Description
I have program assignment for visual studio
I need help with it
Please see the file
Unformatted Attachment Preview
Write a program that reads a file consisting of students’ test scores in the range 0-200. It should then
determine the number of students having scores in each of the following ranges: 0-24, 25-49, 50-74, 7599, 100-124, 125-149, 150-174 and 175-200. Use labels to display the score ranges and the number of
students for each range. The data file, testscores.txt, is located in the I:\kopp\outbox\CS 313
01\Program Assignment folder.
REQUIRED: You must use an array to hold the scores that are read from the file.
Extra Credit 5 points:
Add a check box to the form. When the checkbox is selected, the program should display on the form
the class average.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hello, he...
Completion Status:
100%
Review
Review
Anonymous
Just the thing I needed, saved me a lot of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
George Mason University Malicious Malwares Discussion
Note: Discussion questions and Paper are independent tasks. Please provide them in separate documents.1. Discussion Questi ...
George Mason University Malicious Malwares Discussion
Note: Discussion questions and Paper are independent tasks. Please provide them in separate documents.1. Discussion Questions:Answer the below discussion questions each in 1 full page and list out references.a.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.b. What are some of the rules you should follow with packet filtering firewalls? 2. Case Study in full APA format:Choose 1 of the 3 projects mentioned below (Project 4.1, 4.2 or 4.3). Once you make your choice write a 4 page paper that presents your findings. Make sure you adhere to the writing rubric, which includes citing your sources to include personal interviews.Project 4.1: Finding Firewall Solutions in Your Organization Contact an organization you are associated with (an employer, your school, a local company, etc.). Explain to the organization that you are doing a school project and arrange to discuss its firewall solution with the network administrator. Determine why the organization selected its solution. Was cost a major factor? Was ease of use a major factor? What features were most important to them? Explain your findings and discuss whether you agree or disagree with that organization’s choice.Project 4.2: Finding a Different SOHO Solution Using the Web or other resources, find a SOHO firewall not mentioned in this chapter. Briefly compare it to the solutions that were mentioned in the chapter. Evaluate whether the firewall you found is a better choice than the ones mentioned in the chapter and discuss why or why not. Project 4.3: Selecting the Proper Firewall Analyze the environment of your academic institution. Is it a medium-sized network or enterprise? What types of users utilize the network? Are there multiple operating systems? Is there sensitive data that requires additional security? Based on the factors you analyze, write a brief essay describing the environment and recommending a firewall solution. Explain your recommendation.Please use this strategy when you analyze a case:Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).List all indicators (including stated "problems") that something is not as expected or as desired.Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.Identify the areas that need improvement (use theories from your textbook)Specify and prioritize the criteria used to choose action alternatives.Discover or invent feasible action alternatives.Examine the probable consequences of action alternatives.Select a course of action.Design and implementation plan/schedule.Create a plan for assessing the action to be implemented.Conclusion (every paper should end with a strong conclusion or summary)Paper Writing Requirements:4-5 full pages in length (excluding cover page, abstract, and reference list)Use APA 6th edition format to complete the paper.Include proper citations and references in the paperUse the page break featureNo Plagiarism
Concepts for Cybersecurity Paper
Journalists and others sometimes mix phrases for cybersecurity concepts.The public can pick up these misnomers, resulting ...
Concepts for Cybersecurity Paper
Journalists and others sometimes mix phrases for cybersecurity concepts.The public can pick up these misnomers, resulting in confusion.Confusion during meetings between technology practitioners and management wastes time that could otherwise be useful to make progress toward solving a problem (perhaps some of you have sat through a frustrating first half of a meeting where this disconnect was gradually discovered by those present).Some basic vocabulary definitions must be reinforced for cybersecurity practitioners to reduce the confusion that can creep into conversations and meetings.Please write about these concepts listed below and support your definitions and discussions with reference sources that do not confuse the definitions. In a minimum of 450 words, discuss the two topics below. Define and differentiate Vulnerability, Risk, and ThreatDefine the term "Zero-Day Exploit".Discuss some recent examples where one or two ZDEs were used to bypass cybersecurity controls to open a hole in vulnerable Critical Infrastructures, SCADA systems, or Industrial Control Systems (ICS) so malicious code could enter to cause disruptive effects.Describe how ZDEs can possibly be used by nation states, criminals, and political extremists. References Kumar, A. (2014, January 13). Zero Day Exploit. doi:10.2139/ssrn.2378317 Theodora, L. (2010, September 17). Critical Infrastructure Security and Industrial Control Systems. doi:10.2139/ssrn.1692827
New England College Web Apps and Policy Compliance Discussion
Topic 1 You are the web master of a college website. You share a server with other school departments such as accounting a ...
New England College Web Apps and Policy Compliance Discussion
Topic 1 You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.Write your answer using a WORD document. Do your own work and use your own wordsTopic 2 Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?2. How has the term hacking changed meaning over the years?3. What is the most dangerous hacker tool?4. From the news: How were NSA's hacker tools compromised? 5. What was the vulnerability in the Target Breach?6. What do you think of hactivism?7. How did Stuxnet work? 8. What was the Arpanet?9. Deep brain stimulation is a treatment for Parkinson's disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?10. What is the Red Team?Topic 3 Do a bit of research on JSON and AJAX.How do they relate to the the Same-Origin policy?Using WORD, write several short paragraphs on each. A total of 200-300 words. Use your own words and do not copy the work of another student.Attach your WORD document here.
California State University - Fullerton Developing a Home Network Homework
PROJECT SUMMARY:You have been asked to submit a proposal to a client who has just bought a single-floor house. The proposa ...
California State University - Fullerton Developing a Home Network Homework
PROJECT SUMMARY:You have been asked to submit a proposal to a client who has just bought a single-floor house. The proposal is on the analysis and design of the home network in the house. You, in preparing the proposal, must decide on the architecture, topology, and network hardware and software of the house’s new network.BACKGROUND:Your college friend, John Smith, just bought a single story house in Southern California. He intends for the home to have a state-of-the-art home network. Because Mr. Smith knows you personally, he asked you to submit a proposal on the network and all associated hardware and software. Knowing that you are an expert in networks, Mr. Smith is depending on you to analyze and design a network for his new home.HIGH LEVEL REQUIREMENTS:In speaking with Mr. Smith over lunch one day, you have gathered the following high-level requirements from him. These requirements are shown below in the form of quotes from Mr. SmithI want the house “wired with fast network”Get me “the fastest internet connection you can get”The living room, the study, and the bedrooms need to have wired network connections for computers/network devices.Mr. Smith recently bought a laptop. It is Dell XPS 15 Ultrabook with 7thGeneration Inetcore i9 processor; it also has a 4K Ultra HD (3840 x 2160) display and a 1.0 TB SSD (Costco, 2019). Mr. Smith uses the laptop for general business applications and web surfing. He does not play online games.The study needs to have “a networked color laser printer.”“The living room in the house should have a network-connected, high definition, flat-panel, LED TV” (50 Inch Tv)In the new home, there are one dining room,one study/library, one living room, one master bedroom, and one guest bedroom.Mr. Smith does not want to pay for TV (no cable TV or satellite TV). But he does want a TV that can connect to Netflix and Roku services.CONTENTS OF PROPOSAL REPORTYou have been asked to submit a proposal for building the home’s new network. Mr. Smith requires a network proposal that includes the following sections:1. Executive Summary: A description of the objectives of the proposal and a high-level summary of the report.2. Network Analysis: Described Below.3. Technology Design: Described Below.4. Cost Assessment: Described below5. Bibliographical Refrences: Described Below.NETWORK ANALYSIS SECTIONThe network analysis section consists of two subsections: Need Analysis subsection and Logical Network Diagram Subsection.Needs AnalysisThe needs analysis subsection basically contains the requirements of the network. You need to conduct a NEEDS ANALYSIS to come up with the specific requirements (i.e., more detailed than general requirements shown above) of the network. The Needs Analysis will look at:Needs and requirements of the user (John Smith)Various applications necessary to support those needs. For examples, Netflix is an application, printing is an application, and web surfing is an application.Data rate needed to support those applications.Needs Analysis must be detailed enough so that you can justify the solutions that you recommend in the proposal.After determining the needs, you then generate a logical network diagram.Logical Network DiagramThe logical network diagram subsection needs to include, at a minimum, the following:A logical network diagram of the network based on the network requirements (gathered as part of Needs Analysis)A description of the logical network diagram and how it’s different parts fir together to form a home network.A logical network diagram resembles “block diagram” of the network connected together. Examples are shown in Figure 1-1 Attached below. In the logical network diagram, each network block is labeled generically (e.g., “router”, “printer”, “TV”, etc) and no manufacturer name and model number needed on the diagram.Note that the logical network diagram would contain both LAN and wide-area network connection to the Internet. Discuss how you would connect the home’s LAN to the Internet.TECHNOLOGY DESIGN SECTIONTechnology design refines the logical network diagram generated and produces a physical design that will meet the requirements. The technology Design section consists primarily of Physical Design. In this report, you only have to produce a Preliminary Physical Design.The Preliminary Physical Design needs to include, at a minimum, the following:- Exact configuration of each piece of hardware (e.g., router, printer, TV, etc.) such as manufacture’s names and models, and brief description (in your own words with citations and references) of each piece.COST ASSESSMENT SECTIONAfter you have gathered the exact configuration (manufacturer’s name/model number) of each piece of hardware (and software), present a detailed cost estimate of the entire network. The cost assessment section should include a detailed cost assessment of the network. Including cable, hardware, software, and labor. (Assume that 300ft. of cable is needed for the home network.)Labor is an important component of cost, so include cost of labor required to install the network. Use a planning figure of $300/person-hour and estimate the cost of labor required to implement the network.In addition, include the ongoing, operational cost of the network (such as monthly Internet Service Provider free or any periodic maintenance cost) for three years. In other words, present both initial, fixed cost of the network and the ongoing, operational cost of operating the network. An explanation of different cost items is required.NotesAs with any real-life problem with ambiguities or unsolved considerations, you must make your own assumptions, but be sure to explicitly state any assumptions. Feel free to find materials that support your recommendations.BIBLIOGRAPHICAL REFERENCES SECTIONThis section will have a list of references used in the report. Note that in addition to references in this section, the report also needs to have specific in-text citations in the body of the report.PROPER CITATIONS AND REFERENCES:1. Be creative in presenting your planning and analysis. You should research, glean and include materials necessary to appropriately communicate and understanding of the system. You need to write the report in your own words and give proper credits to sources you use.2. If you quote a source word-for-word, do the following:Put a pair of quotation marks around the quoted sentence(s), And give the citation (author, date, and page number) in parenthesis directly in text right after the quoted sentence(s).Put the full reference at the end of the report under the references section.3. If you paraphrase a source, do the following:Give the citation (author and date) in parenthesis directly in the text right after the paraphrased sentence(s).Put the full reference at the end of the report under the References section.4. All references listed under the References section must be cited in the text. There should be no “orphan” reference in the References section.5.Remember: its not enough to simply include the full reference at the end of the report under the References section. YOU HAVE TO PROVIDE THE IN-TEXT CITATION DIRECTLY IN THE TEXT ALSO.WHAT TO DO:The report must be typed.The various diagrams must be drawn using software such as Visio. Visio is easier to use for drawing diagrams.Draw tour own diagrams, don’t copy them from manufatures’ website.Use the reference section to list all sources (online and in hardcopy form) or materials used.The length should be between 1,500 and 2,000 words (not counting the Reference section, tables, and figures).WHAT NOT TO DO:Do not clutter your report with unnecessary drawings and diagrams that do not add to the substance and clarity of the report.Do not blindly copy manufactures diagramsDo not plagiarize.
University of the Cumberlands DVWA Setup & Responses
Needs to do setup and This week you will watch Setting Up Damn Vulnerable Web Applications (DVWA) Environment
at
htt ...
University of the Cumberlands DVWA Setup & Responses
Needs to do setup and This week you will watch Setting Up Damn Vulnerable Web Applications (DVWA) Environment
at
https://www.youtube.com/watch?v=cak2lQvBRAo
Post a Screen shot and Discuss the advantages and disadvantages of (DVWA)
Post 1 ManasaDVWA has numerous vulnerability as its name attest. It has been used in institutions and by professional in companies to either train or sharpen their skills in hacking. There are four levels of vulnerabilities: low, medium followed by high and finally impossible, which offers a good ground to sharpen once skills with the various levels or from the level one is.Experience:Since I had installed VMware which was using port 80 I had to configure the listening port for xampp apache to 8080 and call it from that port.AdvantagesIt is easy to install and run, in case you are stuck, there are a dozen YouTube video that can help to do that.It is considered the best place to do, practice, and sharpen hacking skills.Since the app runs on a local server, which is directly connected, to the user then it is legal.DisadvantagesSince it is freely available online black hat hackers to train and latter launch successful attacks can use it.
Post 2 SatyanarayanaDVWA is a web application developed in both PHP and MySQL. It is designed in a way that it is seriously vulnerable. Its main purpose was to serve the it security professionals (Kumar & Taterh, 2016).Some of its advantages include:It allows professionals to test their skills in a legal environmentIt acts as a tool (sandbox) to teach and train student in the field of security in a safe environment.One can change the vulnerability level and test the various techniques that would be utilized by hackers.It is open source and any student or professional does not require permission to install and use it.Its installation process is very simple.Despite the many advantages, this application has its limitations, which include:Accessible by cybercriminals who train the same as those who are to prevent them and in some cases, the bad people are better than those who are trained to prevent (Kumar & Taterh, 2016) t them.Curious student my find themselves after a few training, trying to attack real world website for instance to change their grades which is illegal.Another issue is its limited diversity. The application mainly focusses on web attacks and does not consider other attacks such as WPA among others.
Technology Evaluation Study Plan – Detailed Assignment Description
DEVELOP YOUR EVALUATION STUDY PLAN Use your study design to prepare a high-level plan for your evaluation study. Your pla ...
Technology Evaluation Study Plan – Detailed Assignment Description
DEVELOP YOUR EVALUATION STUDY PLAN Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following: Introduction description of the emerging technology and justification for including it in an evaluation study Research Question(s) These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security. Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course). Examples What vulnerabilities exist that could be attacked to compromise confidentiality? How could an attacker compromise availability? For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer). Methods high level design of the study (focus upon the evaluation model and your research questions) description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated) notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study) Limitations or Special Considerations any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems) Timeline of Events (Notional) A notional timeline (expressed in days or months after start date) for your study
Similar Content
IT 201 Saudi Electronic University Virtual Career Fair and Physical Career Fair Questions
College of Computing and Informatics
Assignment 1
Deadline: Day 12/10/2021 @ 23:59
[Total Mark for this Assignment is 5]
...
I need help to solve the line losses figures
I need a person to divid and compare the line losses figure of 1 years progressive figures into up coming 12 months with r...
Appointment Java Project
P9.3 Implement a superclass Appointment and subclasses Onetime, Daily, and Monthly. An appointment has a description (for ...
Computer Science Discussion
This week the focus turns to the future as we talk about trends in information systems. Describe the current trends ...
Which type of virtual switch would you select if you want the VM to connect to t
Which type of virtual switch
would you select if you want the VM to connect to the Internet?
...
CTEC 350 Survey of Intrusion Detection Systems Questions
...
Pmjdss
Costs are a crucial facet of a project, which affects the project's execution plan directly and indirectly. Project cost m...
Cpu Scheduling
CPU scheduling refers to the order of determining the process events that should be executed while the others are put on h...
Converted
A C# program consists of one or more source files, known formally as compilation units. Java is a strongly typed language....
Related Tags
Book Guides
The BFG
by Roald Dahl
Faust
by Johann Wolfgang von Goethe
Pride and Prejudice
by Jane Austen
Invisible Man
by Ralph Ellison
Narrative of the Life of Frederick Douglass
by Frederick Douglass
Harry Potter and the Sorcerers Stone
by J. K. Rowling
The Woman in the Window
by A. J. Finn
Heart of Darkness
by Joseph Conrad
The Handmaids Tale
by Margaret Atwood
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
George Mason University Malicious Malwares Discussion
Note: Discussion questions and Paper are independent tasks. Please provide them in separate documents.1. Discussion Questi ...
George Mason University Malicious Malwares Discussion
Note: Discussion questions and Paper are independent tasks. Please provide them in separate documents.1. Discussion Questions:Answer the below discussion questions each in 1 full page and list out references.a.Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.b. What are some of the rules you should follow with packet filtering firewalls? 2. Case Study in full APA format:Choose 1 of the 3 projects mentioned below (Project 4.1, 4.2 or 4.3). Once you make your choice write a 4 page paper that presents your findings. Make sure you adhere to the writing rubric, which includes citing your sources to include personal interviews.Project 4.1: Finding Firewall Solutions in Your Organization Contact an organization you are associated with (an employer, your school, a local company, etc.). Explain to the organization that you are doing a school project and arrange to discuss its firewall solution with the network administrator. Determine why the organization selected its solution. Was cost a major factor? Was ease of use a major factor? What features were most important to them? Explain your findings and discuss whether you agree or disagree with that organization’s choice.Project 4.2: Finding a Different SOHO Solution Using the Web or other resources, find a SOHO firewall not mentioned in this chapter. Briefly compare it to the solutions that were mentioned in the chapter. Evaluate whether the firewall you found is a better choice than the ones mentioned in the chapter and discuss why or why not. Project 4.3: Selecting the Proper Firewall Analyze the environment of your academic institution. Is it a medium-sized network or enterprise? What types of users utilize the network? Are there multiple operating systems? Is there sensitive data that requires additional security? Based on the factors you analyze, write a brief essay describing the environment and recommending a firewall solution. Explain your recommendation.Please use this strategy when you analyze a case:Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).List all indicators (including stated "problems") that something is not as expected or as desired.Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.Identify the areas that need improvement (use theories from your textbook)Specify and prioritize the criteria used to choose action alternatives.Discover or invent feasible action alternatives.Examine the probable consequences of action alternatives.Select a course of action.Design and implementation plan/schedule.Create a plan for assessing the action to be implemented.Conclusion (every paper should end with a strong conclusion or summary)Paper Writing Requirements:4-5 full pages in length (excluding cover page, abstract, and reference list)Use APA 6th edition format to complete the paper.Include proper citations and references in the paperUse the page break featureNo Plagiarism
Concepts for Cybersecurity Paper
Journalists and others sometimes mix phrases for cybersecurity concepts.The public can pick up these misnomers, resulting ...
Concepts for Cybersecurity Paper
Journalists and others sometimes mix phrases for cybersecurity concepts.The public can pick up these misnomers, resulting in confusion.Confusion during meetings between technology practitioners and management wastes time that could otherwise be useful to make progress toward solving a problem (perhaps some of you have sat through a frustrating first half of a meeting where this disconnect was gradually discovered by those present).Some basic vocabulary definitions must be reinforced for cybersecurity practitioners to reduce the confusion that can creep into conversations and meetings.Please write about these concepts listed below and support your definitions and discussions with reference sources that do not confuse the definitions. In a minimum of 450 words, discuss the two topics below. Define and differentiate Vulnerability, Risk, and ThreatDefine the term "Zero-Day Exploit".Discuss some recent examples where one or two ZDEs were used to bypass cybersecurity controls to open a hole in vulnerable Critical Infrastructures, SCADA systems, or Industrial Control Systems (ICS) so malicious code could enter to cause disruptive effects.Describe how ZDEs can possibly be used by nation states, criminals, and political extremists. References Kumar, A. (2014, January 13). Zero Day Exploit. doi:10.2139/ssrn.2378317 Theodora, L. (2010, September 17). Critical Infrastructure Security and Industrial Control Systems. doi:10.2139/ssrn.1692827
New England College Web Apps and Policy Compliance Discussion
Topic 1 You are the web master of a college website. You share a server with other school departments such as accounting a ...
New England College Web Apps and Policy Compliance Discussion
Topic 1 You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.Write your answer using a WORD document. Do your own work and use your own wordsTopic 2 Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?2. How has the term hacking changed meaning over the years?3. What is the most dangerous hacker tool?4. From the news: How were NSA's hacker tools compromised? 5. What was the vulnerability in the Target Breach?6. What do you think of hactivism?7. How did Stuxnet work? 8. What was the Arpanet?9. Deep brain stimulation is a treatment for Parkinson's disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?10. What is the Red Team?Topic 3 Do a bit of research on JSON and AJAX.How do they relate to the the Same-Origin policy?Using WORD, write several short paragraphs on each. A total of 200-300 words. Use your own words and do not copy the work of another student.Attach your WORD document here.
California State University - Fullerton Developing a Home Network Homework
PROJECT SUMMARY:You have been asked to submit a proposal to a client who has just bought a single-floor house. The proposa ...
California State University - Fullerton Developing a Home Network Homework
PROJECT SUMMARY:You have been asked to submit a proposal to a client who has just bought a single-floor house. The proposal is on the analysis and design of the home network in the house. You, in preparing the proposal, must decide on the architecture, topology, and network hardware and software of the house’s new network.BACKGROUND:Your college friend, John Smith, just bought a single story house in Southern California. He intends for the home to have a state-of-the-art home network. Because Mr. Smith knows you personally, he asked you to submit a proposal on the network and all associated hardware and software. Knowing that you are an expert in networks, Mr. Smith is depending on you to analyze and design a network for his new home.HIGH LEVEL REQUIREMENTS:In speaking with Mr. Smith over lunch one day, you have gathered the following high-level requirements from him. These requirements are shown below in the form of quotes from Mr. SmithI want the house “wired with fast network”Get me “the fastest internet connection you can get”The living room, the study, and the bedrooms need to have wired network connections for computers/network devices.Mr. Smith recently bought a laptop. It is Dell XPS 15 Ultrabook with 7thGeneration Inetcore i9 processor; it also has a 4K Ultra HD (3840 x 2160) display and a 1.0 TB SSD (Costco, 2019). Mr. Smith uses the laptop for general business applications and web surfing. He does not play online games.The study needs to have “a networked color laser printer.”“The living room in the house should have a network-connected, high definition, flat-panel, LED TV” (50 Inch Tv)In the new home, there are one dining room,one study/library, one living room, one master bedroom, and one guest bedroom.Mr. Smith does not want to pay for TV (no cable TV or satellite TV). But he does want a TV that can connect to Netflix and Roku services.CONTENTS OF PROPOSAL REPORTYou have been asked to submit a proposal for building the home’s new network. Mr. Smith requires a network proposal that includes the following sections:1. Executive Summary: A description of the objectives of the proposal and a high-level summary of the report.2. Network Analysis: Described Below.3. Technology Design: Described Below.4. Cost Assessment: Described below5. Bibliographical Refrences: Described Below.NETWORK ANALYSIS SECTIONThe network analysis section consists of two subsections: Need Analysis subsection and Logical Network Diagram Subsection.Needs AnalysisThe needs analysis subsection basically contains the requirements of the network. You need to conduct a NEEDS ANALYSIS to come up with the specific requirements (i.e., more detailed than general requirements shown above) of the network. The Needs Analysis will look at:Needs and requirements of the user (John Smith)Various applications necessary to support those needs. For examples, Netflix is an application, printing is an application, and web surfing is an application.Data rate needed to support those applications.Needs Analysis must be detailed enough so that you can justify the solutions that you recommend in the proposal.After determining the needs, you then generate a logical network diagram.Logical Network DiagramThe logical network diagram subsection needs to include, at a minimum, the following:A logical network diagram of the network based on the network requirements (gathered as part of Needs Analysis)A description of the logical network diagram and how it’s different parts fir together to form a home network.A logical network diagram resembles “block diagram” of the network connected together. Examples are shown in Figure 1-1 Attached below. In the logical network diagram, each network block is labeled generically (e.g., “router”, “printer”, “TV”, etc) and no manufacturer name and model number needed on the diagram.Note that the logical network diagram would contain both LAN and wide-area network connection to the Internet. Discuss how you would connect the home’s LAN to the Internet.TECHNOLOGY DESIGN SECTIONTechnology design refines the logical network diagram generated and produces a physical design that will meet the requirements. The technology Design section consists primarily of Physical Design. In this report, you only have to produce a Preliminary Physical Design.The Preliminary Physical Design needs to include, at a minimum, the following:- Exact configuration of each piece of hardware (e.g., router, printer, TV, etc.) such as manufacture’s names and models, and brief description (in your own words with citations and references) of each piece.COST ASSESSMENT SECTIONAfter you have gathered the exact configuration (manufacturer’s name/model number) of each piece of hardware (and software), present a detailed cost estimate of the entire network. The cost assessment section should include a detailed cost assessment of the network. Including cable, hardware, software, and labor. (Assume that 300ft. of cable is needed for the home network.)Labor is an important component of cost, so include cost of labor required to install the network. Use a planning figure of $300/person-hour and estimate the cost of labor required to implement the network.In addition, include the ongoing, operational cost of the network (such as monthly Internet Service Provider free or any periodic maintenance cost) for three years. In other words, present both initial, fixed cost of the network and the ongoing, operational cost of operating the network. An explanation of different cost items is required.NotesAs with any real-life problem with ambiguities or unsolved considerations, you must make your own assumptions, but be sure to explicitly state any assumptions. Feel free to find materials that support your recommendations.BIBLIOGRAPHICAL REFERENCES SECTIONThis section will have a list of references used in the report. Note that in addition to references in this section, the report also needs to have specific in-text citations in the body of the report.PROPER CITATIONS AND REFERENCES:1. Be creative in presenting your planning and analysis. You should research, glean and include materials necessary to appropriately communicate and understanding of the system. You need to write the report in your own words and give proper credits to sources you use.2. If you quote a source word-for-word, do the following:Put a pair of quotation marks around the quoted sentence(s), And give the citation (author, date, and page number) in parenthesis directly in text right after the quoted sentence(s).Put the full reference at the end of the report under the references section.3. If you paraphrase a source, do the following:Give the citation (author and date) in parenthesis directly in the text right after the paraphrased sentence(s).Put the full reference at the end of the report under the References section.4. All references listed under the References section must be cited in the text. There should be no “orphan” reference in the References section.5.Remember: its not enough to simply include the full reference at the end of the report under the References section. YOU HAVE TO PROVIDE THE IN-TEXT CITATION DIRECTLY IN THE TEXT ALSO.WHAT TO DO:The report must be typed.The various diagrams must be drawn using software such as Visio. Visio is easier to use for drawing diagrams.Draw tour own diagrams, don’t copy them from manufatures’ website.Use the reference section to list all sources (online and in hardcopy form) or materials used.The length should be between 1,500 and 2,000 words (not counting the Reference section, tables, and figures).WHAT NOT TO DO:Do not clutter your report with unnecessary drawings and diagrams that do not add to the substance and clarity of the report.Do not blindly copy manufactures diagramsDo not plagiarize.
University of the Cumberlands DVWA Setup & Responses
Needs to do setup and This week you will watch Setting Up Damn Vulnerable Web Applications (DVWA) Environment
at
htt ...
University of the Cumberlands DVWA Setup & Responses
Needs to do setup and This week you will watch Setting Up Damn Vulnerable Web Applications (DVWA) Environment
at
https://www.youtube.com/watch?v=cak2lQvBRAo
Post a Screen shot and Discuss the advantages and disadvantages of (DVWA)
Post 1 ManasaDVWA has numerous vulnerability as its name attest. It has been used in institutions and by professional in companies to either train or sharpen their skills in hacking. There are four levels of vulnerabilities: low, medium followed by high and finally impossible, which offers a good ground to sharpen once skills with the various levels or from the level one is.Experience:Since I had installed VMware which was using port 80 I had to configure the listening port for xampp apache to 8080 and call it from that port.AdvantagesIt is easy to install and run, in case you are stuck, there are a dozen YouTube video that can help to do that.It is considered the best place to do, practice, and sharpen hacking skills.Since the app runs on a local server, which is directly connected, to the user then it is legal.DisadvantagesSince it is freely available online black hat hackers to train and latter launch successful attacks can use it.
Post 2 SatyanarayanaDVWA is a web application developed in both PHP and MySQL. It is designed in a way that it is seriously vulnerable. Its main purpose was to serve the it security professionals (Kumar & Taterh, 2016).Some of its advantages include:It allows professionals to test their skills in a legal environmentIt acts as a tool (sandbox) to teach and train student in the field of security in a safe environment.One can change the vulnerability level and test the various techniques that would be utilized by hackers.It is open source and any student or professional does not require permission to install and use it.Its installation process is very simple.Despite the many advantages, this application has its limitations, which include:Accessible by cybercriminals who train the same as those who are to prevent them and in some cases, the bad people are better than those who are trained to prevent (Kumar & Taterh, 2016) t them.Curious student my find themselves after a few training, trying to attack real world website for instance to change their grades which is illegal.Another issue is its limited diversity. The application mainly focusses on web attacks and does not consider other attacks such as WPA among others.
Technology Evaluation Study Plan – Detailed Assignment Description
DEVELOP YOUR EVALUATION STUDY PLAN Use your study design to prepare a high-level plan for your evaluation study. Your pla ...
Technology Evaluation Study Plan – Detailed Assignment Description
DEVELOP YOUR EVALUATION STUDY PLAN Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following: Introduction description of the emerging technology and justification for including it in an evaluation study Research Question(s) These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security. Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course). Examples What vulnerabilities exist that could be attacked to compromise confidentiality? How could an attacker compromise availability? For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer). Methods high level design of the study (focus upon the evaluation model and your research questions) description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated) notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study) Limitations or Special Considerations any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems) Timeline of Events (Notional) A notional timeline (expressed in days or months after start date) for your study
Earn money selling
your Study Documents