Split and Kali Linux Paper

Team Project Report
Attached Files:

File project-report-template-601.docx
Project Goal: Each team will demonstrate the use of Kali (Linux) in the Infosec Learning virtual lab environment.

Step #2:

Research the variety of tools available on the Kali Linux distribution for testing. Each team will select a set of tools to research, evaluate and test. Each team member must conduct the testing in their assigned set of VM’s and compare the results with their teammates.
Notify the instructor (via email) of the selected tool(s) prior to starting for review and approval
Be prepared to address these questions in your written report and presentation:
Why test?
Why did your team select the specific testing tools you used for your project?
Research and find one alternative to Kali Linux and compare and contrast the two distributions.
(NOTE: A possible resource for information is the “MSCYB Toolset Resource-Reference Guide” found in Course Resources | Course Documents folder.)

Step #3:

Each team member has a cyber sandbox that contains the following VMs (the assigned IP addresses will be different):
Using the assigned VMs, each team member will setup and configure their Kali VM to run tests against the target VM’s in their respective environments (OWASP, Windows, Metasploitbale etc) using the selected tool. Team members should be able to identify and inventory the specific set of VMs that will be used in the test (e.g., IP address and OS). Students may choose which tests to run using the selected software tool(s), all of which must be documented in the written report (use the template provided for your written report).
Team members should compare the outcomes of each test with their own prior test results and those of the other team members.
Important: The virtual machines are non-persistent (data will be lost when the VM is shutdown), make sure you capture screenshots when you conduct testing.

Written Report Requirements: An APA formatted template is attached for your convenience, please use it.

Use the same font throughout the report, such as 12-point Times New Roman
Charts or Tables may use 10-point
NOTE: Full-page illustrations are not counted as a page.
Title page:
Start page numbering in upper right corner
Title of paper
Team member names
Affiliation
Course number and course name
Instructor name
Assignment Due Date
Table of Contents (this is a class requirement)
Abstract Page:
One paragraph (double spaced)
Not indented
No longer than one page, preferably around 150 words
Main body (does not include title, abstract, or references):
Double spaced (no extra spacing before or after)
Research the selected set of tools (below are discussion headings, include others to enhance your report):
Introduction (Introduce the report to the reader)
Kali Linux
Your Toolset
Alternative to Kali Linux
Conclusion
Last page(s): List of APA formatted References
Beginning on a new page
Listed alphabetically
Minimum of 10 credible references, at least five published within the last two years
There needs to be at least one in-text citation for every reference!
Only the PM needs to submit for the team: Click on the “Team Project Report” link above to submit the team’s project report, as well to get more information regarding the due date and grading rubric.

NOTE: SafeAssign has been activated for this assignment.

History of Cryptography Essay

you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. Look at reasons why cryptography was used and how it developed over the years. Was it used or implemented differently in varying cultures?

The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. Be sure to view your SafeAssign score. The assignment must be properly APA formatted with a separate title and reference page.

Wellness Technology Company Risk Management Presentation

Recently, you had a conversation with your boss and discussed the recent highly publicized breach that occurred at the number one competitor of Wellness Technology, Inc. She understands risk assessment, and her department does some of it but by a per-project basis. For this project, she would like you to make a recommendation as to what risk control practice strategy should be adopted by the company as a part of the general information governance program. You will then present to the majority stakeholders of the company.

You will create a narrated Microsoft PowerPoint presentation with at least 10 slides covering the following:

  • Describe why risk management is needed so that nonsecurity/technical personnel can understand it.
  • Describe the details of risk identification and how it differs from threat identification.
  • Describe what a TVA worksheet entrails and why it, along with other documentation, is needed.
  • Describe risk assessment and why it is needed.
  • Describe how annual and single loss expectancy are calculated using examples.
  • Describe your recommended risk control strategy for the company.

Submission Details:

  • Use Microsoft PowerPoint with a professional theme.
  • Presentation should include at least 10 slides.
  • Each slide should contain audio narration.

Emerging Threats and Counter Measures Discussion

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Organization and IT infrastructure

Please see the pictures for instructions

You will be writing a report on one topic pf the following topics.

Report will be between 300-500 words in length.

prepare 3-4 powerpoint slides in the same topic.

Follow the report evaluation criteria.

ERM in the Context of Strategy Discussion

Your paper should meet these requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Manage the Culture of An Organization Discussion

How do leaders seek to change or manage the culture of an organization?

  • Post your answer to the forum questions by 11:59 pm Eastern Time (ET) on Thursday
    • Your answer must be substantive, which usually requires 300 or more words
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.
    • No attachments will be graded

Cloud Vulnerabilities Related to Cyber Security in Health Sector

Abstract

Introduction

I need an introduction talking about Current health care and expected future of health care when using IOT & AI with technology

literature review

First section: talking about associated risk like data, connectivity, and vulnerability of hardware for example nowadays they are having a new computer with a process chip or nano chips on the humans body that might heat or have batteries in them what risks will be associated to that?

second section: Data different dimensions

– Subsections of data:

1) Data transmission – From human body to device and from device to data storage

2) Data Storage

3) Data redundancy (duplication)

4) Data Accuracy

5) Data transparency

6) Data Privacy

Third section: Connectivity:

5G and new technologies how is it expanding and what will happen in future for security of communication channel

Fourth section: Vulnerability of hardware

1) if its process heating example battery

2) if the device can be hacked

3) security of data or data protection

Fifth section: Cost

From health sector (public and private) side and from the patient side for example who is going to pay for the devices and their maintenance

Methodology

is going to be quantitative this is a suggestion to get more information on how the methodology is needed

Research Design : Qualitative, Quantitative, and Mixed Methods Approaches / J.W. Creswell.

Book Depository Handbook of Mixed Methods in Social & Behavioral Research : Abbas

I need a survey at least 3 question for each section and subsection (survey) with reference to what paper where these question have been formulated.

Research Results and Discussions

Finally Conclusion and future works

Note: You can add images and figures if applicable with reference

citation is important at least after 2 sentences

kindly include all references

Finally, I need to to have a contribution related to this topic.

Attached is also a template to follow kindly note:

– I need the journals and a presentation related to this topic.

– Reference must ONLY be from journal articles published in well publishers’ databases; IEEESpringerElsevierWiley, and Taylor & Francis. and recent from year 2017 least old.

After the paper is done I need a presentation representing the paper

The deliverable are:

1) Paper following the attached template

2) Survey

3) Presentation

Enterprise Risk Management Research Paper

Research Paper: How ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Course Name: Enterprise Risk Management

Requirements:

  • Paper should be atleast in 1000 words
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least Five scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Remember not to copy any content from any other source – all work needs to be your original work, but remember to also include citations

Electronic Innovation and The Government Discussion

Research Paper: Electronic innovation and the government

Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading. This will be a detailed summary of the research paper and what you gained from the research. Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment. If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it. Think of it as an article review where you submit a short overview of the article.

Your paper should meet the following requirements:

• Be approximately 2-3 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

*All outside sources must be referenced and cited in your paper. All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!