Description
what is the usage of macros in a program????
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really great stuff, couldn't ask for more.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
RC Technology Replacement Plan Artificial Intelligence & Machine Learning Essay
The IT Director has just informed you that the hardware/software that the Road Construction Supervisors use needs to be re ...
RC Technology Replacement Plan Artificial Intelligence & Machine Learning Essay
The IT Director has just informed you that the hardware/software that the Road Construction Supervisors use needs to be replaced. There are currently 37 supervisors across the state that use a standard notebook PC. Create a technology replacement plan.Prepare a 1-page document on the description of the project and resources you will need, also include another page that will have the project timeline and project budget.Below are examples of a timeline and budget. Please remember your timeline and budget will have different tasks and project costs.To create the timeline, please use Microsoft Project.To create the project costs spreadsheet, please use Microsoft Excel.Access to both of these programs are available through Rasmussen Digital Content Hub; the link is available in the Getting Started folder and the Course Materials folder.
CS 305 SNHU Eclipse and Create a File Called Suppression.Xml Programming Task
OverviewAs a software developer who develops secure code, you will need to add vulnerability assessments to your list of c ...
CS 305 SNHU Eclipse and Create a File Called Suppression.Xml Programming Task
OverviewAs a software developer who develops secure code, you will need to add vulnerability assessments to your list of code reviews. As an experienced programmer, you know that the code you write using a web application framework may only amount to a small percentage of the overall web application code base. Most of the code to be compiled or interpreted for execution is locked away in libraries. Your web application is dependent upon the code in these libraries, which represents a dependency vulnerability.In this assignment, you will have an opportunity to be proactive in DevSecOps! You will find potential security vulnerabilities using the OWASP dependency scanner. This is an open source scanner that points out potential security vulnerabilities known in the libraries of your code base. You can then make adjustments to your use of libraries based on the dependency check report. Implementing the dependency check process is highly recommended as part of DevSecOps. You have used a dependency check in the default configuration mode. Now, you will look at the configuration options to suppress the reporting of false positives.In this assignment, you will find that this is a good place to alter the current OWASP dependency check for the suppression of false-positive reporting. To do so, you will need to create a suppression.xml file and revise the code in the pom.xml file of your software application, in order to change the configuration settings of the dependency check in Maven and point to this suppression.xml file.PromptPlease follow the steps below to complete this assignment.Static Testing: Using the code base provided, edit the pom.xml file to integrate the Maven dependency check. You may want to reference the Integrating the Maven Dependency Check Plug-in Tutorial. Then, run a dependency check and identify the known vulnerabilities found. Submit the HTML dependency check report with the known vulnerabilities found.A dependency check will show false-positive vulnerabilities. It is important that you understand the false positives. You have been told that you cannot implement a fix at this time for the vulnerabilities identified because there is no solution that currently exists. However, you do not want this warning signal to pop up for the community of developers that will be testing the security of this code base.Reconfiguration: Sometimes, you have to live with an error until there is a fix for it. You must reconfigure the dependency check tool to stop the alarms for false positives by creating a suppression.xml file and revising the code in the pom.xml file to alter the configuration of the dependency check tool. By doing so, you will hide the false positives. Please note: The false positives are still there, but they won’t show up on the dependency check report. To reconfigure the dependency check tool, complete the following steps.Open the dependency report HTML file in a web browser.Click the suppress button next to the found vulnerability. See example below:Click on the Complete XML Doc button, then use Ctrl+C to copy the highlighted contents as shown below:Next, navigate back to the code base project in Eclipse and create a file called suppression.xml in the same directory as the pom.xml file.Add the contents you copied from the complete XML doc in Step C to the suppression.xml file you created.Edit the pom.xml file and add the following in the configuration section of the OWASP check:<suppressionFiles><suppressionFile>suppression.xml</suppressionFile></suppressionFiles>Verification: Finally, use Maven Run As to run the dependency check again to verify that all dependencies are valid and no false positives exist. Submit the HTML dependency check report showing that all dependencies found are valid and no false positives are present.In addition to the dependency check reports, be sure to zip the project folder in Eclipse and submit the refactored code including suppression.xml and the revised pom.xml file.Guidelines for SubmissionSubmit (1) the refactored code (which includes the suppression.xml file you created and the pom.xml file you revised) and (2) a text submission that includes the HTML link for the dependency check report before reconfiguration and the HTML link for the new dependency check report after the reconfiguration with no false positives shown.
4 pages
Moral Operating System
Technologists have a lot of power. In his TED presentation, Horowitz acknowledges that access to data gives people in the ...
Moral Operating System
Technologists have a lot of power. In his TED presentation, Horowitz acknowledges that access to data gives people in the tech world enormous power. ...
5 pages
Choosing Between Android And Ios
Android and iOS have a broad range of durability and stability, which has made a tremendous difference between these two ( ...
Choosing Between Android And Ios
Android and iOS have a broad range of durability and stability, which has made a tremendous difference between these two (Lazareska, 2017). They have ...
University of New Orleans Cybersecurity Handbook for New Employees Discussion Paper
OverviewIn this paper, you will create a Cybersecurity Handbook for New Employees for a selected organization. The goal of ...
University of New Orleans Cybersecurity Handbook for New Employees Discussion Paper
OverviewIn this paper, you will create a Cybersecurity Handbook for New Employees for a selected organization. The goal of this assignment is to align your training and awareness handbook to your company’s security risks, policies, and culture.TaskPart 1: Company Selection, Establish Cybersecurity and Risk Profile (50 points)In Part 1 you will choose a company from the Inc. Magazine “2020 Inc. 5000”, a list of the fastest-growing companies in America, located at https://www.inc.com/inc5000/2020 (Links to an external site.). When think of this, consider the organization you are examining in the final project effort.Write an executive-summary (about 2 pages) with the following information:Write a short summary of what your company does. When writing your summary answer questions such as, what products and services your business offers, what your customer base is, and the maturity of your organization (e.g. is it a startup or an established company?)Describe the company culture (company websites are great for this)Describe any regulatory/legal requirements that the company would have to followBased on its business and regulatory requirements and culture, summarize the overall security risks the company faces and the impact of those risks. Describe at least 3 specific risks from a cybersecurity perspective that you think are the most impactful and why. Be specific and leverage concepts from the class.Part 2: Develop a Cybersecurity “Handbook” for New Employees (50 points)As part of your role as a cyber analyst for your selected company, you are part of the team developing an overall security awareness and training program. One of your team’s deliverables is to develop a New Employee Handbook that provides BOTH awareness and training to your company’s new employees based on company security policies related to regulatory impacts and the risks you developed in Part 1.The goal of this handbook is to make new employees of your company aware of the company’s security policies, regulatory requirements and risks from a cybersecurity perspective.Your handbook should address and/or meet the following design requirements:Be long enough to cover everything below (about 3-4 pages in length)Use images, graphics or other creative content (Encouraged, but as a compliment and not a substitute to your content). In other words, I won’t accept 3-4 pages of graphics and images, but you may add those to your content to help emphasize a particular topic area.Focus on the 3 risks identified in Part 1Be a balance of awareness and training; Awareness – Create awareness for your new employees around regulatory/legal and cybersecurity risks and best practices. Training – Encourage the proper behaviors and expectations for new employeesNot be boring and must match the culture of the companyHint – I would do some research on examples of New Hire Cybersecurity Handbooks or something similar before starting. Please cite any sources as necessary.Formatting RequirementsThis paper should be 5-6 pages in length. Use a clearly legible font and font size (11 point is preferred).Use “Normal” margins (1” or less on all 4 sides). Use 1.5 or double line-spacing. Keep extra spacing between paragraphs limited. Assignments generally read better when you have headings for major section breaks. A great reference for formatting papers can be found on Digital Writing 101, How to Format Papers in Standard Academic Format Using Microsoft Word (Links to an external site.). RubricSecurity Handbook RubricSecurity Handbook RubricCriteriaRatingsPtsThis criterion is linked to a Learning OutcomeDescriptive short summary of companyAnswer questions such as, what products and services your business offers, what your customer base is, and the maturity of your organization (e.g. is it a startup or an established company?10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeDescribes company cultureInclude perceived risk appetite10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeDescribes potential regulatory/legal requirements10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeSummarize overall security risks faced by companyDescribe at least 3 specific risks from a cybersecurity perspective that you think are the most impactful and why. Be specific and leverage concepts from the class.20 ptsFull Marks0 ptsNo Marks20 ptsThis criterion is linked to a Learning OutcomeSecurity handbook contains sufficient contentAt least 3-4 pages in length10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeSecurity handbook contains relevant imagesUse images, graphics or other creative content (Encouraged, but as a compliment and not a substitute to your content). In other words, I won’t accept 3-4 pages of graphics and images, but you may add those to your content to help emphasize a particular topic area.10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeHandbook focus on at least 3 risks from part 110 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeHandbook is a balance of awareness and training - and interestingBe a balance of awareness and training; Awareness – Create awareness for your new employees around regulatory/legal and cybersecurity risks and best practices. Training – Encourage the proper behaviors and expectations for new employeesNot be boring and must match the culture of the company20 ptsFull Marks0 ptsNo Marks20 ptsTotal Points: 100
Similar Content
University of North Texas R vs Python Comparative Essay
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Pyth...
University of The Cumberlands Misleading Data Discussions
Part 1: What is your definition of misleading data? Describe some ways that data can be misleading.
Part 2: &...
University of North Texas Recovery of Hawaiian Airlines from Bankruptcy Paper
Topic: How did Hawaiian Airlines has survived in its business operations during the pandemic. How leadership handled its o...
SXYZ Emerging Threats and Countermeasures & Goal of Security Audits Essay
Subject: Emerging Threats and CountermeasuresWhat is the goal of security audits and the importance of establishing best p...
Clarity and order is imperative when designing program structures; for example:
The act of getting a glass of milk from the refrigerator. Specific steps must be taken and performed in a certain order. P...
Draw stakeholder role names on a stakeholder map with 4 quadrants and create questionnaire
Assessment 2 Background: Headspace is an organisation that works with youth aged 12 to 25 who experience mental ill ...
Wkinformation Security Management.edited
Which Information Assets Are Likely to be most Exposed When an organization is making information security investment deci...
Programming
The number of iterations is zero this is because in the while loop parenthesis “inventoryLeft ...
Data Science.edited
Characteristics of Big Data, and the main considerations in its processing When processing data we must consider data prot...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
RC Technology Replacement Plan Artificial Intelligence & Machine Learning Essay
The IT Director has just informed you that the hardware/software that the Road Construction Supervisors use needs to be re ...
RC Technology Replacement Plan Artificial Intelligence & Machine Learning Essay
The IT Director has just informed you that the hardware/software that the Road Construction Supervisors use needs to be replaced. There are currently 37 supervisors across the state that use a standard notebook PC. Create a technology replacement plan.Prepare a 1-page document on the description of the project and resources you will need, also include another page that will have the project timeline and project budget.Below are examples of a timeline and budget. Please remember your timeline and budget will have different tasks and project costs.To create the timeline, please use Microsoft Project.To create the project costs spreadsheet, please use Microsoft Excel.Access to both of these programs are available through Rasmussen Digital Content Hub; the link is available in the Getting Started folder and the Course Materials folder.
CS 305 SNHU Eclipse and Create a File Called Suppression.Xml Programming Task
OverviewAs a software developer who develops secure code, you will need to add vulnerability assessments to your list of c ...
CS 305 SNHU Eclipse and Create a File Called Suppression.Xml Programming Task
OverviewAs a software developer who develops secure code, you will need to add vulnerability assessments to your list of code reviews. As an experienced programmer, you know that the code you write using a web application framework may only amount to a small percentage of the overall web application code base. Most of the code to be compiled or interpreted for execution is locked away in libraries. Your web application is dependent upon the code in these libraries, which represents a dependency vulnerability.In this assignment, you will have an opportunity to be proactive in DevSecOps! You will find potential security vulnerabilities using the OWASP dependency scanner. This is an open source scanner that points out potential security vulnerabilities known in the libraries of your code base. You can then make adjustments to your use of libraries based on the dependency check report. Implementing the dependency check process is highly recommended as part of DevSecOps. You have used a dependency check in the default configuration mode. Now, you will look at the configuration options to suppress the reporting of false positives.In this assignment, you will find that this is a good place to alter the current OWASP dependency check for the suppression of false-positive reporting. To do so, you will need to create a suppression.xml file and revise the code in the pom.xml file of your software application, in order to change the configuration settings of the dependency check in Maven and point to this suppression.xml file.PromptPlease follow the steps below to complete this assignment.Static Testing: Using the code base provided, edit the pom.xml file to integrate the Maven dependency check. You may want to reference the Integrating the Maven Dependency Check Plug-in Tutorial. Then, run a dependency check and identify the known vulnerabilities found. Submit the HTML dependency check report with the known vulnerabilities found.A dependency check will show false-positive vulnerabilities. It is important that you understand the false positives. You have been told that you cannot implement a fix at this time for the vulnerabilities identified because there is no solution that currently exists. However, you do not want this warning signal to pop up for the community of developers that will be testing the security of this code base.Reconfiguration: Sometimes, you have to live with an error until there is a fix for it. You must reconfigure the dependency check tool to stop the alarms for false positives by creating a suppression.xml file and revising the code in the pom.xml file to alter the configuration of the dependency check tool. By doing so, you will hide the false positives. Please note: The false positives are still there, but they won’t show up on the dependency check report. To reconfigure the dependency check tool, complete the following steps.Open the dependency report HTML file in a web browser.Click the suppress button next to the found vulnerability. See example below:Click on the Complete XML Doc button, then use Ctrl+C to copy the highlighted contents as shown below:Next, navigate back to the code base project in Eclipse and create a file called suppression.xml in the same directory as the pom.xml file.Add the contents you copied from the complete XML doc in Step C to the suppression.xml file you created.Edit the pom.xml file and add the following in the configuration section of the OWASP check:<suppressionFiles><suppressionFile>suppression.xml</suppressionFile></suppressionFiles>Verification: Finally, use Maven Run As to run the dependency check again to verify that all dependencies are valid and no false positives exist. Submit the HTML dependency check report showing that all dependencies found are valid and no false positives are present.In addition to the dependency check reports, be sure to zip the project folder in Eclipse and submit the refactored code including suppression.xml and the revised pom.xml file.Guidelines for SubmissionSubmit (1) the refactored code (which includes the suppression.xml file you created and the pom.xml file you revised) and (2) a text submission that includes the HTML link for the dependency check report before reconfiguration and the HTML link for the new dependency check report after the reconfiguration with no false positives shown.
4 pages
Moral Operating System
Technologists have a lot of power. In his TED presentation, Horowitz acknowledges that access to data gives people in the ...
Moral Operating System
Technologists have a lot of power. In his TED presentation, Horowitz acknowledges that access to data gives people in the tech world enormous power. ...
5 pages
Choosing Between Android And Ios
Android and iOS have a broad range of durability and stability, which has made a tremendous difference between these two ( ...
Choosing Between Android And Ios
Android and iOS have a broad range of durability and stability, which has made a tremendous difference between these two (Lazareska, 2017). They have ...
University of New Orleans Cybersecurity Handbook for New Employees Discussion Paper
OverviewIn this paper, you will create a Cybersecurity Handbook for New Employees for a selected organization. The goal of ...
University of New Orleans Cybersecurity Handbook for New Employees Discussion Paper
OverviewIn this paper, you will create a Cybersecurity Handbook for New Employees for a selected organization. The goal of this assignment is to align your training and awareness handbook to your company’s security risks, policies, and culture.TaskPart 1: Company Selection, Establish Cybersecurity and Risk Profile (50 points)In Part 1 you will choose a company from the Inc. Magazine “2020 Inc. 5000”, a list of the fastest-growing companies in America, located at https://www.inc.com/inc5000/2020 (Links to an external site.). When think of this, consider the organization you are examining in the final project effort.Write an executive-summary (about 2 pages) with the following information:Write a short summary of what your company does. When writing your summary answer questions such as, what products and services your business offers, what your customer base is, and the maturity of your organization (e.g. is it a startup or an established company?)Describe the company culture (company websites are great for this)Describe any regulatory/legal requirements that the company would have to followBased on its business and regulatory requirements and culture, summarize the overall security risks the company faces and the impact of those risks. Describe at least 3 specific risks from a cybersecurity perspective that you think are the most impactful and why. Be specific and leverage concepts from the class.Part 2: Develop a Cybersecurity “Handbook” for New Employees (50 points)As part of your role as a cyber analyst for your selected company, you are part of the team developing an overall security awareness and training program. One of your team’s deliverables is to develop a New Employee Handbook that provides BOTH awareness and training to your company’s new employees based on company security policies related to regulatory impacts and the risks you developed in Part 1.The goal of this handbook is to make new employees of your company aware of the company’s security policies, regulatory requirements and risks from a cybersecurity perspective.Your handbook should address and/or meet the following design requirements:Be long enough to cover everything below (about 3-4 pages in length)Use images, graphics or other creative content (Encouraged, but as a compliment and not a substitute to your content). In other words, I won’t accept 3-4 pages of graphics and images, but you may add those to your content to help emphasize a particular topic area.Focus on the 3 risks identified in Part 1Be a balance of awareness and training; Awareness – Create awareness for your new employees around regulatory/legal and cybersecurity risks and best practices. Training – Encourage the proper behaviors and expectations for new employeesNot be boring and must match the culture of the companyHint – I would do some research on examples of New Hire Cybersecurity Handbooks or something similar before starting. Please cite any sources as necessary.Formatting RequirementsThis paper should be 5-6 pages in length. Use a clearly legible font and font size (11 point is preferred).Use “Normal” margins (1” or less on all 4 sides). Use 1.5 or double line-spacing. Keep extra spacing between paragraphs limited. Assignments generally read better when you have headings for major section breaks. A great reference for formatting papers can be found on Digital Writing 101, How to Format Papers in Standard Academic Format Using Microsoft Word (Links to an external site.). RubricSecurity Handbook RubricSecurity Handbook RubricCriteriaRatingsPtsThis criterion is linked to a Learning OutcomeDescriptive short summary of companyAnswer questions such as, what products and services your business offers, what your customer base is, and the maturity of your organization (e.g. is it a startup or an established company?10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeDescribes company cultureInclude perceived risk appetite10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeDescribes potential regulatory/legal requirements10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeSummarize overall security risks faced by companyDescribe at least 3 specific risks from a cybersecurity perspective that you think are the most impactful and why. Be specific and leverage concepts from the class.20 ptsFull Marks0 ptsNo Marks20 ptsThis criterion is linked to a Learning OutcomeSecurity handbook contains sufficient contentAt least 3-4 pages in length10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeSecurity handbook contains relevant imagesUse images, graphics or other creative content (Encouraged, but as a compliment and not a substitute to your content). In other words, I won’t accept 3-4 pages of graphics and images, but you may add those to your content to help emphasize a particular topic area.10 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeHandbook focus on at least 3 risks from part 110 ptsFull Marks0 ptsNo Marks10 ptsThis criterion is linked to a Learning OutcomeHandbook is a balance of awareness and training - and interestingBe a balance of awareness and training; Awareness – Create awareness for your new employees around regulatory/legal and cybersecurity risks and best practices. Training – Encourage the proper behaviors and expectations for new employeesNot be boring and must match the culture of the company20 ptsFull Marks0 ptsNo Marks20 ptsTotal Points: 100
Earn money selling
your Study Documents