Description
Review the chosen exploration. Florida Keys National Marine Santuary Expedition 2008
http://sanctuaries.noaa.gov/missions/2008floridakeys/welcome.html
Develop a 10- to 12-slide Microsoft® PowerPoint® presentation.
Address the following in your presentation:
- List the basic categories of Earth’s chemical composition and physical properties, with an emphasis on how these factors relate to the ocean.
- Describe at least one of the early research theories about the origins of life on Earth.
- List the modern tools of research used in your chosen ocean exploration.
- List the goals and objectives of the mission and how it relates to the National Ocean Service’s overarching mission.
- List the areas to be explored by the mission.
- What challenges did the team encounter?
- Explain how the data was collected and what modern technologies were used.
- Explain whether the explorative mission was successful in its findings.
- How can the information gathered from the mission benefit the field of oceanography?
List major points in the slides. Include detailed explanations in the speaker notes section that correlate to each point.
Format your presentation consistent with APA guideline
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really useful study material!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Campbellsville University Federal And State Statute and Case Study
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a ...
Campbellsville University Federal And State Statute and Case Study
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
Testing Framework and Basic Security Controls
SDEV 460 – Homework 2Testing Framework and Basic Security ControlsOverview:This homework will demonstrate your knowledge ...
Testing Framework and Basic Security Controls
SDEV 460 – Homework 2Testing Framework and Basic Security ControlsOverview:This homework will demonstrate your knowledge of creating a testing framework and using thatframework to conduct some basic server and web application security controls.Assignment: Total 100 pointsUsing the readings from weeks 3 and 4 as a baseline, first develop a testing framework with these phases as guidelines for your organization or an organization you would like to work for in the future.• Before development begins• During definition and design• During development• During deployment• Maintenance and operationsYou will need to fill in the details for each phase by 1) describing what each phase encompasses and 2) 3 or more activities you will engage in for each phase. In addition, you will apply part of this framework in the phase “During development” by engaging in three tests/security controls outlined below to the existing SDEV virtual machine in the default root website.Security Controls to Test1. Fingerprint Web Server (OTG-INFO-002) Use netcat, httprint or other tool to discover the web server software vendor and release. Show output of the tool output. Perform online research about the discovered software vendor and release. Report upon documented vulnerabilities with the release. Report upon how you would mitigate any documented vulnerabilities.2. Review webpage comments and metadata for information leakage (OTG-INFO-005). Manually review the sample HTML applications in the Apache Web Server directories Based upon online research, what are three or more categories of information that would be considered information leakage that is not acceptable? Review the web site to see if there is information leakage in the SDEV information. Report upon what you have discovered and your method of discovery.3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the virtualmachine. Use Netcat or other tool against this SDEV site. What HTTP methods are enabled and disabled on this site? Show the output of your tool indicating the HTTP methods. Which methods (and why) have potentially pose a security risk for a web application. Describehow these pose a risk.Site Configuration:Note: The SDEV Virtual Machine you downloaded and used for SDEV 300. The URL is here if you need to download it again: https://citeapps.umuc.edu/SDEV/The VM runs on the latest version of Oracle Virtual Box. Also review the instructions for installing and configuring the VM and application under the “Course Materials” section of the course portal. It also contains the necessary password(s) to login as well.Deliverables:You should submit your source testing framework document along with the results testing the threesecurity controls listed above. Screen captures should be clearly labeled indicating exactly what the screen capture represents. Your document should be well-organized, include page numbers, include all references used and contain minimal spelling and grammatical errors.Grading Rubric:AttributeMeetsDoes not meetTesting Framework50 pointsDevelops and fills in details for the “before development begins” phase testing framework.(10 points)Develops and fills in details for the “during definition and design” phase testing framework.(10 points)Develops and fills in details for the “during development” phase testing framework.(10 points)Develops and fills in details for the “during deployment” phase testing framework(10 points)Develops and fills in details for the “maintenance and operations” phase testing framework.(10 points)Does not develop or fill in details for the “before development begins” phase testing framework.Does not develop or fill in details for the “during definition and design” phase testing framework.Does not develop or fill in details for the “during development” phase testing framework.Does not develop and fill in details for the “during deployment” phase testing framework.Does not develop or fill in details for the “maintenance and operations” phase testing framework.Security Controls30 pointsFingerprints Web Server (OTG-INFO-002) in the Apache Web Server main site. Identifies and researches Apache software version.(10 points)Reviews webpage comments and metadata for information leakage (OTG-INFO-005).(10 points)Tests HTTP Methods (OTG-CONFIG-006) and documents which HTTP methods are available on the virtual machine main web site. Describes risks in HTTP methods.(10 points)Does not fingerprint Web Server (OTG-INFO-002) in the Apache Web Server main site. Does not identify and research Apache software version.Does not review webpage comments and metadata for information leakage (OTG-INFO-005).Does not test HTTP Methods (OTG-CONFIG-006) and document which HTTP methods are available on the virtual machine main web site. Does not describe risks in HTTP methods.Documentation and Submission20 pointsSubmits source testing framework document.(5 points)Document includes the results from testing the three security controls listed in the instructions.(5 points)Screen captures are clearly labeled indicating exactly what the screen capture represents.(5 points)Document is well-organized, includes page numbers, includes all references used, and contains minimal spelling and grammatical errors.(5 points)Does not submits source testing framework document.Does not include the results from testing the three security controls listed in the instructions.Screen captures are not clearly labeled indicating exactly what the screen capture represents.Document is not well-organized, or include page numbers, or include all references used, and contains multiple spelling and grammatical errors.
Help Desk Case Study
A Texas law firm with 75 attorneys, 35 paralegals, 50 administrative
assistants with networked and Internet access throu ...
Help Desk Case Study
A Texas law firm with 75 attorneys, 35 paralegals, 50 administrative
assistants with networked and Internet access throughout five cities
determines that it should implement a new Help Desk department to
resolve internal IT problems. Create a RFP (Request for Proposal) on how
your organization would organize and operate this help desk.250-500 words. Include
any URLs for websites that are referenced.
Discussion
Topic: Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast ...
Discussion
Topic: Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast for humans to trucly understand the implications these advances may have. Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.
Similar Content
IT 244 Saudi Electronic University Database System for A Cancer Registry Project
College of Computing and Informatics
Project
Deadline: Sunday 12/12/2021@ 23:59
[Total Mark for this Project is 10]
Stud...
MKT University of the Cumberlands Week 9 Advantage of Censorship Discussion
The governments and people are often known not to be seeing eye-to-eye in consideration of the aspect of censorship. In ma...
CIS 435 UMBC Accessibility Code Inspection and Testing
Select one or more webpages (they can be from different websites) that contain content elements that will allow you to tes...
cloud computing
In an essay, answer the following questions based on your reading:What recruitment tools can companies use to attract, hir...
Which of the following are the four basic interaction design activities?
A.Prototyping, evaluating, establishing requirements, and designing alternatives B.Pr...
Silicon Valley University R and R studio Visual Analytics
get the structure of the gss_sm dataframe. What is the data type of race, sex, region and income? What do the levels re...
Lan Design 2 .edited
The network system is one of the essential requirements of running an institution. Some of the business settings are vulne...
Leveraging Search Technologies
- Google is one of the leading technology companies globally and the largest subsidiary - Formed in 1998 in California by ...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Campbellsville University Federal And State Statute and Case Study
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a ...
Campbellsville University Federal And State Statute and Case Study
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
Testing Framework and Basic Security Controls
SDEV 460 – Homework 2Testing Framework and Basic Security ControlsOverview:This homework will demonstrate your knowledge ...
Testing Framework and Basic Security Controls
SDEV 460 – Homework 2Testing Framework and Basic Security ControlsOverview:This homework will demonstrate your knowledge of creating a testing framework and using thatframework to conduct some basic server and web application security controls.Assignment: Total 100 pointsUsing the readings from weeks 3 and 4 as a baseline, first develop a testing framework with these phases as guidelines for your organization or an organization you would like to work for in the future.• Before development begins• During definition and design• During development• During deployment• Maintenance and operationsYou will need to fill in the details for each phase by 1) describing what each phase encompasses and 2) 3 or more activities you will engage in for each phase. In addition, you will apply part of this framework in the phase “During development” by engaging in three tests/security controls outlined below to the existing SDEV virtual machine in the default root website.Security Controls to Test1. Fingerprint Web Server (OTG-INFO-002) Use netcat, httprint or other tool to discover the web server software vendor and release. Show output of the tool output. Perform online research about the discovered software vendor and release. Report upon documented vulnerabilities with the release. Report upon how you would mitigate any documented vulnerabilities.2. Review webpage comments and metadata for information leakage (OTG-INFO-005). Manually review the sample HTML applications in the Apache Web Server directories Based upon online research, what are three or more categories of information that would be considered information leakage that is not acceptable? Review the web site to see if there is information leakage in the SDEV information. Report upon what you have discovered and your method of discovery.3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the virtualmachine. Use Netcat or other tool against this SDEV site. What HTTP methods are enabled and disabled on this site? Show the output of your tool indicating the HTTP methods. Which methods (and why) have potentially pose a security risk for a web application. Describehow these pose a risk.Site Configuration:Note: The SDEV Virtual Machine you downloaded and used for SDEV 300. The URL is here if you need to download it again: https://citeapps.umuc.edu/SDEV/The VM runs on the latest version of Oracle Virtual Box. Also review the instructions for installing and configuring the VM and application under the “Course Materials” section of the course portal. It also contains the necessary password(s) to login as well.Deliverables:You should submit your source testing framework document along with the results testing the threesecurity controls listed above. Screen captures should be clearly labeled indicating exactly what the screen capture represents. Your document should be well-organized, include page numbers, include all references used and contain minimal spelling and grammatical errors.Grading Rubric:AttributeMeetsDoes not meetTesting Framework50 pointsDevelops and fills in details for the “before development begins” phase testing framework.(10 points)Develops and fills in details for the “during definition and design” phase testing framework.(10 points)Develops and fills in details for the “during development” phase testing framework.(10 points)Develops and fills in details for the “during deployment” phase testing framework(10 points)Develops and fills in details for the “maintenance and operations” phase testing framework.(10 points)Does not develop or fill in details for the “before development begins” phase testing framework.Does not develop or fill in details for the “during definition and design” phase testing framework.Does not develop or fill in details for the “during development” phase testing framework.Does not develop and fill in details for the “during deployment” phase testing framework.Does not develop or fill in details for the “maintenance and operations” phase testing framework.Security Controls30 pointsFingerprints Web Server (OTG-INFO-002) in the Apache Web Server main site. Identifies and researches Apache software version.(10 points)Reviews webpage comments and metadata for information leakage (OTG-INFO-005).(10 points)Tests HTTP Methods (OTG-CONFIG-006) and documents which HTTP methods are available on the virtual machine main web site. Describes risks in HTTP methods.(10 points)Does not fingerprint Web Server (OTG-INFO-002) in the Apache Web Server main site. Does not identify and research Apache software version.Does not review webpage comments and metadata for information leakage (OTG-INFO-005).Does not test HTTP Methods (OTG-CONFIG-006) and document which HTTP methods are available on the virtual machine main web site. Does not describe risks in HTTP methods.Documentation and Submission20 pointsSubmits source testing framework document.(5 points)Document includes the results from testing the three security controls listed in the instructions.(5 points)Screen captures are clearly labeled indicating exactly what the screen capture represents.(5 points)Document is well-organized, includes page numbers, includes all references used, and contains minimal spelling and grammatical errors.(5 points)Does not submits source testing framework document.Does not include the results from testing the three security controls listed in the instructions.Screen captures are not clearly labeled indicating exactly what the screen capture represents.Document is not well-organized, or include page numbers, or include all references used, and contains multiple spelling and grammatical errors.
Help Desk Case Study
A Texas law firm with 75 attorneys, 35 paralegals, 50 administrative
assistants with networked and Internet access throu ...
Help Desk Case Study
A Texas law firm with 75 attorneys, 35 paralegals, 50 administrative
assistants with networked and Internet access throughout five cities
determines that it should implement a new Help Desk department to
resolve internal IT problems. Create a RFP (Request for Proposal) on how
your organization would organize and operate this help desk.250-500 words. Include
any URLs for websites that are referenced.
Discussion
Topic: Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast ...
Discussion
Topic: Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast for humans to trucly understand the implications these advances may have. Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.
Earn money selling
your Study Documents