Description
Unformatted Attachment Preview
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Super useful! Studypool never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ERD diagram - Tiny College Case study
The administrators of Tiny College are so pleased with your design and implementation of their student registration and tr ...
ERD diagram - Tiny College Case study
The administrators of Tiny College are so pleased with your design and implementation of their student registration and tracking system that they want you to expand the design to include the database for their motor vehicle pool. A brief description of operations follows:Faculty members may use the vehicles owned by Tiny College for officially sanctioned travel. For example, the vehicles may be used by faculty members to travel to off-campus learning centers, to travel to locations at which research papers are presented, to transport students to officially sanctioned locations, and to travel for public service purposes. The vehicles used for such purposes are managed by Tiny College’s Travel Far But Slowly (TFBS) Center.Using reservation forms, each department can reserve vehicles for its faculty, who are responsible for filling out the appropriate trip completion form at the end of a trip. The reservation form includes the expected departure date, vehicle type required, destination, and name of the authorized faculty member. The faculty member who picks up a vehicle must sign a checkout form to log out the vehicle and pick up a trip completion form. (The TFBS employee who releases the vehicle for use also signs the checkout form.) The faculty member’s trip completion form includes the faculty member’s identification code, the vehicle’s identification, the odometer readings at the start and end of the trip, maintenance complaints (if any), gallons of fuel purchased (if any), and the Tiny College credit card number used to pay for the fuel. If fuel is purchased, the credit card receipt must be stapled to the trip completion form. Upon receipt of the trip completion form, the faculty member’s department is billed at a mileage rate based on the vehicle type used: sedan, station wagon, panel truck, minivan, or minibus. (Hint: Do not use more entities than are necessary. Remember the difference between attributes and entities!)All vehicle maintenance is performed by TFBS. Each time a vehicle requires maintenance, a maintenance log entry is completed on a prenumbered maintenance log form. The maintenance log form includes the vehicle identification, brief description of the type of maintenance required, initial log entry date, date the maintenance was completed, and name of the mechanic who released the vehicle back into service. (Only mechanics who have an inspection authorization may release a vehicle back into service.)As soon as the log form has been initiated, the log form’s number is transferred to a maintenance detail form; the log form’s number is also forwarded to the parts department manager, who fills out a parts usage form on which the maintenance log number is recorded. The maintenance detail form contains separate lines for each maintenance item performed, for the parts used, and for identification of the mechanic who performed the maintenance. When all maintenance items have been completed, the maintenance detail form is stapled to the maintenance log form, the maintenance log form’s completion date is filled out, and the mechanic who releases the vehicle back into service signs the form. The stapled forms are then filed, to be used later as the source for various maintenance reports.TFBS maintains a parts inventory, including oil, oil filters, air filters, and belts of various types. The parts inventory is checked daily to monitor parts usage and to reorder parts that reach the “minimum quantity on hand” level. To track parts usage, the parts manager requires each mechanic to sign out the parts that are used to perform each vehicle’s maintenance; the parts manager records the maintenance log number under which the part is used.Each month TFBS issues a set of reports. The reports include the mileage driven by vehicle, by department, and by faculty members within a department. In addition, various revenue reports are generated by vehicle and department. A detailed parts usage report is also filed each month. Finally, a vehicle maintenance summary is created each month.Given that brief summary of operations, draw the appropriate (and fully labeled) ERD. Use the Crow’s foot methodology to indicate entities, relationships, connectivities, and participations. You can use either Microsoft Visio or Vertabelo to draw and export the ERD. To upload and submit your assignment, click the submission button below to find and select your saved document. Make sure that the file is saved with your last name in the file name. (Example: case1_Jones.pdf or case1_Jones.jpg)
The Need for Project Management Office Written Response Paper
Perhaps more than any other of the knowledge areas, integration management is of primary importance to the project manager ...
The Need for Project Management Office Written Response Paper
Perhaps more than any other of the knowledge areas, integration management is of primary importance to the project manager (or project manager staff). Coordination is the hallmark of integration management. As far as the project manager is concerned, process facility, analytic skills, and domain experiences are certainly important. The project manager is still only as effective as his or her soft skills and his or her relationships with the stakeholders.
Your company intends to form a project management office (PMO), hoping to benefit from the ability to promulgate good project management practices to both in-house and customer-facing projects. Your company expects that the office will contribute to more efficient coordination of resources among projects, maximizing the exploitation of the resources and providing a dependable window into project performance. They also intend to apply resources to the management of the capability maturity of its detailing your recommendations for the organizational architecture and strategy of the PMO.
In a 1-2 page response, answer the following:
With respect to cultivating stronger projects, what important issues should it address, and how?
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that o ...
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that offers checking, savings, and investment banking services.The company collects, processes, and maintains a large database of private financial information for both consumer and business accounts.The data is maintained on a local server.The company must comply with the Federal Trade Commission's Gramm-Leach-Bliley Act (GLBA), which requires that financial institutions explain their information-sharing practices to their customers and protect sensitive data.In an effort to mitigate network attacks and meet federal compliance, Credico Inc. developed an efficient log management program that performs:Log size management using logrotate.Log auditing with auditd to track events, record the events, detect abuse or unauthorized activity, and create custom reports.These tools, in addition to archives, backups, scripting, and task automation, contribute to a fully comprehensive log management system.You will expand and enhance this log management system by learning new tools, adding advanced features, and researching additional concepts.Lab EnvironmentTo set up your lab environment with the necessary files, complete the following steps.Log into your local virtual machine. Use the following credentials:Username: sysadminPassword: cybersecurityOpen the terminal within your Ubuntu VM by pressing Ctrl+Alt+T for Windows users or Ctrl+Options+T for Mac users.Alternatively, press Windows+A (Command+A for Mac users), type "Terminal" in the search bar, and select the terminal icon (not the Xfce Terminal icon).Create a directory called Projects in your /home/sysadmin/ directory.Download the following file (you can either slack it to yourself or use the Firefox browser in your Ubuntu machine), and move it to your ~/Projects directory before you get started:TarDocs.tarInstructionsAs you solve each step below, please fill out the Submission File. This will be your homework deliverable.In each of the following sections, you will use and build on your system administration tools and knowledge. Make sure to read the instructions carefully.Step 1: Create, Extract, Compress, and Manage tar Backup ArchivesCreating tar archives is something you must do everyday in your role at Credico Inc. In this section, you will extract and exclude specific files and directories to help speed up your workflow.To get started, navigate to the ~/Projects directory where your downloaded TarDocs.tar archive file should be.Extract the TarDocs.tar archive file into the current directory (~/Projects). Afterwards, list the directory's contents with ls to verify that you have extracted the archive properly.Note that because we want to preserve the directory structure of our archive, we do not have to specify a target directory to extract to.Note that when you run ls you should see a new ~/Projects/TarDocs directory with five new subdirectories under TarDocs/.Verify that there is a Java subdirectory in the TarDocs/Documents folder by running: ls -l ~/Projects/TarDocs/Documents/.Create a tar archive called Javaless_Docs.tar that excludes the Java directory from the newly extracted TarDocs/Document/ directory.If you've executed this command properly, you should have a Javaless_Docs.tar archive in the ~/Projectsfolder.Verify that this new Javaless_Docs.tar archive does not contain the Java subdirectory by using tar to list the contents of Javaless_Docs.tar and then piping grep to search for Java.BonusCreate an incremental archive called logs_backup.tar.gz that contains only changed files by examining the snapshot.file for the /var/log directory. You will need sudo for this command.Step 2: Create, Manage, and Automate Cron JobsIn response to a ransomware attack, you have been tasked with creating an archiving and backup scheme to mitigate against CryptoLocker malware. This attack would encrypt the entire server’s hard disk and can only be unlocked using a 256-bit digital key after a Bitcoin payment is delivered.For this task, you'll need to create an archiving cron job using the following specifications:This cron job should create an archive of the following file: /var/log/auth.log.The filename and location of the archive should be: /auth_backup.tgz.The archiving process should be scheduled to run every Wednesday at 6 a.m.Use the correct archiving zip option to compress the archive using gzip.To get started creating cron jobs, run the command crontab -e. Make sure that your cron job line includes the following:The schedule (minute, hour, etc.) in cron format. - Hint: Reference the helpful site crontab.guru as needed.An archive (tar) command with three options.The path to save the archive toThe path of the file to archive.Step 3: Write Basic Bash ScriptsPortions of the Gramm-Leach-Bliley Act require organizations to maintain a regular backup regimen for the safe and secure storage of financial data.You'll first need to set up multiple backup directories. Each directory will be dedicated to housing text files that you will create with different kinds of system information.For example, the directory freemem will be used to store free memory system information files.Using brace expansion, create the following four directories:~/backups/freemem~/backups/diskuse~/backups/openlist~/backups/freediskNote: Remember that brace expansion uses the following format: ~/exampledirectory/{subdirectory1,subdirectory2,etc}Now you will create a script that will execute various Linux tools to parse information about the system. Each of these tools should output results to a text file inside its respective system information directory.For example: cpu_usage_tool > ~/backups/cpuuse/cpu_usage.txtIn the above example, the cpu_usage_tool command will output CPU usage information into a cpu_usage.txt file.To get started with setting up your script up in your home directory, do the following:Navigate to your home directory by running: cd ~/Run the command nano system.sh to open a new Nano window.Note: If you're unsure how to get started, we included a system.sh starter file. Use that as a guide.Edit the system.sh script file so that it that does the following:Prints the amount of free memory on the system and saves it to ~/backups/freemem/free_mem.txt.Prints disk usage and saves it to ~/backups/diskuse/disk_usage.txt.Lists all open files and saves it to ~/backups/openlist/open_list.txt.Prints file system disk space statistics and saves it to ~/backups/freedisk/free_disk.txt.Note: For the free memory, disk usage, and free disk commands, make sure you use the -h option to make the output human-readable.Save this file and make sure to change or modify the system.sh file permissions so that it is executable.You should now have an executable system.sh file within your home ~/ directory.Test the script with sudo ./system.sh.Note: If it appears, ignore the warning: lsof: WARNING: can't stat() fuse.gvfsd-fuse file system /run/user/1001/gvfs Output information may be incomplete.OptionalConfirm the script ran properly by navigating to any of subdirectories in the ~/backup/ directory and using cat <filename> to view the contents of the backup files.BonusAutomate your script system.sh by adding it to the weekly system-wide cron directory.Step 4. Manage Log File SizesYou realize that the spam messages are making the size of the log files unmanageable.You’ve decided to implement log rotation in order to preserve log entries and keep log file sizes more manageable. You’ve also chosen to compress logs during rotation to preserve disk space and lower costs.Run sudo nano /etc/logrotate.conf to edit the logrotate config file. You don't need to work out of any specific directory as you are using the full configuration file path.Configure a log rotation scheme that backs up authentication messages to the /var/log/auth.log directory using the following settings:Rotates weekly.Rotates only the seven most recent logs.Does not rotate empty logs.Delays compression.Skips error messages for missing logs and continues to next log.Don't forget to surround your rotation rules with curly braces {}.Bonus: Check for Policy and File ViolationsIn an effort to help mitigate against future attacks, you have decided to create an event monitoring system that specifically generates reports whenever new accounts are created or modified, and when any modifications are made to authorization logs.Verify the auditd service is active using the systemctl command.Run sudo nano /etc/audit/auditd.conf to edit the auditd config file using the following parameters. You can run this command from anywhere using the terminal.Number of retained logs is seven.Maximum log file size is 35.Next, run sudo nano /etc/audit/rules.d/audit.rules to edit the rules for auditd. Create rules that watch the following paths:For /etc/shadow, set wra for the permissions to monitor and set the keyname for this rule to hashpass_audit.For /etc/passwd, set wra for the permissions to monitor and set the keyname for this rule to userpass_audit.For /var/log/auth.log, set wra for the permissions to monitor and set the keyname for this rule to authlog_audit.Restart the auditd daemon.Perform a listing that reveals all existing auditd rules.Note: If you're unsure how to construct these rules, refer to the auditd section within the 5.3 Student Guide.Using sudo, produce an audit report that returns results for all user authentications.Note: You will need to log out and back in to populate the report.Now you will shift into hacker mode. Create a user with sudo useradd attacker and produce an audit report that lists account modifications.Use auditctl to add another rule that watches the /var/log/cron directory.Perform a listing that reveals changes to the auditd rules took affect.Bonus (Reasearch Activity): Perform Various Log Filtering TechniquesThere was a suspicious login from a host on the network during the early morning hours when the office was closed. The senior security manager tasked you with filtering through log files to determine if a system breach occurred.For the bonus, write the journactl commands, for each use case below.Hint: Remember that journal tracks each log relative to each system boot. Also, keep in mind that you can sort messages by priority, relative boot, and specific units.Write the journalctl command that performs a log search that returns all messages, with priorities from emergency to error, since the current system boot.Write the journalctl command that checks the disk usage of the system journal unit since the most recent boot. You will likely have to pipe this output to less if it doesn't fit on the screen.The unit you want is systemd-journald.Write the journalctl command that removes all archived journal files except the most recent two.Write the journalctl command that filters all log messages with priority levels between zero and two, and save the results to a file named Priority_High.txt in /home/student/ directory.Automate the last task by creating a cron job that runs daily in the user crontab.Note: You'll need sudo to run journalctl.
Columbia Southern University Collaboration Information System Presentation
InstructionsIn this assignment, you will create a presentation for your organization to explain how successful collaborati ...
Columbia Southern University Collaboration Information System Presentation
InstructionsIn this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages.Scenario: Your organization has used a variety of collaboration systems developed by some project managers. Some of these systems were successful while others were not. Your organization has one unique challenge—many of your employees are staffed at other locations or work from home (telework). You would like to standardize the collaboration process to improve team communication for all company projects. In your presentation, you should include the elements listed below.Explain why collaboration information systems (IS) are important from the organization’s perspective.Discuss how collaboration tools can improve team communication.Identify three tools that will be used for synchronous communications and three tools that will be used for asynchronous communications. Be sure to explain why you made these choices.Describe how project files, such as Microsoft (MS) Word, MS Excel, MS Project, and MS Visio, will be shared with team members. Be sure to explain the rationale behind your choice.Explain how the task list for managing tasks will be shared with team members. Be sure to explain the rationale behind your choice.Discuss how this new collaboration IS could provide competitive advantages for your organization.Your presentation should be a minimum of six slides in length (not counting the title and reference slides). Use of images, graphics, and diagrams is encouraged.You can use an industry of your choosing or examples from your personal or professional experiences in developing this assignment. You can also use the resources in the Unit II Suggested Reading section to assist you with this assignment.Be sure to follow the 7x7 rule (i.e., there should be no more than 7 words per line and no more than 7 lines per slide). You are required to use speaker notes to discuss the bullet points on your slides. You must use at least two academic resources to support your presentation, and you must cite (in APA format) any information on your slides or in your speaker notes that came from these sources
San Jose State University Mobility XE Case Study
Read the Case Study and answer the "Discussion Points" in a clear but concise way. Be sure to reference all sources cited ...
San Jose State University Mobility XE Case Study
Read the Case Study and answer the "Discussion Points" in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout.Discussion Questions 1. Visit the NetMotion Web site (www.netmotionwireless.com) and access
and read other Mobility XE success stories. Discuss the patterns that
can be observed in the benefits that Mobility XE users have realized via
its deployment and use. 2. Do some Internet research on the security implications of HIPPA
requirements for hospital networks. Discuss the major types of
security mechanisms that must be in place to ensure hospital
compliance with HIPPA requirements. 3. Do some Internet research on the use of VLANs in hospitals.
Summarize the benefits of using VLANs in hospitals and identify
examples of how St. Luke’s could further enhance its wireless network
by implementing VLANs.2 pages minimum plz, citations and references plz no plagiarism.
Similar Content
Anne Arundel Community College Quadrilateral Java Class Program
The first document will be your UML class diagram of the class Quadrilateral.The second document will be your Quadrilat...
UDM Displays in The Terminal Window a Circular Ring Python Code
In Python :Write a program that displays in the terminal window a circular ring knowing its inner and outer inner radius a...
Central Michigan University SQL Server Management Studio 2018 Project
/* Insert TABLE PERSONNEL */
insert into PERSONNEL values ('MC01', 'Mars', default, 'Crystal', '480-555-8997', '3-Jun-13',...
Central Michigan University Cost and Time Project Management Success Discussion
Available online at www.sciencedirect.com
ScienceDirect
International Journal of Project Management 35 (2017) 1608 – 16...
Data Integration Product Costs Report
You are to use the tables found in “Orders - Data Integration.csv” and “Product Costs - Data Integration.csv” to g...
BMED 4300 UVU Mod 7 Programming in The Python Language Project
Let's get familiar with programming in the Python language! I love programming... the challenges and hard-earned victories...
Living In Flv.edited
1. Is it more expensive or less expensive to live in FL or NY? The graph below shows the average cost of living for both F...
R Hw
Using the equations from above in the R code we get the following Using the linear interpolation on the given values of ...
Lab4
Reads in and stores sales for each of 5 salespeople. Displays sales entered by salesperson id and total sales for all sale...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ERD diagram - Tiny College Case study
The administrators of Tiny College are so pleased with your design and implementation of their student registration and tr ...
ERD diagram - Tiny College Case study
The administrators of Tiny College are so pleased with your design and implementation of their student registration and tracking system that they want you to expand the design to include the database for their motor vehicle pool. A brief description of operations follows:Faculty members may use the vehicles owned by Tiny College for officially sanctioned travel. For example, the vehicles may be used by faculty members to travel to off-campus learning centers, to travel to locations at which research papers are presented, to transport students to officially sanctioned locations, and to travel for public service purposes. The vehicles used for such purposes are managed by Tiny College’s Travel Far But Slowly (TFBS) Center.Using reservation forms, each department can reserve vehicles for its faculty, who are responsible for filling out the appropriate trip completion form at the end of a trip. The reservation form includes the expected departure date, vehicle type required, destination, and name of the authorized faculty member. The faculty member who picks up a vehicle must sign a checkout form to log out the vehicle and pick up a trip completion form. (The TFBS employee who releases the vehicle for use also signs the checkout form.) The faculty member’s trip completion form includes the faculty member’s identification code, the vehicle’s identification, the odometer readings at the start and end of the trip, maintenance complaints (if any), gallons of fuel purchased (if any), and the Tiny College credit card number used to pay for the fuel. If fuel is purchased, the credit card receipt must be stapled to the trip completion form. Upon receipt of the trip completion form, the faculty member’s department is billed at a mileage rate based on the vehicle type used: sedan, station wagon, panel truck, minivan, or minibus. (Hint: Do not use more entities than are necessary. Remember the difference between attributes and entities!)All vehicle maintenance is performed by TFBS. Each time a vehicle requires maintenance, a maintenance log entry is completed on a prenumbered maintenance log form. The maintenance log form includes the vehicle identification, brief description of the type of maintenance required, initial log entry date, date the maintenance was completed, and name of the mechanic who released the vehicle back into service. (Only mechanics who have an inspection authorization may release a vehicle back into service.)As soon as the log form has been initiated, the log form’s number is transferred to a maintenance detail form; the log form’s number is also forwarded to the parts department manager, who fills out a parts usage form on which the maintenance log number is recorded. The maintenance detail form contains separate lines for each maintenance item performed, for the parts used, and for identification of the mechanic who performed the maintenance. When all maintenance items have been completed, the maintenance detail form is stapled to the maintenance log form, the maintenance log form’s completion date is filled out, and the mechanic who releases the vehicle back into service signs the form. The stapled forms are then filed, to be used later as the source for various maintenance reports.TFBS maintains a parts inventory, including oil, oil filters, air filters, and belts of various types. The parts inventory is checked daily to monitor parts usage and to reorder parts that reach the “minimum quantity on hand” level. To track parts usage, the parts manager requires each mechanic to sign out the parts that are used to perform each vehicle’s maintenance; the parts manager records the maintenance log number under which the part is used.Each month TFBS issues a set of reports. The reports include the mileage driven by vehicle, by department, and by faculty members within a department. In addition, various revenue reports are generated by vehicle and department. A detailed parts usage report is also filed each month. Finally, a vehicle maintenance summary is created each month.Given that brief summary of operations, draw the appropriate (and fully labeled) ERD. Use the Crow’s foot methodology to indicate entities, relationships, connectivities, and participations. You can use either Microsoft Visio or Vertabelo to draw and export the ERD. To upload and submit your assignment, click the submission button below to find and select your saved document. Make sure that the file is saved with your last name in the file name. (Example: case1_Jones.pdf or case1_Jones.jpg)
The Need for Project Management Office Written Response Paper
Perhaps more than any other of the knowledge areas, integration management is of primary importance to the project manager ...
The Need for Project Management Office Written Response Paper
Perhaps more than any other of the knowledge areas, integration management is of primary importance to the project manager (or project manager staff). Coordination is the hallmark of integration management. As far as the project manager is concerned, process facility, analytic skills, and domain experiences are certainly important. The project manager is still only as effective as his or her soft skills and his or her relationships with the stakeholders.
Your company intends to form a project management office (PMO), hoping to benefit from the ability to promulgate good project management practices to both in-house and customer-facing projects. Your company expects that the office will contribute to more efficient coordination of resources among projects, maximizing the exploitation of the resources and providing a dependable window into project performance. They also intend to apply resources to the management of the capability maturity of its detailing your recommendations for the organizational architecture and strategy of the PMO.
In a 1-2 page response, answer the following:
With respect to cultivating stronger projects, what important issues should it address, and how?
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that o ...
Lewis University Credico Inc Log Management Program Project
ScenarioFor this assignment, you will play the role of a security analyst for Credico Inc., a financial institution that offers checking, savings, and investment banking services.The company collects, processes, and maintains a large database of private financial information for both consumer and business accounts.The data is maintained on a local server.The company must comply with the Federal Trade Commission's Gramm-Leach-Bliley Act (GLBA), which requires that financial institutions explain their information-sharing practices to their customers and protect sensitive data.In an effort to mitigate network attacks and meet federal compliance, Credico Inc. developed an efficient log management program that performs:Log size management using logrotate.Log auditing with auditd to track events, record the events, detect abuse or unauthorized activity, and create custom reports.These tools, in addition to archives, backups, scripting, and task automation, contribute to a fully comprehensive log management system.You will expand and enhance this log management system by learning new tools, adding advanced features, and researching additional concepts.Lab EnvironmentTo set up your lab environment with the necessary files, complete the following steps.Log into your local virtual machine. Use the following credentials:Username: sysadminPassword: cybersecurityOpen the terminal within your Ubuntu VM by pressing Ctrl+Alt+T for Windows users or Ctrl+Options+T for Mac users.Alternatively, press Windows+A (Command+A for Mac users), type "Terminal" in the search bar, and select the terminal icon (not the Xfce Terminal icon).Create a directory called Projects in your /home/sysadmin/ directory.Download the following file (you can either slack it to yourself or use the Firefox browser in your Ubuntu machine), and move it to your ~/Projects directory before you get started:TarDocs.tarInstructionsAs you solve each step below, please fill out the Submission File. This will be your homework deliverable.In each of the following sections, you will use and build on your system administration tools and knowledge. Make sure to read the instructions carefully.Step 1: Create, Extract, Compress, and Manage tar Backup ArchivesCreating tar archives is something you must do everyday in your role at Credico Inc. In this section, you will extract and exclude specific files and directories to help speed up your workflow.To get started, navigate to the ~/Projects directory where your downloaded TarDocs.tar archive file should be.Extract the TarDocs.tar archive file into the current directory (~/Projects). Afterwards, list the directory's contents with ls to verify that you have extracted the archive properly.Note that because we want to preserve the directory structure of our archive, we do not have to specify a target directory to extract to.Note that when you run ls you should see a new ~/Projects/TarDocs directory with five new subdirectories under TarDocs/.Verify that there is a Java subdirectory in the TarDocs/Documents folder by running: ls -l ~/Projects/TarDocs/Documents/.Create a tar archive called Javaless_Docs.tar that excludes the Java directory from the newly extracted TarDocs/Document/ directory.If you've executed this command properly, you should have a Javaless_Docs.tar archive in the ~/Projectsfolder.Verify that this new Javaless_Docs.tar archive does not contain the Java subdirectory by using tar to list the contents of Javaless_Docs.tar and then piping grep to search for Java.BonusCreate an incremental archive called logs_backup.tar.gz that contains only changed files by examining the snapshot.file for the /var/log directory. You will need sudo for this command.Step 2: Create, Manage, and Automate Cron JobsIn response to a ransomware attack, you have been tasked with creating an archiving and backup scheme to mitigate against CryptoLocker malware. This attack would encrypt the entire server’s hard disk and can only be unlocked using a 256-bit digital key after a Bitcoin payment is delivered.For this task, you'll need to create an archiving cron job using the following specifications:This cron job should create an archive of the following file: /var/log/auth.log.The filename and location of the archive should be: /auth_backup.tgz.The archiving process should be scheduled to run every Wednesday at 6 a.m.Use the correct archiving zip option to compress the archive using gzip.To get started creating cron jobs, run the command crontab -e. Make sure that your cron job line includes the following:The schedule (minute, hour, etc.) in cron format. - Hint: Reference the helpful site crontab.guru as needed.An archive (tar) command with three options.The path to save the archive toThe path of the file to archive.Step 3: Write Basic Bash ScriptsPortions of the Gramm-Leach-Bliley Act require organizations to maintain a regular backup regimen for the safe and secure storage of financial data.You'll first need to set up multiple backup directories. Each directory will be dedicated to housing text files that you will create with different kinds of system information.For example, the directory freemem will be used to store free memory system information files.Using brace expansion, create the following four directories:~/backups/freemem~/backups/diskuse~/backups/openlist~/backups/freediskNote: Remember that brace expansion uses the following format: ~/exampledirectory/{subdirectory1,subdirectory2,etc}Now you will create a script that will execute various Linux tools to parse information about the system. Each of these tools should output results to a text file inside its respective system information directory.For example: cpu_usage_tool > ~/backups/cpuuse/cpu_usage.txtIn the above example, the cpu_usage_tool command will output CPU usage information into a cpu_usage.txt file.To get started with setting up your script up in your home directory, do the following:Navigate to your home directory by running: cd ~/Run the command nano system.sh to open a new Nano window.Note: If you're unsure how to get started, we included a system.sh starter file. Use that as a guide.Edit the system.sh script file so that it that does the following:Prints the amount of free memory on the system and saves it to ~/backups/freemem/free_mem.txt.Prints disk usage and saves it to ~/backups/diskuse/disk_usage.txt.Lists all open files and saves it to ~/backups/openlist/open_list.txt.Prints file system disk space statistics and saves it to ~/backups/freedisk/free_disk.txt.Note: For the free memory, disk usage, and free disk commands, make sure you use the -h option to make the output human-readable.Save this file and make sure to change or modify the system.sh file permissions so that it is executable.You should now have an executable system.sh file within your home ~/ directory.Test the script with sudo ./system.sh.Note: If it appears, ignore the warning: lsof: WARNING: can't stat() fuse.gvfsd-fuse file system /run/user/1001/gvfs Output information may be incomplete.OptionalConfirm the script ran properly by navigating to any of subdirectories in the ~/backup/ directory and using cat <filename> to view the contents of the backup files.BonusAutomate your script system.sh by adding it to the weekly system-wide cron directory.Step 4. Manage Log File SizesYou realize that the spam messages are making the size of the log files unmanageable.You’ve decided to implement log rotation in order to preserve log entries and keep log file sizes more manageable. You’ve also chosen to compress logs during rotation to preserve disk space and lower costs.Run sudo nano /etc/logrotate.conf to edit the logrotate config file. You don't need to work out of any specific directory as you are using the full configuration file path.Configure a log rotation scheme that backs up authentication messages to the /var/log/auth.log directory using the following settings:Rotates weekly.Rotates only the seven most recent logs.Does not rotate empty logs.Delays compression.Skips error messages for missing logs and continues to next log.Don't forget to surround your rotation rules with curly braces {}.Bonus: Check for Policy and File ViolationsIn an effort to help mitigate against future attacks, you have decided to create an event monitoring system that specifically generates reports whenever new accounts are created or modified, and when any modifications are made to authorization logs.Verify the auditd service is active using the systemctl command.Run sudo nano /etc/audit/auditd.conf to edit the auditd config file using the following parameters. You can run this command from anywhere using the terminal.Number of retained logs is seven.Maximum log file size is 35.Next, run sudo nano /etc/audit/rules.d/audit.rules to edit the rules for auditd. Create rules that watch the following paths:For /etc/shadow, set wra for the permissions to monitor and set the keyname for this rule to hashpass_audit.For /etc/passwd, set wra for the permissions to monitor and set the keyname for this rule to userpass_audit.For /var/log/auth.log, set wra for the permissions to monitor and set the keyname for this rule to authlog_audit.Restart the auditd daemon.Perform a listing that reveals all existing auditd rules.Note: If you're unsure how to construct these rules, refer to the auditd section within the 5.3 Student Guide.Using sudo, produce an audit report that returns results for all user authentications.Note: You will need to log out and back in to populate the report.Now you will shift into hacker mode. Create a user with sudo useradd attacker and produce an audit report that lists account modifications.Use auditctl to add another rule that watches the /var/log/cron directory.Perform a listing that reveals changes to the auditd rules took affect.Bonus (Reasearch Activity): Perform Various Log Filtering TechniquesThere was a suspicious login from a host on the network during the early morning hours when the office was closed. The senior security manager tasked you with filtering through log files to determine if a system breach occurred.For the bonus, write the journactl commands, for each use case below.Hint: Remember that journal tracks each log relative to each system boot. Also, keep in mind that you can sort messages by priority, relative boot, and specific units.Write the journalctl command that performs a log search that returns all messages, with priorities from emergency to error, since the current system boot.Write the journalctl command that checks the disk usage of the system journal unit since the most recent boot. You will likely have to pipe this output to less if it doesn't fit on the screen.The unit you want is systemd-journald.Write the journalctl command that removes all archived journal files except the most recent two.Write the journalctl command that filters all log messages with priority levels between zero and two, and save the results to a file named Priority_High.txt in /home/student/ directory.Automate the last task by creating a cron job that runs daily in the user crontab.Note: You'll need sudo to run journalctl.
Columbia Southern University Collaboration Information System Presentation
InstructionsIn this assignment, you will create a presentation for your organization to explain how successful collaborati ...
Columbia Southern University Collaboration Information System Presentation
InstructionsIn this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages.Scenario: Your organization has used a variety of collaboration systems developed by some project managers. Some of these systems were successful while others were not. Your organization has one unique challenge—many of your employees are staffed at other locations or work from home (telework). You would like to standardize the collaboration process to improve team communication for all company projects. In your presentation, you should include the elements listed below.Explain why collaboration information systems (IS) are important from the organization’s perspective.Discuss how collaboration tools can improve team communication.Identify three tools that will be used for synchronous communications and three tools that will be used for asynchronous communications. Be sure to explain why you made these choices.Describe how project files, such as Microsoft (MS) Word, MS Excel, MS Project, and MS Visio, will be shared with team members. Be sure to explain the rationale behind your choice.Explain how the task list for managing tasks will be shared with team members. Be sure to explain the rationale behind your choice.Discuss how this new collaboration IS could provide competitive advantages for your organization.Your presentation should be a minimum of six slides in length (not counting the title and reference slides). Use of images, graphics, and diagrams is encouraged.You can use an industry of your choosing or examples from your personal or professional experiences in developing this assignment. You can also use the resources in the Unit II Suggested Reading section to assist you with this assignment.Be sure to follow the 7x7 rule (i.e., there should be no more than 7 words per line and no more than 7 lines per slide). You are required to use speaker notes to discuss the bullet points on your slides. You must use at least two academic resources to support your presentation, and you must cite (in APA format) any information on your slides or in your speaker notes that came from these sources
San Jose State University Mobility XE Case Study
Read the Case Study and answer the "Discussion Points" in a clear but concise way. Be sure to reference all sources cited ...
San Jose State University Mobility XE Case Study
Read the Case Study and answer the "Discussion Points" in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout.Discussion Questions 1. Visit the NetMotion Web site (www.netmotionwireless.com) and access
and read other Mobility XE success stories. Discuss the patterns that
can be observed in the benefits that Mobility XE users have realized via
its deployment and use. 2. Do some Internet research on the security implications of HIPPA
requirements for hospital networks. Discuss the major types of
security mechanisms that must be in place to ensure hospital
compliance with HIPPA requirements. 3. Do some Internet research on the use of VLANs in hospitals.
Summarize the benefits of using VLANs in hospitals and identify
examples of how St. Luke’s could further enhance its wireless network
by implementing VLANs.2 pages minimum plz, citations and references plz no plagiarism.
Earn money selling
your Study Documents