A 80kg skier grips a moving rope that is powered by an engine and is pulled at constant speed to the
User Generated
wqgubznf0393@lnubb.p
Science
Description
A 80
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Cell Structure, Osmosis, and Diffusion
1. Answer the following questions:a. List four cell structures that are common to both plant and animal cells. (4 points)b ...
Cell Structure, Osmosis, and Diffusion
1. Answer the following questions:a. List four cell structures that are common to both plant and animal cells. (4 points)b. What structures are unique to plant cells? (2 points)c. What structures are unique to animal cells? (2 points)2. Below are five structures observed in cells. List the function of each structure. (5 points)a. Chloroplastsb. Golgi apparatusc. Ribosomesd. Central vacuolee. Rough endoplasmic reticulum3. William is observing a single-celled organism under a microscope and notices that it has a nucleus and iscovered in small, hair-like structures.a. Provide a probable name for this organism (1 point)b. Explain why William came to this conclusion. (2 points)4. Where in the cell are the chloroplasts located? (5 points)5. In the Spirogyra cells observed on the virtual microscope, about how many circular green chloroplasts wereseen in a single cell at 40X magnification? (2 points)6. What were the percent differences between the volumes of the potatoes in the osmosis experiment for eachsalt solution? (8 points)a. 0%b. 1.75%c. 3.5%d. 7%7. What extraneous variables might have affected how the results came out in the osmosis experiment? Describethree. (6 points)a.b.c.8. In osmosis, which direction does water move with respect to solute concentration? (2 points)9. Answer the following questions:a. Explain what would happen to a freshwater unicellular organism if it were suddenly released into asaltwater environment. Use the terms iissottoniicc, hyypottoniicc and hyypeerrttoniicc in the answer. (3 points)b. What would happen if a marine organism were placed in freshwater? (3 points)10. A student purchases and weighs 5 pounds of carrots from a local grocery store. She notices that the grocerystore constantly sprays its produce with distilled water. After returning home, she weighs the carrots again anddiscovers that they weigh only 4.2 lbs. They also no longer seem as crisp and taut. Provide a possibleexplanation for why the carrots weighed more at the store, based on the information learned in this lab. (5points)11. People always say that leeches can be removed from the body by pouring salt on them. Based on what thestudent learned about osmosis, provide an explanation that supports or refutes this information. (5 points)12. What is the surface-to-volume ratio and rate of diffusion for each potato cube from Procedure 3b? (6 points)a. Cube 1 surface-to-volume ratiob. Cube 1 rate of diffusionc. Cube 2 surface-to-volume ratiod. Cube 2 rate of diffusione. Cube 3 surface-to-volume ratiof. Cube 3 rate of diffusion13. Assume the potato cubes are cells. Which cube would be most efficient at moving materials into and out of thecube? Briefly explain the answer. (4 points)14. From what was observed in the potato procedure, how do the rate of diffusion and surface-to-volume ratio limitcell size? (5 points)15. One night, Hans decides to cook a hamburger and spaghetti with meatballs. To test ideas of surface-to-volumeratios, he makes a quarter pound hamburger and a quarter pound meatball and cooks them at the sametemperature. Which food item will cook the fastest and why? (5 points)16. While watching a special on animals, Brianna discovers that hares tend to lose heat through their ears. Based onthis and what is known about surface-to-volume ratios, propose an explanation as to why hares that live in hotclimates (such as the desert) have large, extended ears. (5 points)17. ((Applliiccaattiion)) How might the information gained from this lab pertaining to cell structures and diffusion beuseful to you in your everyday life or to a healthcare professional? (20 points)Key components of critical thinking and application include the following:1. Demonstrates application and comprehension of the scientific principles.2. Displays competence in applying scientific knowledge to your personal or professional life.3. Relevant content is supported by facts, data, and detailed examples.4. The application paragraph is organized and structured.CrriittiiccaallTThiinkkiinggaandApplliiccaattiionoffIInfforrmaattiion
Human Body, Written assignment help
Osteoporosis is a bone disease marked by brittle and fragile bones. In this assignment, you will explore this disease in m ...
Human Body, Written assignment help
Osteoporosis is a bone disease marked by brittle and fragile bones. In this assignment, you will explore this disease in more detail using the scenario below.Scenario:During a recent visit with a female relative, the relative informs you that she has been diagnosed with osteopenia, a precursor to osteoporosis. In order to help your relative, you decide to research this disease further.To complete this assignment, do the following:Research this disease using the sources I have uploaded below.In a minimum of 2 pages (not counting the references page), address the following:
Explain how osteoporosis develops and the potential causes.Describe the ways that your relative can prevent the onset of osteoporosis.Include a references page at the end of your document, formatted using the APA guidelines, that lists your research sources.References for both uploads please make sure to cite correctly.Boughton, B., & Davidson, T. (2015). Bone Density Test. In J. L. Longe (Ed.), The Gale Encyclopedia of Medicine (5th ed., Vol. 2, pp. 777-779). Farmington Hills, MI: Gale. Retrieved from http://go.galegroup.com.ezproxy.rasmussen.edu/ps/i...Kaczkowski, C., & Frey, R. J. (2013). Osteoporosis. In B. Narins (Ed.), The Gale Encyclopedia of Nursing and Allied Health (3rd ed., Vol. 4, pp. 2456-2463). Detroit: Gale. Retrieved from http://go.galegroup.com.ezproxy.rasmussen.edu/ps/i...
7 pages
Practice Worksheet 10
Practice worksheet for Unit 10 – Acids and Bases and Equilibrium. 1. Indicate whether each of the following statements i ...
Practice Worksheet 10
Practice worksheet for Unit 10 – Acids and Bases and Equilibrium. 1. Indicate whether each of the following statements is characteristic of an acid, ...
ST 620 California Packet Capture and Intrusion Detection Prevention Systems Case
Introduction to Packet Capture and Intrusion Detection Prevention SystemsYou are a network analyst on the fly-away team fo ...
ST 620 California Packet Capture and Intrusion Detection Prevention Systems Case
Introduction to Packet Capture and Intrusion Detection Prevention SystemsYou are a network analyst on the fly-away team for the FBI's cybersecurity sector engagement division. You've been deployed several times to financial institutions to examine their networks after cyberattacks, ranging from intrusions and data exfiltration to distributed denial of services to their network supporting customer transaction websites.A representative from the Financial Services Information Sharing and Analysis Center, FS-ISAC, met with your boss, the chief net defense liaison to the financial services sector, about recent reports of intrusions into the networks of banks and their consortium.He's provided some of the details of the reports in an email. "Millions of files were compromised, and financial officials want to know who entered the networks and what happened to the information. At the same time, the FS-ISAC has seen extensive distributed denial of service disrupting the bank's networks, impacting the customer websites, and blocking millions of dollars of potential transactions," his email reads.You realize that the impact from these attacks could cause the downfall of many banks and ultimately create a strain on the US economy. In the email, your chief asks you to travel to one of the banks and using your suite of network monitoring and intrusion detection tools, produce two documents—a report to the FBI and FS-ISAC that contains the information you observed on the network and a joint network defense bulletin to all the banks in the FS-ISAC consortium, recommending prevention methods and remediation against the types of malicious traffic activity that they may face or are facing.Network traffic analysis and monitoring help distinguish legitimate traffic from malicious traffic.Step 1: Create a Network Architecture OverviewAs part of your assignment to report on prevention methods and remediation techniques for the banking industry, you would have to travel to the various bank locations and gain access to their networks. However, you must first understand the network architecture of these banks.Provide a network architecture overview along with diagrams. Your overview can be fictitious or based on an actual organization. The goal is to provide an understanding of the network architecture.Describe the various data transmission components. Select the links below to review them:User Datagram Protocol (UDP)Transmission Control Protocol/Internet Protocol (TCP/IP)internet packetsIP address schemeswell-known ports and applicationsAddress the meaning and relevance of information, such as:the sender or source that transmits a messagethe encoder used to code messagesthe medium or channel that carries the messagethe decoding mechanisms usedthe receiver or destination of the messagesDescribe:the intrusion detection system (IDS)the intrusion prevention system (IPS)the firewalls that have been establishedthe link between the operating systems, the software, and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks’ networks.Identify:how banks use firewallshow banks use IDSsthe difference between these technologiesInclude:the network infrastructure informationthe IP address schemes that will involve the IP addressing assignment modelthe public and private addressing and address allocationspotential risks in setting up the IP addressing schemeHere are some resources to review:intrusion detection and prevention (IDS/IPS) systemsfirewallsIdentify:any well-known ports and applications that are usedrisks associated with those ports and applications being identified and possibly targetedAdd your overview to your report.In the next step, you will identify network attacks and ways to monitor systems to prevent these attacks.Network administrators must protect networks from intrusions. This can be done using tools and techniques that use past traffic data to determine what should be allowed and what should be blocked. In the face of constantly evolving threats to networks, network administrators must ensure their intrusion detection and prevention systems are able to analyze, monitor, and even prevent these advanced threats.In this project, you will research network intrusion and prevention systems and understand their use in a network environment. You will also use monitoring and analysis technologies in the Workspace to compile a Malicious Network Activity Report for financial institutions and a Joint Network Defense Bulletin for a financial services consortium.The following are the deliverables for this project:DeliverablesMalicious Network Activity Report: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Joint Network Defense Bulletin: A one- to two-page double-spaced document.Lab Report: A Word document sharing your lab experience along with screenshots.There are eight steps to complete the project. Most steps in this project should take no more than two hours to complete, and the entire project should take no more than two weeks to complete. Begin with the workplace scenario and continue to Step 1, “Create a Network Architecture Overview.”CompetenciesYour work will be evaluated using the competencies listed below.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.4: Tailor communications to the audience.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence approporiately.8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.8.5: Obtain knowledge and skills to conduct a postmortem analysis of an incident and provide sound recommendations for business continuity.9.1: Knowledge of the Information Technology industry, its systems, platforms, tools, and technologies.Step 2: Identify Network AttacksIn the previous step, you provided an overview of the network architecture. In this step, you will identify possible cyberattacks such as spoofing/cache poisoning, session hijacking, and man-in-the-middle attacks.Provide techniques for monitoring these attacks using knowledge acquired in the previous step. Review the following resources to gain a better understanding of these particular cyberattacks:Session hijacking: spoofing/cache poisoning attacksMan-in-the-middle attacksOne way to monitor and learn about malicious activities on a network is to create honeypots.Propose a honeypot environment to lure hackers to the network and include the following in your proposal:Describe a honeypot.Explain how a honeypot environment is set up.Explain the security and protection mechanisms a bank would need for a honeypot.Discuss some network traffic indicators that will tell you that your honeypot trap is working.Include this information in your final report. However, do not include this information in the bulletin to prevent hackers from being alerted about these defenses.Then, continue to the next step, where you will identify false negatives and positives.Step 3: Identify False Positives and False NegativesYou just identified possible information security attacks. Now, identify the risks to network traffic analysis and remediation. Review the resources on false positives and false negatives and discuss the following:Identify what are false positives and false negatives.How are false positives and false negatives determined?How are false positives and false negatives tested?Which is riskier to the health of the network, a false positive or a false negative?Describe your analysis about testing for false negatives and false positives using tools such as IDSs and firewalls, and include this as recommendations for the banks in your public service Joint Network Defense Bulletin.Discuss the concept of performing statistical analysis of false positives and false negatives.Explain how banks can reduce these issues.Research possible ways to reduce these events and include this information as recommendations in the Malicious Network Activity Report.Network intrusion analysis is often done with a tool such as Snort. Snort is a free and open-source intrusion detection/prevention system program. It is used for detecting and preventing malicious traffic and attacks on networks, analysis, and education. Such identification can be used to design signatures for the IDS, as well as to program the IDS to block this known bad traffic.Network traffic analysis is often done using tools such as Wireshark. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development and education. Cybersecurity professionals must know how to perform network forensics analysis.In the next step, you will analyze network traffic.Step 4: Analyze Network TrafficIn the previous step, you identified and analyzed risks related to false negatives and false positives. For this step, you will analyze network traffic, conduct network forensics analysis, and identify malicious network addresses.Enter Workspace and perform the network traffic analysis. During this step, you will also develop proposed rules to prevent against known malicious sites and to test for these signatures.Professionals in the FieldThis program of study has exposed you to a variety of cybersecurity tools. Can you summarize what these tools do? Can you discuss their use in new situations? Can you do this for both technical and nontechnical staff?As you progress in your career, you will likely need to sway people who hold authority over cybersecurity decisions. These people may know very little about cybersecurity, but they will understand their own goals within the organization.It’s not enough to just be well-versed on the technical side; sometimes you must be able to explain in understandable terms how a computing platform will be affected by a breach.Step 5: Determine Sensitivity of Your AnalysisIn the previous step, you completed network analysis. In this step, you will determine which information to include in which document.Information appropriate for internal consumption may not be appropriate for public consumption. The Joint Network Defense Bulletin may alert criminals of the network defense strategy. Therefore, be careful about what you include in this bulletin.Once you have assessed the sensitivity of the information, include appropriate information in your Malicious Network Activity Report.Then, include appropriate information in the Joint Network Defense Bulletin in a way that educates the financial services consortium of the threat and the mitigating activities necessary to protect against that threat.Step 6: Explain Other Detection Tools and TechniquesIn the previous step, you included appropriate information in the proper document. In this step, perform independent research and briefly discuss what other tools and techniques may be used to detect these signatures.Provide enough detail so that a bank network administrator could follow your explanation to deploy your system in production. Include this information in the Joint Network Defense Bulletin.Next, move to the next step, where you will organize and complete your report.Step 7: Complete Malicious Network Activity ReportNow that you have gathered all the data for your Malicious Network Activity Report, it is time to organize your report. The following is a suggested outline:Introduction: Describe the banking institution and the issue you will be examining.Overview of the Network ArchitectureNetwork AttacksNetwork Traffic Analysis and ResultsOther Detection Tools and TechniquesRecommended Remediation StrategiesSubmit your report to the Assignments folder in the final step. You are now ready for the last piece of this project, the Joint Network Defense Bulletin.Step 8: Create the Joint Network Defense BulletinIn this step, you will create the Joint Network Defense Bulletin. Compile the information you have gathered, taking care to eliminate any sensitive bank-specific information. The Joint Network Defense Bulletin is an educational document for the financial services consortium. This bulletin should be addressed to the FBI chief and the FS-ISAC representative.Here is a list of the final deliverables for Project 2.DeliverablesMalicious Network Activity Report: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Joint Network Defense Bulletin: A one- to two-page double-spaced document.Submit all deliverables to the Assignments folder below.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.4: Tailor communications to the audience.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence approporiately.8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.8.5: Obtain knowledge and skills to conduct a postmortem analysis of an incident and provide sound recommendations for business continuity.9.1: Knowledge of the Information Technology industry, its systems, platforms, tools, and technologies.ATTACHED TAMPLATESJoint Network
Defense Bulletin
Create a 1-2 page
educational public service announcement (PSA) / Bulletin that will got to all
the banks in the FS-ISAC financial bank consortium. Take
care to eliminate any information that could identify any particular bank.
There have been recent
reports of intrusions into the networks of banks and their consortium. In this PSA/Bulletin recommend prevention
methods and remediation against the types of malicious traffic activity that
they may face or are facing.
A few suggestions:
Discuss risks observed
to network traffic analysis. Discuss IDS
and firewalls and testing for false negatives and false positives. Discuss network IP addresses and protocols
and relate them to network architecture. Discuss observations from Wireshark that could emphasize your
recommendations.
Explain in a few
paragraphs what other tools and techniques (besides Wireshark and Snort) the
bank consortium may use to detect malicious IP addresses / signatures. Provide enough detail so that a bank network
administrator could follow your explanation to deploy your system in
production. ISAC that contains the
information you observed on the network and a joint network defense bulletin to
all the banks in the FS-ISAC consortium, recommending prevention methods and
remediation against the types of malicious traffic activity that they may face
or are facing. The bulletin will be
provide separately from the report. This
report will provide a network architecture overview and will discuss data
transmission components, security attacks, techniques for monitoring such
attacks, and cyber offensives, intrusion detection (IDS) and intrusion
prevention (IPS) systems, firewalls, and risks to network traffic analysis and
remediation.
Network Architecture Overview
You traveled to the banks’ locations and gained access to
their network operations.
Network
Diagram
Discuss the network diagram here but put the diagram itself
at the bottom of this plan in the “Figures” section. Refer to Figure X (assign a number) and
discuss the network architecture. Your
overview can be based on fictitious information, or you can model network
architecture from a real researched bank.
Data
Transmission Components
Discuss various data transmission components such as: UDP,
TCP/IP, Internet Packets, IP address schemes, and well-known ports and
applications.
Relevance
of Information
Address the meanings and relevance of information, such as
the sender or source that transmits a message, the encoder used to code
messages, the medium or channel that carries the message, the decoding
mechanisms that were used, and the receiver or destination of the messages.
Intrusion
Detection and Intrusion Prevention
Describe the intrusion detection (IDS) and intrusion
prevention (IPS) systems used and the firewalls that have been established.
Make sure to link the operating systems and the software and hardware
components in the network, firewall, and IDS that make up the network defense
implementation of the banks’ networks. Identify how the banks are using
firewalls and how they are using IDSs, and identify the difference between
these technologies. Include the network infrastructure information and the IP
address schemes, which will involve the IP addressing assignment model, and the
public and private addressing and address allocations.
Potential
Risks
Identify potential risks in setting up the IP addressing
scheme. Identify any well-known ports
and applications that are being used and the risk associated with those being
identified, and possibly targeted. This
portion can be made up of fictitious information, or you can use information
from research.
Information
Security Attacks
Possible Cyberattacks
Using information from your network
architecture overview, identify possible cyberattacks such as spoofing/cache
poisoning attacks, and session hijacking attacks including but not limited to
man-in-the-middle attacks. Also provide
techniques for monitoring against these attacks.
Proposed Cyber Offensive Operation
Discuss how you would lure the hackers
to honeypots. Describe what a honeypot
is, how to set up an operation using a honeypot, and what security and
protections mechanisms would need to be in place if a bank agreed to set up a
honeypot. What are some indicators in
network traffic that would lead you to conclude that your honeypot trap has
worked? Report these from
Wireshark.
False
Negatives and False Positives Encryption
Discuss false
positives and false negatives -- identify what these are, how they are
determined, how they are tested, and which is riskier to the health of the
network. Then, identify the posed risks
to the cryptographic systems as a result of these gaps, including but not
limited to crypto attacks.
Statistical Analyses - Workspace
Discuss the statistical analyses of
false positives and false negatives from the results in Workspace, from the
banks’ networks, and how they can reduce these values. Use fictitious values
but research possible ways to reduce these events, and include as recommendations
here in this section.
IP Network Addresses
Discuss your lab work and results from
Wireshark in this section. If you want
to include the lab figures in the report (rather than separate as you can do),
then please put them all at the bottom of this plan in the “Figures”
section. Refer to Figure X (assign a
number) and discuss them to emphasize your points on network IP addresses, the
types of protocols that are running, and relate them to the network
architecture you provided in the earlier section of the report.
Include analysis of the source and
destination IP addresses that seem anomalous in nature, the traffic volume
patterns with date and time corroborations, and other significant details of
the network traffic analysis here in this section.
Network Forensics Analysis
Discuss your lab work and results from
Snort in this section. If you want to
include the lab figures in the report (rather than separate as you can do),
then please put them all at the bottom of this plan in the “Figures” section. Refer to Figure X (assign a number) and
discuss them to emphasize your points on network forensics analysis and
malicious IP addresses.
Identify malicious IP addresses and discuss
how they can be used to design signatures for the IDS, programming the IDS to
block this known bad traffic. Discuss
some of your lab work where you develop proposed Snort signatures to prevent
against those known bad sites and test these signatures. Provide some improvements to the performance
of the signature.
Conclusion
This Malicious Network Activity Report provided a network
architecture overview and discussed data transmission components, security
attacks, techniques for monitoring such attacks, and cyber offensives,
intrusion detection (IDS) and intrusion prevention (IPS) systems, firewalls,
and risks to network traffic analysis and remediation. From here discuss your overall conclusions
and recommendations…
References
Aleisa, N. (2015). A comparison of the 3DES and AES encryption
standards. International Journal
of Security and Its Applications 9(7). doi: 10.14257/ijsia.2015.9.7.21
Defense Human Resource Activity. (n.d.). Common Access Card (CAC) Security. Retrieved from
http://cac.mil/common-access-card/cac-security
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Computer Security: Guide to integrating
forensic techniques into incident response: Recommendations of the National
Institute of Standards and Technology (Special Publication 800-86).
Retrieved from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspe...
Reith, M., Carr, C., & Gunsch, G. (2002). An examination of
digital forensic models. International
Journal of Digital Evidence, 1(3), 1-12. Retrieved from
http://www.just.edu.jo/~Tawalbeh/nyit/incs712/digi...
Tables
Table 1
Demographic Data on
All 178 Respondents
Population Description
Male
Female
Total
Age ≤ 29 Years
(N = 23) 20.7%
(N = 10) 14.9%
(N = 33) 18.5%
Age 30-45 Years
(N = 34) 30.6%
(N = 29) 43.3%
(N = 63) 35.3%
Age 46-59 Years
(N = 44) 39.6%
(N = 24) 35.8%
(N = 68) 38.2%
Age 60 Years or older
(N = 10) 09.0%
(N = 04) 06.0%
(N = 14) 07.9%
Experience 05 Years Exact
(N = 15) 13.5%
(N = 10) 14.9%
(N = 25) 14.0%
Experience 06-10 Years
(N = 30) 27.0%
(N = 21) 31.3%
(N = 51) 28.6%
Experience 11-19 Years
(N = 38) 34.2%
(N = 26) 38.8%
(N = 64) 35.9%
Experience ≥ 20 Years
(N = 28) 25.2%
(N = 10) 14.9%
(N = 38) 21.3%
Table 2
Measures of Central
Tendency and Variation
N
Statistic
R
Statistic
M
Statistic
SD
Statistic
Variance
Statistic
Skewness
Statistic
Skewness
Std. Error
Gender
178
1
1.38
.486
.236
.515
.182
Age
178
3
2.35
.872
.761
-.034
.182
Experience
178
3
2.65
.970
.942
-.176
.182
Valid N
178
Figures
Figure 1.
Hospital
Information Support System.
6 pages
Water Quality
One of the significant and most abundant resources in our country is water. There is more than enough supply of available ...
Water Quality
One of the significant and most abundant resources in our country is water. There is more than enough supply of available freshwater in our country to ...
GEOL1202 Saint Mary Topographic and Geological Maps of Nova Scotia Paper
There have some questions about metamorphism, the questions is in the materials please finish those work by hand.I need th ...
GEOL1202 Saint Mary Topographic and Geological Maps of Nova Scotia Paper
There have some questions about metamorphism, the questions is in the materials please finish those work by hand.I need the right answer.
Similar Content
CUNY What Is the Relationship Between Two Major Energy Pathways in Cells HW
In this assignment, you will compare and contrast two metabolic pathways found in living
organisms and answer the followi...
Which of the following can increase the rate of a chemical reaction?
Which of the following can increase the rate of a chemical reaction?1. Increased concentration of Enzyme2. Increased conce...
This process uses NADH and FADH2 to produce ATP oxidative phosphorylation fermen
This process uses NADH and FADH2 to produce ATPoxidative phosphorylationfermentationglycolysiskrebs cycle...
PLEASE HELP I have beens tuck on this for a week i really need to finish it fast.
Sub-Atomic How many moles of magnesium, Mg, are there in 4.75 grams of magnesium?Particles: What is the mass in grams...
University of California Chapter 3 to 5 Green House Effect Key Homework Problems
finish question number 12, 14,13,14,15show all work................................
Franklin Pierce College The Chaparral Ecosystems in Southern California Discussion
The Chaparral ecosystems in Southern California.
all the information for Chaparral should include the following:
Try to ...
Biology Lab Simulation.
If glucose was no longer available, there are specific activities that would be impacted by the entire simulation process....
Quantitative Problem
Let x1 be the number of gallons of chemical from the old process Let x2 be the number of gallons of chemical from the new ...
Bacteria Discussion Responce
Vibrio cholerae bacteria are comma-curved in shape and cause the disease cholera. The bacterium is gram-negative, with one...
Related Tags
Book Guides
The Point of it All - A Lifetime of Great Loves and Endeavors
by Charles Krauthammer
Catch-22
by Joseph Heller
Killers of the Flower Moon
by David Grann
Big Magic
by Elizabeth Gilbert
Dead Poets Society
by Nancy Horowitz Kleinbaum
Hidden Figures
by Margot Lee Shetterly
The Splendid and The Vile
by Erik Larson
The Adventures of Huckleberry Finn
by Mark Twain
The Prince
by Niccolò Machiavelli
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Cell Structure, Osmosis, and Diffusion
1. Answer the following questions:a. List four cell structures that are common to both plant and animal cells. (4 points)b ...
Cell Structure, Osmosis, and Diffusion
1. Answer the following questions:a. List four cell structures that are common to both plant and animal cells. (4 points)b. What structures are unique to plant cells? (2 points)c. What structures are unique to animal cells? (2 points)2. Below are five structures observed in cells. List the function of each structure. (5 points)a. Chloroplastsb. Golgi apparatusc. Ribosomesd. Central vacuolee. Rough endoplasmic reticulum3. William is observing a single-celled organism under a microscope and notices that it has a nucleus and iscovered in small, hair-like structures.a. Provide a probable name for this organism (1 point)b. Explain why William came to this conclusion. (2 points)4. Where in the cell are the chloroplasts located? (5 points)5. In the Spirogyra cells observed on the virtual microscope, about how many circular green chloroplasts wereseen in a single cell at 40X magnification? (2 points)6. What were the percent differences between the volumes of the potatoes in the osmosis experiment for eachsalt solution? (8 points)a. 0%b. 1.75%c. 3.5%d. 7%7. What extraneous variables might have affected how the results came out in the osmosis experiment? Describethree. (6 points)a.b.c.8. In osmosis, which direction does water move with respect to solute concentration? (2 points)9. Answer the following questions:a. Explain what would happen to a freshwater unicellular organism if it were suddenly released into asaltwater environment. Use the terms iissottoniicc, hyypottoniicc and hyypeerrttoniicc in the answer. (3 points)b. What would happen if a marine organism were placed in freshwater? (3 points)10. A student purchases and weighs 5 pounds of carrots from a local grocery store. She notices that the grocerystore constantly sprays its produce with distilled water. After returning home, she weighs the carrots again anddiscovers that they weigh only 4.2 lbs. They also no longer seem as crisp and taut. Provide a possibleexplanation for why the carrots weighed more at the store, based on the information learned in this lab. (5points)11. People always say that leeches can be removed from the body by pouring salt on them. Based on what thestudent learned about osmosis, provide an explanation that supports or refutes this information. (5 points)12. What is the surface-to-volume ratio and rate of diffusion for each potato cube from Procedure 3b? (6 points)a. Cube 1 surface-to-volume ratiob. Cube 1 rate of diffusionc. Cube 2 surface-to-volume ratiod. Cube 2 rate of diffusione. Cube 3 surface-to-volume ratiof. Cube 3 rate of diffusion13. Assume the potato cubes are cells. Which cube would be most efficient at moving materials into and out of thecube? Briefly explain the answer. (4 points)14. From what was observed in the potato procedure, how do the rate of diffusion and surface-to-volume ratio limitcell size? (5 points)15. One night, Hans decides to cook a hamburger and spaghetti with meatballs. To test ideas of surface-to-volumeratios, he makes a quarter pound hamburger and a quarter pound meatball and cooks them at the sametemperature. Which food item will cook the fastest and why? (5 points)16. While watching a special on animals, Brianna discovers that hares tend to lose heat through their ears. Based onthis and what is known about surface-to-volume ratios, propose an explanation as to why hares that live in hotclimates (such as the desert) have large, extended ears. (5 points)17. ((Applliiccaattiion)) How might the information gained from this lab pertaining to cell structures and diffusion beuseful to you in your everyday life or to a healthcare professional? (20 points)Key components of critical thinking and application include the following:1. Demonstrates application and comprehension of the scientific principles.2. Displays competence in applying scientific knowledge to your personal or professional life.3. Relevant content is supported by facts, data, and detailed examples.4. The application paragraph is organized and structured.CrriittiiccaallTThiinkkiinggaandApplliiccaattiionoffIInfforrmaattiion
Human Body, Written assignment help
Osteoporosis is a bone disease marked by brittle and fragile bones. In this assignment, you will explore this disease in m ...
Human Body, Written assignment help
Osteoporosis is a bone disease marked by brittle and fragile bones. In this assignment, you will explore this disease in more detail using the scenario below.Scenario:During a recent visit with a female relative, the relative informs you that she has been diagnosed with osteopenia, a precursor to osteoporosis. In order to help your relative, you decide to research this disease further.To complete this assignment, do the following:Research this disease using the sources I have uploaded below.In a minimum of 2 pages (not counting the references page), address the following:
Explain how osteoporosis develops and the potential causes.Describe the ways that your relative can prevent the onset of osteoporosis.Include a references page at the end of your document, formatted using the APA guidelines, that lists your research sources.References for both uploads please make sure to cite correctly.Boughton, B., & Davidson, T. (2015). Bone Density Test. In J. L. Longe (Ed.), The Gale Encyclopedia of Medicine (5th ed., Vol. 2, pp. 777-779). Farmington Hills, MI: Gale. Retrieved from http://go.galegroup.com.ezproxy.rasmussen.edu/ps/i...Kaczkowski, C., & Frey, R. J. (2013). Osteoporosis. In B. Narins (Ed.), The Gale Encyclopedia of Nursing and Allied Health (3rd ed., Vol. 4, pp. 2456-2463). Detroit: Gale. Retrieved from http://go.galegroup.com.ezproxy.rasmussen.edu/ps/i...
7 pages
Practice Worksheet 10
Practice worksheet for Unit 10 – Acids and Bases and Equilibrium. 1. Indicate whether each of the following statements i ...
Practice Worksheet 10
Practice worksheet for Unit 10 – Acids and Bases and Equilibrium. 1. Indicate whether each of the following statements is characteristic of an acid, ...
ST 620 California Packet Capture and Intrusion Detection Prevention Systems Case
Introduction to Packet Capture and Intrusion Detection Prevention SystemsYou are a network analyst on the fly-away team fo ...
ST 620 California Packet Capture and Intrusion Detection Prevention Systems Case
Introduction to Packet Capture and Intrusion Detection Prevention SystemsYou are a network analyst on the fly-away team for the FBI's cybersecurity sector engagement division. You've been deployed several times to financial institutions to examine their networks after cyberattacks, ranging from intrusions and data exfiltration to distributed denial of services to their network supporting customer transaction websites.A representative from the Financial Services Information Sharing and Analysis Center, FS-ISAC, met with your boss, the chief net defense liaison to the financial services sector, about recent reports of intrusions into the networks of banks and their consortium.He's provided some of the details of the reports in an email. "Millions of files were compromised, and financial officials want to know who entered the networks and what happened to the information. At the same time, the FS-ISAC has seen extensive distributed denial of service disrupting the bank's networks, impacting the customer websites, and blocking millions of dollars of potential transactions," his email reads.You realize that the impact from these attacks could cause the downfall of many banks and ultimately create a strain on the US economy. In the email, your chief asks you to travel to one of the banks and using your suite of network monitoring and intrusion detection tools, produce two documents—a report to the FBI and FS-ISAC that contains the information you observed on the network and a joint network defense bulletin to all the banks in the FS-ISAC consortium, recommending prevention methods and remediation against the types of malicious traffic activity that they may face or are facing.Network traffic analysis and monitoring help distinguish legitimate traffic from malicious traffic.Step 1: Create a Network Architecture OverviewAs part of your assignment to report on prevention methods and remediation techniques for the banking industry, you would have to travel to the various bank locations and gain access to their networks. However, you must first understand the network architecture of these banks.Provide a network architecture overview along with diagrams. Your overview can be fictitious or based on an actual organization. The goal is to provide an understanding of the network architecture.Describe the various data transmission components. Select the links below to review them:User Datagram Protocol (UDP)Transmission Control Protocol/Internet Protocol (TCP/IP)internet packetsIP address schemeswell-known ports and applicationsAddress the meaning and relevance of information, such as:the sender or source that transmits a messagethe encoder used to code messagesthe medium or channel that carries the messagethe decoding mechanisms usedthe receiver or destination of the messagesDescribe:the intrusion detection system (IDS)the intrusion prevention system (IPS)the firewalls that have been establishedthe link between the operating systems, the software, and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks’ networks.Identify:how banks use firewallshow banks use IDSsthe difference between these technologiesInclude:the network infrastructure informationthe IP address schemes that will involve the IP addressing assignment modelthe public and private addressing and address allocationspotential risks in setting up the IP addressing schemeHere are some resources to review:intrusion detection and prevention (IDS/IPS) systemsfirewallsIdentify:any well-known ports and applications that are usedrisks associated with those ports and applications being identified and possibly targetedAdd your overview to your report.In the next step, you will identify network attacks and ways to monitor systems to prevent these attacks.Network administrators must protect networks from intrusions. This can be done using tools and techniques that use past traffic data to determine what should be allowed and what should be blocked. In the face of constantly evolving threats to networks, network administrators must ensure their intrusion detection and prevention systems are able to analyze, monitor, and even prevent these advanced threats.In this project, you will research network intrusion and prevention systems and understand their use in a network environment. You will also use monitoring and analysis technologies in the Workspace to compile a Malicious Network Activity Report for financial institutions and a Joint Network Defense Bulletin for a financial services consortium.The following are the deliverables for this project:DeliverablesMalicious Network Activity Report: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Joint Network Defense Bulletin: A one- to two-page double-spaced document.Lab Report: A Word document sharing your lab experience along with screenshots.There are eight steps to complete the project. Most steps in this project should take no more than two hours to complete, and the entire project should take no more than two weeks to complete. Begin with the workplace scenario and continue to Step 1, “Create a Network Architecture Overview.”CompetenciesYour work will be evaluated using the competencies listed below.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.4: Tailor communications to the audience.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence approporiately.8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.8.5: Obtain knowledge and skills to conduct a postmortem analysis of an incident and provide sound recommendations for business continuity.9.1: Knowledge of the Information Technology industry, its systems, platforms, tools, and technologies.Step 2: Identify Network AttacksIn the previous step, you provided an overview of the network architecture. In this step, you will identify possible cyberattacks such as spoofing/cache poisoning, session hijacking, and man-in-the-middle attacks.Provide techniques for monitoring these attacks using knowledge acquired in the previous step. Review the following resources to gain a better understanding of these particular cyberattacks:Session hijacking: spoofing/cache poisoning attacksMan-in-the-middle attacksOne way to monitor and learn about malicious activities on a network is to create honeypots.Propose a honeypot environment to lure hackers to the network and include the following in your proposal:Describe a honeypot.Explain how a honeypot environment is set up.Explain the security and protection mechanisms a bank would need for a honeypot.Discuss some network traffic indicators that will tell you that your honeypot trap is working.Include this information in your final report. However, do not include this information in the bulletin to prevent hackers from being alerted about these defenses.Then, continue to the next step, where you will identify false negatives and positives.Step 3: Identify False Positives and False NegativesYou just identified possible information security attacks. Now, identify the risks to network traffic analysis and remediation. Review the resources on false positives and false negatives and discuss the following:Identify what are false positives and false negatives.How are false positives and false negatives determined?How are false positives and false negatives tested?Which is riskier to the health of the network, a false positive or a false negative?Describe your analysis about testing for false negatives and false positives using tools such as IDSs and firewalls, and include this as recommendations for the banks in your public service Joint Network Defense Bulletin.Discuss the concept of performing statistical analysis of false positives and false negatives.Explain how banks can reduce these issues.Research possible ways to reduce these events and include this information as recommendations in the Malicious Network Activity Report.Network intrusion analysis is often done with a tool such as Snort. Snort is a free and open-source intrusion detection/prevention system program. It is used for detecting and preventing malicious traffic and attacks on networks, analysis, and education. Such identification can be used to design signatures for the IDS, as well as to program the IDS to block this known bad traffic.Network traffic analysis is often done using tools such as Wireshark. Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development and education. Cybersecurity professionals must know how to perform network forensics analysis.In the next step, you will analyze network traffic.Step 4: Analyze Network TrafficIn the previous step, you identified and analyzed risks related to false negatives and false positives. For this step, you will analyze network traffic, conduct network forensics analysis, and identify malicious network addresses.Enter Workspace and perform the network traffic analysis. During this step, you will also develop proposed rules to prevent against known malicious sites and to test for these signatures.Professionals in the FieldThis program of study has exposed you to a variety of cybersecurity tools. Can you summarize what these tools do? Can you discuss their use in new situations? Can you do this for both technical and nontechnical staff?As you progress in your career, you will likely need to sway people who hold authority over cybersecurity decisions. These people may know very little about cybersecurity, but they will understand their own goals within the organization.It’s not enough to just be well-versed on the technical side; sometimes you must be able to explain in understandable terms how a computing platform will be affected by a breach.Step 5: Determine Sensitivity of Your AnalysisIn the previous step, you completed network analysis. In this step, you will determine which information to include in which document.Information appropriate for internal consumption may not be appropriate for public consumption. The Joint Network Defense Bulletin may alert criminals of the network defense strategy. Therefore, be careful about what you include in this bulletin.Once you have assessed the sensitivity of the information, include appropriate information in your Malicious Network Activity Report.Then, include appropriate information in the Joint Network Defense Bulletin in a way that educates the financial services consortium of the threat and the mitigating activities necessary to protect against that threat.Step 6: Explain Other Detection Tools and TechniquesIn the previous step, you included appropriate information in the proper document. In this step, perform independent research and briefly discuss what other tools and techniques may be used to detect these signatures.Provide enough detail so that a bank network administrator could follow your explanation to deploy your system in production. Include this information in the Joint Network Defense Bulletin.Next, move to the next step, where you will organize and complete your report.Step 7: Complete Malicious Network Activity ReportNow that you have gathered all the data for your Malicious Network Activity Report, it is time to organize your report. The following is a suggested outline:Introduction: Describe the banking institution and the issue you will be examining.Overview of the Network ArchitectureNetwork AttacksNetwork Traffic Analysis and ResultsOther Detection Tools and TechniquesRecommended Remediation StrategiesSubmit your report to the Assignments folder in the final step. You are now ready for the last piece of this project, the Joint Network Defense Bulletin.Step 8: Create the Joint Network Defense BulletinIn this step, you will create the Joint Network Defense Bulletin. Compile the information you have gathered, taking care to eliminate any sensitive bank-specific information. The Joint Network Defense Bulletin is an educational document for the financial services consortium. This bulletin should be addressed to the FBI chief and the FS-ISAC representative.Here is a list of the final deliverables for Project 2.DeliverablesMalicious Network Activity Report: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.Joint Network Defense Bulletin: A one- to two-page double-spaced document.Submit all deliverables to the Assignments folder below.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer's ideas.1.4: Tailor communications to the audience.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence approporiately.8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.8.5: Obtain knowledge and skills to conduct a postmortem analysis of an incident and provide sound recommendations for business continuity.9.1: Knowledge of the Information Technology industry, its systems, platforms, tools, and technologies.ATTACHED TAMPLATESJoint Network
Defense Bulletin
Create a 1-2 page
educational public service announcement (PSA) / Bulletin that will got to all
the banks in the FS-ISAC financial bank consortium. Take
care to eliminate any information that could identify any particular bank.
There have been recent
reports of intrusions into the networks of banks and their consortium. In this PSA/Bulletin recommend prevention
methods and remediation against the types of malicious traffic activity that
they may face or are facing.
A few suggestions:
Discuss risks observed
to network traffic analysis. Discuss IDS
and firewalls and testing for false negatives and false positives. Discuss network IP addresses and protocols
and relate them to network architecture. Discuss observations from Wireshark that could emphasize your
recommendations.
Explain in a few
paragraphs what other tools and techniques (besides Wireshark and Snort) the
bank consortium may use to detect malicious IP addresses / signatures. Provide enough detail so that a bank network
administrator could follow your explanation to deploy your system in
production. ISAC that contains the
information you observed on the network and a joint network defense bulletin to
all the banks in the FS-ISAC consortium, recommending prevention methods and
remediation against the types of malicious traffic activity that they may face
or are facing. The bulletin will be
provide separately from the report. This
report will provide a network architecture overview and will discuss data
transmission components, security attacks, techniques for monitoring such
attacks, and cyber offensives, intrusion detection (IDS) and intrusion
prevention (IPS) systems, firewalls, and risks to network traffic analysis and
remediation.
Network Architecture Overview
You traveled to the banks’ locations and gained access to
their network operations.
Network
Diagram
Discuss the network diagram here but put the diagram itself
at the bottom of this plan in the “Figures” section. Refer to Figure X (assign a number) and
discuss the network architecture. Your
overview can be based on fictitious information, or you can model network
architecture from a real researched bank.
Data
Transmission Components
Discuss various data transmission components such as: UDP,
TCP/IP, Internet Packets, IP address schemes, and well-known ports and
applications.
Relevance
of Information
Address the meanings and relevance of information, such as
the sender or source that transmits a message, the encoder used to code
messages, the medium or channel that carries the message, the decoding
mechanisms that were used, and the receiver or destination of the messages.
Intrusion
Detection and Intrusion Prevention
Describe the intrusion detection (IDS) and intrusion
prevention (IPS) systems used and the firewalls that have been established.
Make sure to link the operating systems and the software and hardware
components in the network, firewall, and IDS that make up the network defense
implementation of the banks’ networks. Identify how the banks are using
firewalls and how they are using IDSs, and identify the difference between
these technologies. Include the network infrastructure information and the IP
address schemes, which will involve the IP addressing assignment model, and the
public and private addressing and address allocations.
Potential
Risks
Identify potential risks in setting up the IP addressing
scheme. Identify any well-known ports
and applications that are being used and the risk associated with those being
identified, and possibly targeted. This
portion can be made up of fictitious information, or you can use information
from research.
Information
Security Attacks
Possible Cyberattacks
Using information from your network
architecture overview, identify possible cyberattacks such as spoofing/cache
poisoning attacks, and session hijacking attacks including but not limited to
man-in-the-middle attacks. Also provide
techniques for monitoring against these attacks.
Proposed Cyber Offensive Operation
Discuss how you would lure the hackers
to honeypots. Describe what a honeypot
is, how to set up an operation using a honeypot, and what security and
protections mechanisms would need to be in place if a bank agreed to set up a
honeypot. What are some indicators in
network traffic that would lead you to conclude that your honeypot trap has
worked? Report these from
Wireshark.
False
Negatives and False Positives Encryption
Discuss false
positives and false negatives -- identify what these are, how they are
determined, how they are tested, and which is riskier to the health of the
network. Then, identify the posed risks
to the cryptographic systems as a result of these gaps, including but not
limited to crypto attacks.
Statistical Analyses - Workspace
Discuss the statistical analyses of
false positives and false negatives from the results in Workspace, from the
banks’ networks, and how they can reduce these values. Use fictitious values
but research possible ways to reduce these events, and include as recommendations
here in this section.
IP Network Addresses
Discuss your lab work and results from
Wireshark in this section. If you want
to include the lab figures in the report (rather than separate as you can do),
then please put them all at the bottom of this plan in the “Figures”
section. Refer to Figure X (assign a
number) and discuss them to emphasize your points on network IP addresses, the
types of protocols that are running, and relate them to the network
architecture you provided in the earlier section of the report.
Include analysis of the source and
destination IP addresses that seem anomalous in nature, the traffic volume
patterns with date and time corroborations, and other significant details of
the network traffic analysis here in this section.
Network Forensics Analysis
Discuss your lab work and results from
Snort in this section. If you want to
include the lab figures in the report (rather than separate as you can do),
then please put them all at the bottom of this plan in the “Figures” section. Refer to Figure X (assign a number) and
discuss them to emphasize your points on network forensics analysis and
malicious IP addresses.
Identify malicious IP addresses and discuss
how they can be used to design signatures for the IDS, programming the IDS to
block this known bad traffic. Discuss
some of your lab work where you develop proposed Snort signatures to prevent
against those known bad sites and test these signatures. Provide some improvements to the performance
of the signature.
Conclusion
This Malicious Network Activity Report provided a network
architecture overview and discussed data transmission components, security
attacks, techniques for monitoring such attacks, and cyber offensives,
intrusion detection (IDS) and intrusion prevention (IPS) systems, firewalls,
and risks to network traffic analysis and remediation. From here discuss your overall conclusions
and recommendations…
References
Aleisa, N. (2015). A comparison of the 3DES and AES encryption
standards. International Journal
of Security and Its Applications 9(7). doi: 10.14257/ijsia.2015.9.7.21
Defense Human Resource Activity. (n.d.). Common Access Card (CAC) Security. Retrieved from
http://cac.mil/common-access-card/cac-security
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Computer Security: Guide to integrating
forensic techniques into incident response: Recommendations of the National
Institute of Standards and Technology (Special Publication 800-86).
Retrieved from http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspe...
Reith, M., Carr, C., & Gunsch, G. (2002). An examination of
digital forensic models. International
Journal of Digital Evidence, 1(3), 1-12. Retrieved from
http://www.just.edu.jo/~Tawalbeh/nyit/incs712/digi...
Tables
Table 1
Demographic Data on
All 178 Respondents
Population Description
Male
Female
Total
Age ≤ 29 Years
(N = 23) 20.7%
(N = 10) 14.9%
(N = 33) 18.5%
Age 30-45 Years
(N = 34) 30.6%
(N = 29) 43.3%
(N = 63) 35.3%
Age 46-59 Years
(N = 44) 39.6%
(N = 24) 35.8%
(N = 68) 38.2%
Age 60 Years or older
(N = 10) 09.0%
(N = 04) 06.0%
(N = 14) 07.9%
Experience 05 Years Exact
(N = 15) 13.5%
(N = 10) 14.9%
(N = 25) 14.0%
Experience 06-10 Years
(N = 30) 27.0%
(N = 21) 31.3%
(N = 51) 28.6%
Experience 11-19 Years
(N = 38) 34.2%
(N = 26) 38.8%
(N = 64) 35.9%
Experience ≥ 20 Years
(N = 28) 25.2%
(N = 10) 14.9%
(N = 38) 21.3%
Table 2
Measures of Central
Tendency and Variation
N
Statistic
R
Statistic
M
Statistic
SD
Statistic
Variance
Statistic
Skewness
Statistic
Skewness
Std. Error
Gender
178
1
1.38
.486
.236
.515
.182
Age
178
3
2.35
.872
.761
-.034
.182
Experience
178
3
2.65
.970
.942
-.176
.182
Valid N
178
Figures
Figure 1.
Hospital
Information Support System.
6 pages
Water Quality
One of the significant and most abundant resources in our country is water. There is more than enough supply of available ...
Water Quality
One of the significant and most abundant resources in our country is water. There is more than enough supply of available freshwater in our country to ...
GEOL1202 Saint Mary Topographic and Geological Maps of Nova Scotia Paper
There have some questions about metamorphism, the questions is in the materials please finish those work by hand.I need th ...
GEOL1202 Saint Mary Topographic and Geological Maps of Nova Scotia Paper
There have some questions about metamorphism, the questions is in the materials please finish those work by hand.I need the right answer.
Earn money selling
your Study Documents