.A state sponsored hacker group successfully firewalked an organization to produce a list of active services on an email server.Name one method of protecting data-at-rest from being readable on hard drive.Name one method to protect data-in-transit.What technology could provide law enforcement with the ability to track and recover a stolen laptop.How could you prevent an attacker from booting a stolen laptop using an external hard drive?Firewall Architectures and MethodologiesWhich type of firewall verifies the three-way TCP handshake? TCP handshake checks are designed to ensure that session packets are from legitimate sources.Which type of firewall considers the connection as a whole? Meaning, instead of looking at only individual packets, these firewalls look at whole streams of packets at one time.Which type of firewall intercepts all traffic prior to being forwarded to its final destination. In a sense, these firewalls act on behalf of the recipient by ensuring the traffic is safe prior to forwarding it?Which type of firewall examines data within a packet as it progresses through a network interface by examining source and destination IP address, port number, and packet type- all without opening the packet to inspect its contents?Which type of firewall filters based solely on source and destination MAC address?Bonus Lab: "Green Eggs & SPAM"This bonus activity is a culmination of the topics and tools covered during the following Unit 11 activities:Alert - FTP File ExtractionAlert - ET INFO Executable DownloadAlert - C2 BeaconInvestigation, Analysis, and Escalation ActivityThreat Hunting - Cyber Threat IntelligenceIn this activity, you will target spam, uncover its whereabouts, and attempt to discover the intent of the attacker.You will assume the role of a Jr. Security administrator working for the Department of Technology for the State of California.As a junior administrator, your primary role is to perform the initial triage of alert data: the initial investigation and analysis followed by an escalation of high priority alerts to senior incident handlers for further review.You will work as part of a Computer and Incident Response Team (CIRT), responsible for compiling Threat Intelligence as part of your incident report.InstructionsLog into the Security Onion VM and use the following Indicator of Attack to complete this portion of the homework.Locate the following Indicator of Attack in Sguil:Source IP/Port: 188.124.9.56:80Destination Address/Port: 192.168.3.35:1035Event Message: ET TROJAN JS/Nemucod.M.gen downloading EXE payloadAnswer the following questions:What was the indicator of an attack?Hint: What do the details of the reveal?What was the attacker's motivation?Describe observations and indicators that may be related to the perpetrators of the intrusion. Categorize your insights according to the appropriate stage of the cyber kill chain, as structured in the following table.TTPExampleFindingsReconnaissanceHow did they attacker locate the victim?WeaponizationWhat was it that was downloaded?DeliveryHow was it downloaded?ExploitationWhat does the exploit do?InstallationHow is the exploit installed?Command & Control (C2)How does the attacker gain control of the remote machine?Actions on ObjectivesWhat does the software that the attacker sent do to complete it's tasks?What are your recommended mitigation strategies?Cite your references here.
College Database ERD
OPTION #2: COLLEGE DATABASE ERDA small college needs a database system designed. The design starts with e visualized conce ...
College Database ERD
OPTION #2: COLLEGE DATABASE ERDA small college needs a database system designed. The design starts with e visualized conceptualization carried by an entity-relationship diagram (ERD). Create this ERD by completing the following steps:Identify all involved in the database system so your ERD accurately “captures” the entire process, actors, and relationships (e.g., faculty, students, staff, courses, facilities, etc.Identify and list entities and attributes for each entity.Make sure you designate an attribute to serve as a primary key per each entity. Explain why that attribute “deserves” to be designated a primary key.Briefly define business rules. (Example: One instructor can’t teach more than one class at a time.)It is important that you have a clear understanding of key concepts such as entity, attribute, primary key, foreign key, referential integrity, relationships, ERD, etc., before starting to work on the assignment. Example: Entity – RoomAttributes: Room Number (Primary Key), Capacity, Building, Accessibility, etc.The ERD should be created using one of the following options:Draw using a free drawing tool available online, such as SmartDraw (Links to an external site.)Links to an external site. or Lucid Chart (Links to an external site.)Links to an external site..Draw using software you already own, such as Visio (Links to an external site.)Links to an external site. or Argo UML (Links to an external site.)Links to an external site..Draw by hand and take a snapshot with a camera.It is not important how you draw the diagram, as long as it effectively conceptualizes the database system design and “captures” the system accurately. The diagram must be imported or inserted into a Word document and accompanied by an APA-formatted cover page. Review the rubric in the Module 3 folder for specific grading criteria.6 days ago
Earn money selling
your Study Documents