Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges? Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?

Cybersecurity software

During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.

For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:

1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:

Kali Linux

2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?

3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?

For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed? How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Report of Linux Server

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

Provide an analysis of the report. You decide to highlight what you think the company should address first and how you would mitigate some of the top threats.

Vulnerability Management Process

Congratulations! Your boss, Judy “Mac” McNamara, thought you did a great job on your Vulnerability Management Process recommendation and analysis of the Open VAS vulnerability report. However, the boss doesn’t think the free OpenVAS tool will provide the high-level presentation reporting and support needed by Mercury USA. Now, Judy would like you to evaluate the leading commercial vulnerability scanner, Nessus. Fortunately, Judy had asked someone in the IT department to install and configure a 30-day evaluation copy of Nessus. She hands you a recent Nessus report from IT that has a few more systems added, and with a wry smile adds, “It looks like there’s some really bad stuff in there!”

Judy would like you to provide an analysis of the report. You decide to highlight what you think the company should address first and how you would mitigate some of the top threats.

In addition, Judy wants to know your thoughts on Nessus, since it’s expensive. You now realize that you need to ensure due diligence has been performed before making a purchase recommendation to executive management.

Project 2: VM Scanner Background Report—A four- to six-page background report to review a commercial scanning tool and provide a recommendation

Suggest an appropriate null hypothesis for this study. How could ‘driving skills’ be measured in this study? Evaluate the measurement of driving skills you suggested for this study.

Research Methods

1. Psychologists want to investigate if there is a correlation between how interested a person is in cars and their driving skills.
a. Suggest an appropriate null hypothesis for this study.
b. How could ‘driving skills’ be measured in this study?
c. Evaluate the measurement of driving skills you suggested for this study.
d. Suggest an appropriate sampling method to be used in this study, justify your answer.
e. Give one strength and one weakness of the sampling method you have chosen for this study.

Identify User Roles for the application and consolidate them. Choose 2 important user roles and create a persona for each one. Create a set of user stories using the user roles and low-fidelity prototype to help you. Check your user stories with INVEST. Create acceptance tests of your user stories

CASE STUDY

You are required to use the scenario to do the following:
a) Read through the CASE STUDY (attached)
b) Identify stakeholders.
c) Build a power/interest matrix and decide how you will communicate with stakeholders during the project.
d) Identify User Roles for the application and consolidate them.
e) Choose 2 important user roles and create a persona for each one.
f) Create a set of user stories using the user roles and low-fidelity prototype to help you. Check your user stories with INVEST
g) Create acceptance tests of your user stories

Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking while the database is in operation

 

Read the following articles ( links attached) and incorporate them into your paper. You are encouraged to review additional articles as well.

-An Introduction of NoSQL Databases Based on Their Categories and Application Industries.
-Software Development Lifecycle for Energy Efficiency: Techniques and Tools.
-First Things First: Adopting a Holistic, Needs-Driven Approach to Improving the Quality of Routinely Collected Data.
-Approaches to Speed Up Data Processing in Relational Databases.

Instructions

Write a 2–3 page paper in which you:

-Recommend at least three specific tasks that could be performed to improve the quality of data sets using the software development life cycle (SDLC) methodology. Include a thorough description of each activity per each phase.
-Recommend the actions that should be performed to optimize record selections and to improve database performance from a quantitative data quality assessment.
-Suggest three maintenance plans and three activities that could be performed to improve data quality.
-Suggest methods that would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.
-Analyze how the method can be used to plan out the system effectively and ensure that the number of transactions does not produce record-level locking while the database is in operation

What causes such a great controversy between proponents and anti-Artificial Intelligence groups. Will Artificial Intelligence bring Us Convenience? Can Artificial Intelligence replace humans?

Artificial Intelligence (AI)

What causes such a great controversy between proponents and anti-Artificial Intelligence groups. Will Artificial Intelligence bring Us Convenience? Can Artificial Intelligence replace humans?

What kind of changes do Electric Cars bring to the vehicle industry? What value Electric Cars will create in terms of sustainability?

USING ANALYTICS TO UNDERSTAND THE IMPACT OF ELECTRIC VEHICLES: IN TERMS OF SUSTAINABILITY

Research questions –

RQ1. The prediction of how the number of Electric vehicles grows (eg. percentage-wise in 2025 or 2030)
RQ2. What kind of changes do Electric Cars bring to the vehicle industry?
RQ3. What value Electric Cars will create in terms of sustainability?

Where are you taking your dataset? Is your project based on any other reference project (Stanford Univ. or MIT)? How does your project differ from the reference project?

LIP READING DRIVEN DEEP LEARNING APPROACH FOR SPEECH ENHANCEMENT

1. Introduction: One-page introduction of your project.

2. Literature Review Summary Table
Kindly go through projects, review papers related to your project and study them. A minimum of at least five projects/papers should be reviewed so that you have a considerable understanding of what is achieved in your project area. should be well defined with clear background information along with unique features of your project.

. Innovation component in the project: The most innovative part of your project should be explained. How does your project defer from others and the routine experimental results?

5. Work done and implementation
a. Methodology adapted: The Methodology used should be discussed in detail. Hardware and software requirements must also be mentioned.
b. Dataset used:

  • a. Where are you taking your dataset? Narrow down your data to what is needed.
  • b. Is your project based on any other reference project (Stanford Univ. or MIT)?
  • c. How does your project differ from the reference project?

c. Tools used: Clear and concise explanation as to why you selected a tool and how you used it.
d. Pre-processing involved: Steps involved in preprocessing.
e. Models used: Description of the models used. Justify your choice of model. Highlight how class imbalance was dealt with?
f. Model Architecture: Model description along with complete architecture diagram. Highlight the detailed design showing the system design with components/modules/parts/layers etc of your project.
g. Screenshot and Demo along with Visualization (For results): Each model result and necessary coding part should be substantiated with a related screenshot.

6. Comparison, Results, and discussion along with Visualization Results of each model must be given separately, and a comparison of the models in terms of performance must be carried out. Results given should be as detailed as possible along with suitable visualization and sufficient discussion is included in the report.

Create 3 Ubuntu Based Linux Virtual Machines on either a cloud provider or locallyto your system. Set them up so you can SSH into them. Create an Ansible Playbook and run it to demonstrate that you can conduct a full apt update across all three virtual machines using Ansible.

Ubuntu Based Linux Virtual Machines

Overview

The culmination of this class will include an introduction to Ansible.

Guidelines and Expectations

Create 3 Ubuntu Based Linux Virtual Machines on either a cloud provider or locallyto your system. Set them up so you can SSH into them. You should be using an SSH key and easily be able to access the machines. You will then create an Ansible Playbook and run it to demonstrate that you can conduct a full apt update across all three virtual machines using Ansible.

We will also cover how to accomplish thE during our recorded sessions. Examples – https:11www.cybercitibizffiaq/ansible-apt-update-allmackages-on-ubuntu-debian-linuxhf https:111inuxhint.com/run-apt-get-update-ansibleffif Deliverables Submit a Zip File of the project or the individual files.