Description
Q1. A combinational circuit is specified by the following three Boolean functions:
𝐹1(𝐴,𝐵,𝐶)=Σ(1,4,6)
𝐹(𝐴𝐵𝐶=Σ(3,5)
𝐹(𝐴𝐵𝐶=Σ(2,4,6,7)
Implement the circuit with a decoder constructed with NAND gates and NAND or AND gates connected to the decoder outputs.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really helpful material, saved me a great deal of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
6 pages
Amazon Organization
Many organizations are applying information technology in the form of data mining in knowledge management. Data mining tec ...
Amazon Organization
Many organizations are applying information technology in the form of data mining in knowledge management. Data mining techniques enable organizations ...
The security posture of the information systems infrastructure of an organization, computer science homework help
The security posture of the information systems infrastructure of an organization should be regularly monitored and assess ...
The security posture of the information systems infrastructure of an organization, computer science homework help
The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.There are 10 steps that will help you create your final deliverables. The deliverables for this project are as follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.Step 1: Organizational BackgroundDuring Project One, you researched a hypothetical or actual organization of your choice. In light of lessons learned from your analysis of the OPM breach and the various publicly available audit reports, you will now learn more about designing secure networks and propose a LAN, WAN, and systems environment in diagram format for your organization. Discuss the security benefits of your chosen network design.Then read about the following computing platforms available for networks, and discuss how these platforms should be implemented in your organization:common computing platformscloud computingdistributed computingcentralized computingsecure programming fundamentalsStep 2: Organizational ThreatsYou just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization.Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Define threat intelligence, and explain what kind of threat intelligence is known about the OPM breach. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization?Step 3: Scanning the NetworkNote: You will utilize the tools in Workspace for this step. If you need help outside the classroom to complete this project, you must register for CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.Click here to access the instructions for Navigating the Workspace and the Lab Setup.Click here to access the Project 3 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use. You will perform this lab in Step 7.In order to validate the assets and devices on the organization's network, run scans using security and vulnerability assessment analysis tools such as MBSA, OpenVAS, Nmap, or NESSUS depending on the operating systems of your organization's networks. Live network traffic can also be sampled and scanned using Wireshark (we do this in step 7) on either the Linux or Windows systems. Wireshark allows you to inspect all OSI Layers of traffic information. Click the following link to read more about these network monitoring tools: Tools to Monitor and Analyze Network Activities.Provide the report as part of the SAR.Review the information captured in these two links message and protocols and Transmission Control Protocol/Internet Protocol (TCP/IP), and identify any security communication, message and protocols, or security data transport methods used such as (TCP/IP), SSL, and others. Make note of this, as it should be mentioned in your reports.Step 4: Identifying Security IssuesYou have a suite of security tools, techniques, and procedures that can be used to assess the security posture of your organization's network in a SAR.Now it's time to identify the security issues in your organization's networks. You have already used password cracking tools to crack weak and vulnerable passwords. Provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization?Step 5: Firewalls and EncryptionNext, examine these resources on firewalls and auditing–RDBMS related to the use of the Relational Database Management System (i.e., the database system and data) RDBMS. Also review these resources related to access control. Determine the role of firewalls and encryption, and auditing – RDBMS that could assist in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems.Reflect any weaknesses found in the network and information system diagrams previously created, as well as in the developing SAR.Step 6: Threat IdentificationYou know of the weaknesses in your organization's network and information system. Now you will determine various known threats to the organization's network architecture and IT assets.Get acquainted with the following types of threats and attack techniques. Which are a risk to your organization?IP address spoofing/cache poisoning attacksdenial of service attacks (DoS)packet analysis/sniffingsession hijacking attacksdistributed denial of service attacksIn identifying the different threats, complete the following tasks:Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems and the types of remediation and mitigation techniques available in your industry, and for your organization.Identify the purpose and function of firewalls for organization network systems, and how they address the threats and vulnerabilities you have identified.Also discuss the value of using access control, database transaction and firewall log files.Identify the purpose and function of encryption, as it relates to files and databases and other information assets on the organization's networks.Include these in the SAR.Step 7: Network AnalysisNote: You will utilize the tools in Workspace for this step.You will now investigate network traffic, and the security of the network and information system infrastructure overall. Past network data has been logged and stored, as collected by a network analyzer tool such as Wireshark.Select the following link to enter Workspace and complete the lab activities related to network vulnerabilities.Perform a network analysis on the Wireshark files provided to you in Workspace and assess the network posture and any vulnerability or suspicious information you are able to obtain. Include this information in the SAR. Further analyze the packet capture for network performance, behavior, and any suspicious source and destination addresses on the networks.In the previously created Wireshark files, identify if any databases had been accessed. What are the IP addresses associated with that activity? Include this information in the SAR.Step 8: Suspicious ActivityNote: You will utilize the tools in Workspace for this step.Hackers frequently scan the Internet for computers or networks to exploit. An effective firewall can prevent hackers from detecting the existence of networks. Hackers continue to scan ports, but if the hacker finds there is no response from the port and no connection, the hacker will move on. The firewall can block unwanted traffic and NMap can be used to self-scan to test the responsiveness of the organization's network to would-be hackers.Select the following link to enter Workspace and conduct the port scanning. Provide your findings in the SAR deliverable. Provide analyses of the scans and any recommendation for remediation, if needed. Identify any suspicious activity and formulate the steps in an incidence response that could have been, or should be, enacted. Include the responsible parties that would provide that incidence response and any follow-up activity. Include this in the SAR. Please note that some scanning tools are designed to be undetectable. While running the scan and observing network activity with Wireshark, attempt to determine the detection of the scan in progress. If you cannot identify the scan as it is occurring, indicate this in your SAR.Step 9: Risk and RemediationWhat is the risk and what is the remediation? What is the security exploitation? You can use the OPM OIG Final Audit Report findings and recommendations as a possible source for methods to remediate vulnerabilities.Read this risk assessment resource to get familiar with the process, then prepare the risk assessment. Be sure to first list the threats, then the vulnerabilities, and then pairwise comparisons for each threat and vulnerability, and determine the likelihood of that event occurring, and the level of impact it would have on the organization. Use the OPM OIG Final Audit Report findings as a possible source for potential mitigations. Include this in the risk assessment report (RAR).Step 10: Creating the SAR and RARYour research and Workspace exercise have led you to this moment: creating your SAR and RAR. Consider what you have learned in the previous steps as you create your reports for leadership.Prepare a Security Assessment Report (SAR) with the following sections:PurposeOrganizationScopeMethodologyDataResultsFindingsThe final SAR does not have to stay within this framework, and can be designed to fulfill the goal of the security assessment.Prepare a Risk Assessment Report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation. Devise a high-level plan of action with interim milestones (POAM), in a system methodology, to remedy your findings. Include this high-level plan in the RAR. Summarize the results you obtained from the vulnerability assessment tools (i.e., MBSA and OpenVas) in your report.The deliverables for this project are as follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.Submit your deliverables to the assignment folder.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.
CSIA 310 6381 University of Maryland Why do we need OPSEC for the Test Range HW
Why does Sifers-Grayson need OPSEC -- especially at the test range?This question is expected to be asked at the morning me ...
CSIA 310 6381 University of Maryland Why do we need OPSEC for the Test Range HW
Why does Sifers-Grayson need OPSEC -- especially at the test range?This question is expected to be asked at the morning meeting with the Sifers-Grayson executives. As a Nofsinger consultant, it's your job to have an answer ready. You should focus on identifying critical information & potential sources of threats, e.g. a hacker getting into the RF transmission streams and taking over a test vehicle. (See attached diagram of the test range & communications between it and the Engineering R&D Center.) prepare a 3 to 5 paragraph "talking points" paper that your team leader can use to respond. Use at least 3 authoritative sources in your response and document those sources using a reference list at the end of your posting.
NU Arithmetic & Vector Operations Recycle Rule for Adding & Subtracting R Programming
Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For th ...
NU Arithmetic & Vector Operations Recycle Rule for Adding & Subtracting R Programming
Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding and subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or R Studio). Enter code that handles the following (show all code, comment for each code line and the computed results in your screen shots):Screen shot 1: Arithmetic Operationsassign a value of 144 to xassign a value of 6 to yadd x and ysubtract y from xmultiply x times ydivide x by yfind the square root of xScreen shot 2: Operations on vectorscreate a vector (afc) and assign values 2,6,3create a vector (nfc) and assign values 6,4,2add afc and nfcScreen shot 3: Recycle Rule for adding and subtracting vectorsassign values 2,1,8,3 to vector xassign values 9,4 to vector yadd x to ynotice the warning message - use the Recycle Rule for adding vectors; then add x to y and show resultssubtract 1 from x - apply the Recycle Rule for subtracting vectors; thensubtract y from x and show resultsScreen shot 4: Create an S3 Class Objectcreate a list - with components: name = Your name, date = today's date, and score = score you desire on Assignment 2.name the class as "graduate student" Save the screen shots as a MS Word document (*.docx). Then, click the "Write Submission" link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the ".docx" extension to the filename.).
Boston University Digital Forensics Questions
What are some of the advantages and disadvantages of setting up a forensic workstation based on a distribution of Linux? ...
Boston University Digital Forensics Questions
What are some of the advantages and disadvantages of setting up a forensic workstation based on a distribution of Linux? What are the steps to perform an e-mail abuse investigation? What do you need to conduct an e-mail abuse investigation? What are the minimum requirements for a forensics lab? What are some of advantages and disadvantages of mobile forensic workstations implemented using laptop PCs? Describe the advantages and disadvantages of using raw format. What are the four different methods for acquiring data? Describe the steps to create an image file. What are the differences between private-sector computing investigations and investigations handled by law enforcement agencies? What is a partition? How many primary and extended partitions can a Windows Operating System have? How can you determine the type of a file? What tools are used in determining the type of a file? Describe the subfunctions of the digital evidence extraction phase. Compare and contrast hardware and software write-blockers. What are some of the techniques you can use to re-create a suspect’s disk drive? What is the main purpose of inodes in Linux? What information does an inode contain? Describe the major steps for reconstructing file fragments.
ITS 443 CSUGC Hyper V VMM Console BYOD VDI Environment & VMFS File Discussions
I attached the questions for the discussions. 500 words each minimum and at least one reference apa citation for each ques ...
ITS 443 CSUGC Hyper V VMM Console BYOD VDI Environment & VMFS File Discussions
I attached the questions for the discussions. 500 words each minimum and at least one reference apa citation for each question as well. Thank you!!
Similar Content
St Johns College Linux Vs Windows Video Summary
It is important to note that in any given enterprise the operating system available for the computing environment can be ...
it policey and statagey
eek 2 IS Strategic Analysis PaperAttached Files: Chapter 12 - IT Strategy and Balanced Scorecard.pptx (545.477 KB)Please r...
ISOL535 University of the Cumberlands Crypto Security Architecture Exercise
Please go through 'Research Paper' document in attachments and develop a complete crypto architecture by going through all...
Troy University JQuery Project
Create the E/R model of the database you are going to build. The more variety the better grade. (All kinds of relationship...
LAVC Computer Science Project
Application Title: Airbnb Reservations
Purpose: This Windows Classic Desktop application allows a user to calculate the co...
University of the Cumberlands Alexas Skill and Apple Homepod Discussion
Task1:words:300Examine Alexa’s skill in ordering drinks from Starbucks.Task2:words:300Research Apple Home Pod. How does ...
A Pragmatic Analysis On The Effectiveness Of Information Governance In Adobe Inc
➢The IS security has become a very crucial concern facing modern companies because most of these organizations are becom...
Computer Networks
Wireless networks have significantly helped in enabling multiple computer users to use resources simultaneously without in...
Computer And Network Security 1
Alternate data streams (ADS) can be described as files that are actively attributed to specific functions and can only be ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
6 pages
Amazon Organization
Many organizations are applying information technology in the form of data mining in knowledge management. Data mining tec ...
Amazon Organization
Many organizations are applying information technology in the form of data mining in knowledge management. Data mining techniques enable organizations ...
The security posture of the information systems infrastructure of an organization, computer science homework help
The security posture of the information systems infrastructure of an organization should be regularly monitored and assess ...
The security posture of the information systems infrastructure of an organization, computer science homework help
The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.There are 10 steps that will help you create your final deliverables. The deliverables for this project are as follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.Step 1: Organizational BackgroundDuring Project One, you researched a hypothetical or actual organization of your choice. In light of lessons learned from your analysis of the OPM breach and the various publicly available audit reports, you will now learn more about designing secure networks and propose a LAN, WAN, and systems environment in diagram format for your organization. Discuss the security benefits of your chosen network design.Then read about the following computing platforms available for networks, and discuss how these platforms should be implemented in your organization:common computing platformscloud computingdistributed computingcentralized computingsecure programming fundamentalsStep 2: Organizational ThreatsYou just provided detailed background information on your organization. Next, you’ll describe threats to your organization’s system. Before you get started, select and explore the contents of the following link: insider threats (also known as internal threats). As you’re reading, take note of which insider threats are a risk to your organization.Now, differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. Define threat intelligence, and explain what kind of threat intelligence is known about the OPM breach. Relate the OPM threat intelligence to your organization. How likely is it that a similar attack will occur at your organization?Step 3: Scanning the NetworkNote: You will utilize the tools in Workspace for this step. If you need help outside the classroom to complete this project, you must register for CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.Click here to access the instructions for Navigating the Workspace and the Lab Setup.Click here to access the Project 3 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use. You will perform this lab in Step 7.In order to validate the assets and devices on the organization's network, run scans using security and vulnerability assessment analysis tools such as MBSA, OpenVAS, Nmap, or NESSUS depending on the operating systems of your organization's networks. Live network traffic can also be sampled and scanned using Wireshark (we do this in step 7) on either the Linux or Windows systems. Wireshark allows you to inspect all OSI Layers of traffic information. Click the following link to read more about these network monitoring tools: Tools to Monitor and Analyze Network Activities.Provide the report as part of the SAR.Review the information captured in these two links message and protocols and Transmission Control Protocol/Internet Protocol (TCP/IP), and identify any security communication, message and protocols, or security data transport methods used such as (TCP/IP), SSL, and others. Make note of this, as it should be mentioned in your reports.Step 4: Identifying Security IssuesYou have a suite of security tools, techniques, and procedures that can be used to assess the security posture of your organization's network in a SAR.Now it's time to identify the security issues in your organization's networks. You have already used password cracking tools to crack weak and vulnerable passwords. Provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization?Step 5: Firewalls and EncryptionNext, examine these resources on firewalls and auditing–RDBMS related to the use of the Relational Database Management System (i.e., the database system and data) RDBMS. Also review these resources related to access control. Determine the role of firewalls and encryption, and auditing – RDBMS that could assist in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems.Reflect any weaknesses found in the network and information system diagrams previously created, as well as in the developing SAR.Step 6: Threat IdentificationYou know of the weaknesses in your organization's network and information system. Now you will determine various known threats to the organization's network architecture and IT assets.Get acquainted with the following types of threats and attack techniques. Which are a risk to your organization?IP address spoofing/cache poisoning attacksdenial of service attacks (DoS)packet analysis/sniffingsession hijacking attacksdistributed denial of service attacksIn identifying the different threats, complete the following tasks:Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems and the types of remediation and mitigation techniques available in your industry, and for your organization.Identify the purpose and function of firewalls for organization network systems, and how they address the threats and vulnerabilities you have identified.Also discuss the value of using access control, database transaction and firewall log files.Identify the purpose and function of encryption, as it relates to files and databases and other information assets on the organization's networks.Include these in the SAR.Step 7: Network AnalysisNote: You will utilize the tools in Workspace for this step.You will now investigate network traffic, and the security of the network and information system infrastructure overall. Past network data has been logged and stored, as collected by a network analyzer tool such as Wireshark.Select the following link to enter Workspace and complete the lab activities related to network vulnerabilities.Perform a network analysis on the Wireshark files provided to you in Workspace and assess the network posture and any vulnerability or suspicious information you are able to obtain. Include this information in the SAR. Further analyze the packet capture for network performance, behavior, and any suspicious source and destination addresses on the networks.In the previously created Wireshark files, identify if any databases had been accessed. What are the IP addresses associated with that activity? Include this information in the SAR.Step 8: Suspicious ActivityNote: You will utilize the tools in Workspace for this step.Hackers frequently scan the Internet for computers or networks to exploit. An effective firewall can prevent hackers from detecting the existence of networks. Hackers continue to scan ports, but if the hacker finds there is no response from the port and no connection, the hacker will move on. The firewall can block unwanted traffic and NMap can be used to self-scan to test the responsiveness of the organization's network to would-be hackers.Select the following link to enter Workspace and conduct the port scanning. Provide your findings in the SAR deliverable. Provide analyses of the scans and any recommendation for remediation, if needed. Identify any suspicious activity and formulate the steps in an incidence response that could have been, or should be, enacted. Include the responsible parties that would provide that incidence response and any follow-up activity. Include this in the SAR. Please note that some scanning tools are designed to be undetectable. While running the scan and observing network activity with Wireshark, attempt to determine the detection of the scan in progress. If you cannot identify the scan as it is occurring, indicate this in your SAR.Step 9: Risk and RemediationWhat is the risk and what is the remediation? What is the security exploitation? You can use the OPM OIG Final Audit Report findings and recommendations as a possible source for methods to remediate vulnerabilities.Read this risk assessment resource to get familiar with the process, then prepare the risk assessment. Be sure to first list the threats, then the vulnerabilities, and then pairwise comparisons for each threat and vulnerability, and determine the likelihood of that event occurring, and the level of impact it would have on the organization. Use the OPM OIG Final Audit Report findings as a possible source for potential mitigations. Include this in the risk assessment report (RAR).Step 10: Creating the SAR and RARYour research and Workspace exercise have led you to this moment: creating your SAR and RAR. Consider what you have learned in the previous steps as you create your reports for leadership.Prepare a Security Assessment Report (SAR) with the following sections:PurposeOrganizationScopeMethodologyDataResultsFindingsThe final SAR does not have to stay within this framework, and can be designed to fulfill the goal of the security assessment.Prepare a Risk Assessment Report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation. Devise a high-level plan of action with interim milestones (POAM), in a system methodology, to remedy your findings. Include this high-level plan in the RAR. Summarize the results you obtained from the vulnerability assessment tools (i.e., MBSA and OpenVas) in your report.The deliverables for this project are as follows:Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.Submit your deliverables to the assignment folder.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system's internal operations and interactions with other systems and knowledge of stan5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.
CSIA 310 6381 University of Maryland Why do we need OPSEC for the Test Range HW
Why does Sifers-Grayson need OPSEC -- especially at the test range?This question is expected to be asked at the morning me ...
CSIA 310 6381 University of Maryland Why do we need OPSEC for the Test Range HW
Why does Sifers-Grayson need OPSEC -- especially at the test range?This question is expected to be asked at the morning meeting with the Sifers-Grayson executives. As a Nofsinger consultant, it's your job to have an answer ready. You should focus on identifying critical information & potential sources of threats, e.g. a hacker getting into the RF transmission streams and taking over a test vehicle. (See attached diagram of the test range & communications between it and the Engineering R&D Center.) prepare a 3 to 5 paragraph "talking points" paper that your team leader can use to respond. Use at least 3 authoritative sources in your response and document those sources using a reference list at the end of your posting.
NU Arithmetic & Vector Operations Recycle Rule for Adding & Subtracting R Programming
Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For th ...
NU Arithmetic & Vector Operations Recycle Rule for Adding & Subtracting R Programming
Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding and subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or R Studio). Enter code that handles the following (show all code, comment for each code line and the computed results in your screen shots):Screen shot 1: Arithmetic Operationsassign a value of 144 to xassign a value of 6 to yadd x and ysubtract y from xmultiply x times ydivide x by yfind the square root of xScreen shot 2: Operations on vectorscreate a vector (afc) and assign values 2,6,3create a vector (nfc) and assign values 6,4,2add afc and nfcScreen shot 3: Recycle Rule for adding and subtracting vectorsassign values 2,1,8,3 to vector xassign values 9,4 to vector yadd x to ynotice the warning message - use the Recycle Rule for adding vectors; then add x to y and show resultssubtract 1 from x - apply the Recycle Rule for subtracting vectors; thensubtract y from x and show resultsScreen shot 4: Create an S3 Class Objectcreate a list - with components: name = Your name, date = today's date, and score = score you desire on Assignment 2.name the class as "graduate student" Save the screen shots as a MS Word document (*.docx). Then, click the "Write Submission" link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the ".docx" extension to the filename.).
Boston University Digital Forensics Questions
What are some of the advantages and disadvantages of setting up a forensic workstation based on a distribution of Linux? ...
Boston University Digital Forensics Questions
What are some of the advantages and disadvantages of setting up a forensic workstation based on a distribution of Linux? What are the steps to perform an e-mail abuse investigation? What do you need to conduct an e-mail abuse investigation? What are the minimum requirements for a forensics lab? What are some of advantages and disadvantages of mobile forensic workstations implemented using laptop PCs? Describe the advantages and disadvantages of using raw format. What are the four different methods for acquiring data? Describe the steps to create an image file. What are the differences between private-sector computing investigations and investigations handled by law enforcement agencies? What is a partition? How many primary and extended partitions can a Windows Operating System have? How can you determine the type of a file? What tools are used in determining the type of a file? Describe the subfunctions of the digital evidence extraction phase. Compare and contrast hardware and software write-blockers. What are some of the techniques you can use to re-create a suspect’s disk drive? What is the main purpose of inodes in Linux? What information does an inode contain? Describe the major steps for reconstructing file fragments.
ITS 443 CSUGC Hyper V VMM Console BYOD VDI Environment & VMFS File Discussions
I attached the questions for the discussions. 500 words each minimum and at least one reference apa citation for each ques ...
ITS 443 CSUGC Hyper V VMM Console BYOD VDI Environment & VMFS File Discussions
I attached the questions for the discussions. 500 words each minimum and at least one reference apa citation for each question as well. Thank you!!
Earn money selling
your Study Documents