Describe the framewofktrk and how it can be used.

You have been contracted to conduct a penetration test of a medium-sized DoD contractor with offices in San Diego and Washington, DC. The organization has 75 employees. They mostly use Windows with a few Linux servers. All of their IT infrastructure is hosted on-premise. Social engineering is authorized.
explore this pen testing framework:
http://www.pentest-standard.org/index.php/Main_Page.
Describe the framewofktrk and how it can be used.

Explain the impact of unethical behavior for the cybersecurity industry

Why ethics are important
The impact of unethical behavior for the cybersecurity industry
The ethical aspects of preventing fear, uncertaintfkty, and doubt (FUD)
Potential References

Determine the type of evaluation method to use in a web design for the best user experience.

Imagine that you have been hired by the start-up e-Commerce company Sports R US to provide a convenient self-service solution for customers accessing sports products. The Web application would need to be available on mobile devices (for example, smartphones, tablets, laptops, notebooks). The application also needs to work on multiple Web browsers (that is, Chrome, Internet Explorer, Firefox, Safari and, others) to support self-service tasks. Sports R US has asked you to provide a Human-Computer Interaction (HCI) guide for the design and implementation of this service.
Note: You may make all the necessary assumptions needed for the completion of this assignment.
This assignment must address the following topics:
• Information Gathering.
• Design Strategy.
• Prototyping.
• Implementation.Write a 6–8 page paper in which you:
1. Describe the following:
1. Purpose and goals of a mobile self-service.
2. Target segment (audience).
3. The audience needs and wants.
4. Resources necessary to achieve the desired outcome.
5. Design of the website for mobile devices
6. Interfaces applicable to mobile devices.
2. Design each of the following using Microsoft Visio or any open source wireframing or mockup tool. Note: The graphically depicted solution is not included in the required page length.
o The Sports R US home page for a mobile device.
o The self-service web page to review products and checkout using mobile devices.
3. Recommend one prototype that could be created.
4. Determine the type of evaluation method to use in a web design for the best user experience.
5. Provide key details of how the mobile self-service will be implemented on various mobile devices.

Explain the extent and impact of an attack using a forensic approach.

Advanced Cloud Penetration Testing and Forensics Assessment Instructions

Activity Instructions

Using the Carbanak cyber gang presentation in Moodle (week-12):

  1. A) In a group assigned by the lecturer protect a new community bank (C2-17). This is a fresh start-up and is a greenfield site. You will be given elements of the network and must come up with a design – and present it to the rest of the class – 10 min presentation time.
  2. B) Consider the following scenario:
  • Perimeter Design: Standard network, company offers Mail and Web services via the internet. On location, they have a publicly available Wi-Fi for the customers use.  (the private network on the powerpoint)
  • Each Team come up with a list of solutions that could have helped mitigate attacks of this nature.
  • Consider defence strategies based upon existing knowledge
  • Evaluate perimeter defences and deploy appropriate solution
  • Synthesize the firewall rules-based Traffic type, ingress, egress and action (deny or allow).

Page 1 of 2

Presenting Your Work

You should submit your work in a word-processed document, e.g. MS Word, LibreOffice Writer, etc.

There is a limit of minimum 1000 words, excluding any references or appendices, for this portfolio element.

You can choose how to write your document.  However, given the modest word limit, you may find it useful to use a tabular layout for your analysis

Your document must also state: 1) the module number and title; 2) the assessment number and title; 3) your student number.  This work will be marked anonymously.

The module guide contains further guidance on the presentation of your work.

Expected Number of Sources

Require the use of at least four academic research resources, this include recent scholarly research and recently published scientific books, to avoid plagiarism, any external material used in your work must be appropriately referenced and cited.  Please see the module guide for more information.

Submitting Your Work

You must upload your work using the Turnitin submission link on the Moodle page for this module.

Specific Assessment Criteria

This assessment will be graded against the University of Bolton’s “General Assessment Criteria for Written Assessments Level HE7”.  These are provided in the module.

Recommend remedies for compromised cloud systems.

Explain the extent and impact of an attack using a forensic approach.

How did the LGBTQ+ community in Pittsburgh, PA impact the outcome of the 2020 presidential election?

How did the LGBTQ+ community in Pittsburgh, PA impact the outcome of the 2020 presidential election?

Describe the experience and what you hope to gain from participating in the experience.

Experiential learning opportunities are an essential way to focus on the knowledge, skills, and abilities you need to realize your career goals. You have specifically selected this course as an opportunity to earn practical experience in your chosen field to help realize these goals.

In your journal, post your experiences and reflections on a weekly basis during your internship. In addition to relating the details of your actual work and position, you should note information that will assist in the completion of the Final Project. (Refer to the Final Project Document for information on the project.)

In your journal, post your experiences and reflections on a weekly basis during your experiential learning activity.(Note: It is strongly suggested that you spend at least 10 hours per week in the experiential learning activities. Number of hours must be documented and final certificate of completion will be required as part of your final project.) In addition to relating the details of your experience, you should note information that will assist in the completion of the Final Project. (Refer to the Final Project Document for information on the project.)

Your weekly entries should address the following topics:

Describe the experience and what you hope to gain from participating in the experience.
Provide an overview of tasks and key activities (training, discussions, labs, assessments, etc.) in which you were engaged during the week, with sufficient detail for your instructor to understand what you were involved in.
How did the activities in which you were involved demonstrate your knowledge, skills, and abilities in meeting your selected program competencies?
Have you implemented any changes this week in your approach to interpersonal communication, collaboration, project/time management or other aspects as a result of your experiences from the prior week? (N/A for Week One)
Reflect on your experiences during the current week and:
Describe key challenges (problems, issues, etc.) you encountered during the current week as they relate to your experiential learning activity
Describe how you identified/evaluated options for handling those challenges
What aspects of prior coursework and/or work experiences helped you in identify/evaluating options and developing resolutions?
Were there any aspects of the situation(s) – either the problems themselves or the resolutions/outcomes – that were contrary to your assumptions or expectations based on what you have learned during coursework?
What did you learn as a result of this experience? What might you do differently in future to either minimize the chance of occurrence or in your approach to resolving/overcoming?

Discuss how PHS’ move to LMR and CPOE systems impacted the organizational design.

Chapter 3 of your text discusses the managerial levers model. Please answer the followingquestions on this model.

a)Discuss how PHS’ move to LMR and CPOE systems impacted the organizational design.

b) Discuss how PHS management could use IS to control the organization.

c)Discuss how the culture may have played a role in the IS development and use at PHS

choose a subset of CWE/SANS Top 25 Most Dangerous Software Errors listed on SANS website

In this assignment, you are required to choose a subset of CWE/SANS Top 25 Most Dangerous Software Errors listed on SANS website (https://www.sans.org/top25-software-errors) and identify these vulnerabilities in selected systems. You need to complete a technical report to document your experimental outcomes and findings. The report should consist of 3000-3500 words (minimum 3000 words, single spaced, 12pt font, on the A4-sized paper). The findings should include exploitation of minimal 3 software errors chosen from the top 25 list. Each error should have a different CWE ID.
This report needs to consist of following items:  an overview of the chosen software errors
 description of the hacking environment
 description of technical findings and supporting evidence in screenshots
 critical analysis of technical findings
 discussion and justification of potential remedy actions based on findings

What are some factors that would influence your decision to suggest a VLAN? What types of things would the client need to describe to you?

You are a newly hired network administrator in a company that provides networking consulting services to area businesses of a variety of sizes. Networks range from 10 users to over 10,000 users. You have read a little about the advantages of VLANs and you want to become more knowledgeable in case one of your clients describes a need for which a VLAN would be a perfect solution.

  • What are some factors that would influence your decision to suggest a VLAN? What types of things would the client need to describe to you?
  • What advantages do VLANs offer to the client’s network?
  • Why not just subnet the network instead of using VLANs?
  • Make sure you conduct research for your post either using class content or from the Web. Be sure you cite your source(s).

 

What steps would you take to create a VLAN (don’t forget the programming on both the router and the switch)?

  • What is a VLAN?
  • What steps would you take to create a VLAN (don’t forget the programming on both the router and the switch)?
  • How would you connect multiple switches together so they share VLAN information and interfaces?
  • How do VLANs help with your network security?
  • Make sure you conduct research for your post — either using class content or from the Web — and make sure you cite your source(s).