Discussion……3

  Review the below video and discuss in your own words the following: 1. Some identity and access control mechanisms.  2. Centralized and decentralized access control administration. 3. What is directory management?

Discussion……2

   Review both videos below and respond to the following: 1. What is the relationship between vulnerabilities, threats, risks and controls. 2. What is vulnerability scanning and what are some tools used for vulnerability scanning? no less than 300words and in your own words. videos links

Dicussion

   Review the video below on Lockheed Martin’s Cyber Kill Chain and discuss the following: 1. What is reconnaissance? 2. Evaluate the characteristics of active reconnaissance. 3. How is port scanning associated with reconnaissance? All should be written in your own words and in no less than 300 words. Video link will be provided https://youtu.be/ZSDnF0tu8_A

computer

FIRST JOB pls follow the rubric https://pdf.sciencedirectassets.com/277811/1-s2.0-S1877042815X0036X/1-s2.0-S1877042815042421/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjECAaCXVzLWVhc3QtMSJGMEQCIHJl3euREf2xGzfY7nGg618koWvfJQOpHm8vw%2BViUTZEAiAB%2BIUzcsseA9eKorplNEmSIxWtQwfWI2Rlh6nYZMXJACqDBAip%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAQaDDA1OTAwMzU0Njg2NSIMXZBAt49QZJRZ0NeoKtcDjabUTrXWhmrygiAgH9Cx0y4xwxJZ5NsgT4VR9mF1vPiOQu3wBLBiGc90IsL%2BqkOltID5Tt91YBfP9zxJV2hX6%2FQKPPsMeSAkpBad%2BlZ6ekhcrXOI%2FfmfgICJ%2BmAV1%2FFwEoK7AzheLOtXH0Z87FsaO5fxVyHEYuOBAL2H8AQI%2FLv01AyaIB7YSyv%2BI%2Bt1m2Pzmt4fgaSA5S4ver9tpcs8GXpDk5kFlcMzdPIEyrEkJ8kGj0SSl3DXCSQpwuUKdeWIyhjGwgjjemXMGYO3KoSCGO47v8cqmX56J9I4fYFhczUa6wcDky9KszVSG8dK8KhQguLowrpEIGEdimcAG8f2ucpqAWppldRI17rXtqYX3cOD98Ov5tR4sVkm0DZ3GfzEB06BIbve5j%2Bnv87c6A91G0C8Om1mB6i94XMj3ipA0447Ri9nat2TaMQI0XgD5cy%2BrnTQvIn5z7%2FV%2FSHvDdxYTJ4DbbP0zXotOoY1UubUhMHdj2prh4q98mrBQatlKf3Ep5Ir%2BM8yVuxa29ZEKG6jvObfePkziUIocBBbBKd0zA%2FbWg2jSmVzpUO1u62oA2kpaj6vlrFymJE85mSh6c%2FFfma96R80wsURixfBA5L0JqlKirrGr356MLqSgpIGOqYB3PGV8id70i3QJcPm9R8Zkd8IEtPIYLz98L1%2Ba5WZGQNVqQMjrDBmNR6BR5VnR9EoRGBxMOMctQuclypFsPM0SSBuB0XIN46XhUlUX5GDoem7FQcfS9iTnT7ay0tS6s0sCI2%2Bnaig9OddIP%2FpPSEMcie%2BawiasaOvzHVs0vmDsRU3cfakTIdgMd046UFO1%2Ffckpeu5I8U%2FM5%2BdwzRGU6BMUlz9dwjcQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20220327T165914Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYSRIUFEFC%2F20220327%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e78ff70a494ab94040b11ac1d5db52e44b08ef1286a24d969b2830427d1d6b42&hash=25ceece2b58d36985a19734030c81c2164072d430032edd8f293a4ed67e814a0&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S1877042815042421&tid=spdf-fc73b641-fdba-410d-a8bb-1d7b1bf11a54&sid=3f8d055237b935456668e4c11e99232264f0gxrqa&type=client&ua=5301515e040d0050565c&rr=6f29ace698742d52. SECOND JOB INTRUCTION EVALUATION   Please find below a list with each group’s prototype link. While I know many students care only about points (which you’ll earn with this work), I also think that some of you would be interested to see, learn, provide feedback, help and support … Read more

OWASP business function operations

 Target the senior-level executives in your organization. • Provide a paper about one of the three Security Practices in the OWASP SAMM 2.0  Business Function “OPERATIONS”: o Incident Management o Environmental Management o Operational Management • Provide the importance of these items and why SAMM assessment needs to be conducted. Instructions: • Write a summary … Read more

Final Project

  Final Project For the final project, write a paper exploring themes at the intersection of technology and policy. Select one of the following topics: •  Methods for reducing the level of international cybercrime •  Coping with the fragility of and lack of security on the Internet •  Establishing norms of national behavior in cyberspace, … Read more

draft 4

Draft 4     Include a revised or current outline (most outlines which have been submitted so far need revision) at the beginning of your document and begin the draft of the report on a new page.  At the end of the draft include all references you have found related to your topic which have an … Read more

1.9 LAB – Query execution plans (Sakila)

1.9 LAB – Query execution plans (Sakila) This lab illustrates how minor changes in a query may have a significant impact on the execution plan. MySQL Workbench exercise Refer to the film, actor, and film_actor tables of the Sakila database. This exercise is based on the initial Sakila installation. If you have altered these tables … Read more

DATA BASE DESIGN

 Project Can be any business other than a bicycle shop (sales/repair) 1 Person 20 Tables 2 People 38 Tables 3 People 56 Tables 4 People 74 Tables (Average 5 Columns per table) Should be normalized to 3rd Normal Form 1 (per person) instance where 1st, 2nd, or 3rd normal form is violated, give a detailed … Read more