Find a DoS attack that has occurred in the last six months.
Note how that attack was conducted.
Write a brief explanation of how you might have defended against that specific attack.
Your software company was invited to provide a proposal for a company in Australia. You currently have the cost in US dollars and need to convert the prices to the Australian dollar.
Write a 2-part program using Ruby, Java®, or Python.
Part 1: Write a function to gather the following costs from the user:
Travel Cost: $9,800
Hotel Cost: $3,500
Rental Car Cost: $1,600
Labor Cost: $15,500
Part 2: Write a function to convert the costs from United States dollar (USD) to Australian dollar (AUD). Note: Look up the current USD to AUD exchange rate to use in your function.
Test the program 3 times by providing different costs in USD.
Provide the code and take a screenshot of the output, then paste the screenshot(s) into a Microsoft® Word document.
Write a half-page response in the same Microsoft® Word document to address the following:
Provide a manual for the user explaining how to use the program.
Explain what type of user input validations you should have. What happens if the user enters a negative number? What happens if the user puts a $ in the input?
Review the readings for this week from Ruby on Rails Tutorial or the Pluralsight videos if you have additional questions on deploying Ruby applications.
Submit your document.
The briefing should include each of the following items: identification of the the software assurance needs and expectations of the organization
description of the key attributes of the current software development life cycle (SDLC)
identification of any known supply chain risks
identification of vulnerabilities in the existing software used
identification of software options that could meet the organization’s needs
evaluation of software options and recommendation(s) for your organization, with each supported by a rationale
evaluation of supply chain options and recommendation(s) for your organization, with each supported by a rationale
explanation of the costs involved in your recommendations
_ recommendations for contract language that would be used to ensure that supply chain, system, network, and operational security were met
Create a 1- to 2-page Frequently Asked Questions (FAQ) in the form of a table in Microsoft® Word including the following questions:
What is the difference between a distributed and a centralized computer system? Describe the underlying principles and issues of distributed versus centralized computer systems and how cloud-based solutions have altered current networking solutions. Refer to the network diagrams you created as an illustration of a distributed network.
What are the major network topologies? Refer to the network diagrams you created as an illustration of the logical and physical topology you employed.
Why are standards bodies essential in networking and the Internet?
Why are the OSI and TCP/IP network models important in networking? Provide an example from one of the labs that illustrates the performance of one of the protocols you used.
What are the major TCP/IP protocols in use today? Provide an example from one of the labs that illustrates troubleshooting an issue with a protocol you used.
What is the difference between a LAN and a WAN?
What is meant by the terms latency, response time, and jitter, and what tools could you use to measure these?
What is VOIP, and what older technologies does it replace?
Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains the following:
An accurate description of the “building blocks” of today’s data communication networks, such as switches, routers, and cabling. Provide examples from your network diagram of each building block.
A concise strategy to ensure the availability of network access in switched and routed networks. Provide illustrations from your improvements to the original campus networks.
An explanation of how firewalls mitigate some network attack scenarios. Give at least two examples from your solutions to the campus network that illustrates how you mitigated network attacks.
A list of at least five security concerns inherent to wired, wireless, and mobile networking.
A description of at least 3 responsibilities networking teams face in providing networking services, including security, privacy, reliability, and performance.
Five tasks Cybersecurity & Cyb Warfare
Read the Case Study on pages 212-213 and respond to the following 3 questions:
1. What objectives should the ARAPU process be trying to achieve?
2. What is the main problem with the current ARAPU processes?
3. How could the ARAPU process be improved?
One Visio assignment 3 pages not including graphs and 9 discussions around 200 words each
Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Type your responses with proper headings in a word document.
Detailed and significant scholarly answers will be graded with full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided.
Instructions: 100% plagiarism free work (turnitin is used)
Using Microsoft Word, write two paragraphs of at least 125 words (more is acceptable, but not recommended) each to address the following prompts:
***1st paragraph: In your own words, articulate the challenge of accessing, transmitting, receiving and storing protected health information while using mobile health technology.
****2nd paragraph: Describe the recommended best practices both as outlined in this video but also from your own experience and intuition.
Link to video: https://www.youtube.com/watch?v=Vz1ddGJn1PM&feature=youtu.be
At the end of each paragraph, put in parentheses the total number of words for that paragraph in parentheses, e.g.,(125)