Snort

   1. Introduction  a. What is snort?  i. Creation & history  1. Created in 1998  2.Martin Roesch  3.Pcap origin  4.Cisco Acquisition  ii. Value to network admins  1. Open-source nature  2.Consistent rule updates  1. Overview of important features  a. Traffic monitoring  a. Packet Logging  a. OS fingerprinting 

Network and telecommunication

The task is to cut off some users and keep others accessing the Internet but maintaining access to the printers. Additionally, the accounting department wants to work from home. Present a diagram showing how you would meet the requirement without compromising the security of the data and maintaining a smooth workflow. You should assume that … Read more

python

1)  (35 points) Consider a corpus that contain five documents in Table 1. Using python is fine for this question. In case you use Python for this question, submit your python code too. Doc1 Decide which attribute the decision tree algorithm would choose. Doc2 A decision tree is a classification algorithm that is widely used … Read more

concept

  This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins. Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. … Read more

DG

Start your paper with an introductory paragraph. total 7-9 pages and references at least 4 sources cited. Prompt 1 Blockchain (2-3 pages): Explain the major components of a blockchain. Be sure to include how blockchain is affecting the global economy and how you see it growing in the future. Prompt 2 Big Data (2-3 pages): … Read more

Network Defense

 2pages 3references diagrams with explanation One interesting story this week is an issue related to user data harvesting on Android phones https://www.bleepingcomputer.com/news/security/android-apps-with-45-million-installs-used-data-harvesting-sdk/ (Links to an external site.) – Apparently tens of millions of affected devices. Contrast the Google-controlled Android platform and how this can happen against the user privacy restrictions imposed by Apple. Do you think … Read more

Own Words

  Read the Running Case found at the end of Chapter 4. Each  student will complete tasks 1, 2, 3, 4 and 6 for this  case project and submit here Running Case Note: Additional running cases are provided on the Companion website, including the Manage Your Health, Inc. case from the seventh edition of this … Read more

Easy Own words

 This week we start looking at project Scope Management, and project  Schedule Management. For some of this week’s tasks, you will need to use  Microsoft Project.  If you have not started familiarizing yourself with MS Project, here  is a very short, simple tutorial that you can start with. There are MANY  others out there on … Read more

Easy Own words

Chapter 7 – Read the Running Case at the end of the chapter. Each team member will complete the 3 tasks for this case project and submit individually. Running Case Chapter-7: You and your team are continuing your work on the Global Treps Project. Your project sponsor, Dr. K., has asked you to refine the … Read more

Mobile -2

  What are some of the things that contribute to mobile app “Usability”? And,  since texting is so cumbersome (limited size, tiny keyboard, etc) compared to full-feature applications, why is it so wildly popular?