shanki-discussion2-emerging threats

I need support with this Computer Science question so I can learn better.

Our society, economy, and critical infrastructures have become largely dependent on computer networks and information technology solutions. Cyber attacks become more attractive and potentially more disastrous as our dependence on information technology increases. According to the Symantec cybercrime report published in April 2012, cyber attacks cost US$114 billion each year. If the time lost by companies trying to recover from cyber attacks is counted, the total cost of cyber attacks would reach staggering US $385 billion.

Why cyber attacks flourish? It is because cyber attacks are cheaper, convenientand less risky than physical attacks Cyber criminals only require a few expenses beyond a computer and an Internet connection. They are unconstrained by geography and distance. They are difficult to identity and prosecute due to anonymous nature of the Internet. Given that attacks against information technology systems are very attractive, it is expected that the number and sophistication of cyber attacks will keep growing. Many cybersecurity experts believe that Deception is the key choice of weapon to carry out malicious intends to breach cybersecurity efforts in the cyberspace

Assignment :

Select and research one of the many types of Deceptions and briefly provide a description, deployment (methods) and countermeasures.

  • Denial-of-service attacks
  • Trojan horses
  • Phishing
  • Etc.

Conduct your own research and post a relevant “short” summary of your findings. ( Stick to current data, not older than five years ). Use not more than three (3) references.

words:350

include references

Read more

Nagar-operational excellence-Discussion2 replies

I’m trying to study for my Computer Science course and I need some help to understand this question.

Task 1: main question :Carefully review and research all components of an information system. Based on findings, apply this knowledge and discuss with your peers how each of these components are associated with you and your given work environment or a future work environment if not currently employed.

Note : No need to give replies to main post ,read below student posts and reply each of them in 150 words.

saikumar –The Components of Information Systems

Based on the procedures guide people on how to mitigate any potential risks that may occur during the use and management. On that are sent, retrieved, stored, posted, are processed through operating software and programs on sensitive equipment such as a computer or maybe even your phone. The different types of information technology revolve around the development and repair of both inside and outside of the computer. By including the behaviors and interference with analytical or quantitative numeric and qualitative nominal data sets (Gonzales, 2019).

1. Identification Chaining: With the Biometric Authentication on Smartphone’s is quite reliable now. So the next step is chaining the authentication or identification to the applications running on other devices. So in 2019, people should carry out their biometric-enabled Identity Cards, which are Smartphone’s, and use them to identify them for using applications and other facilities. Global Input App already provides this mechanism, so the next step is to apply to the applications and facilities (Han, 2018).

2. Data Protection: Data will be encrypted by default and the encryption keys will be protected by the key coming from smart phones in which is again the personal identity card. Global Input application provides this mechanism to allow users to identify themselves and provides keys to encrypt or decrypt data to assign personal responsibility for processing data.

3. Augmented Reality: In 2019 we should see more applications on augmented reality. In the argument, reality applications should help us to make decisions by analyzing the reality we are looking at. Even in the workplace, an employee should be able to navigate to accomplish a task. The tutorial about using an application can be done with augmented reality as DOI is the same in learning to assemble instruments should be much easier (Raschke, 2014).

saimani-

An information system is a combination of hardware, software and also telecommunication networks that are used to convert data into information to be used in various fields to produce a certain desired result. This system is very useful and very complex to use but with certain management and use can lead to better ways (Avison & Fitzgerald, 2003). The information system has five main components that make it a set and ach component depends on one another to make it work for better result.

The first component is the computer hardware. This includes input, output and processing of the data. What hardware is used depends on the organization and its demands. They include of input, an output device, an operating system processor and media devices. The second component is computer software. The programs or applications used to make use of the hardware to run them into better ends. They are used for analyzing and processing data with a set of instructions.

The third component is the databases. These are the raw data to be worked on to produce information. All other components must be directly equipped with this to make them efficient. The fourth component is network. This enables direct uninterrupted flow of data and information in the whole system to certain phases to make it be used. The fifth one is the human resources. This includes the manpower to be used to run the system. The end result of the system is to benefit the end user and it depends on the information output for the end user.

This at last gives us the rundown of the system and it helps us understand the system and every effort in order to give focus in this system to impact many information system and make use of the almost wasted raw data flowing aimlessly everywhere(Wiederhold,1992).

Task 2: provide reply to below student post each in 150 words

shasank -Deception means deliberately misleading someone by creating certain system components that look like authentic elements (Rouse, 2016). Deception is performed to trap individuals and steal their confidential data. However, deception can also be used to protect IT assets from adversaries (malicious users) in terms of cybersecurity. Adversaries use four stages of attack namely scanning, discovery, exploitation and exposing. Both offline and online scanning can be performed to recognize exploitation points. Therefore, database and network designers use strong design interfaces which include authorized services, bogus vulnerabilities and real vulnerabilities to misdirect attackers. Some deliberate and inadvertent open ports are designed to lead the adversaries to a honey pot. However, the honey pot contains fake assets. Besides, valid ports included in deception technology are closely monitored and embedded with high security measures. Further, authentic frontend interface is designed so that adversaries believe the bogus assets are authentic. Thus, hackers accept various security baits during the discovery stage and could not exploit confidential data (Almeshekah & Spafford, 2016). Moreover, few deceptive documents stating security protocols and vulnerabilities are also placed in the system so that adversaries can become convinced about the security design.

Besides, deception technology is also used to prevent disclosure of authentic information in the exploitation stage. If bogus assets are breached, incident response team and intrusion detection system can be fooled by believing false alarms generated after the attack. Such issues can be avoided by isolating traps, process coordination, and backend monitoring. Besides, certain procurement tricks are also developed by realizing adversary behaviour in diverse scenarios (Aggarwal, Gonzalez & Dutt, 2016). Forensic analysis is performed to comprehend adversary behaviour in exposing stage, which helps to detect various security challenges in interface design. Thus, a better depiction infrastructure can be designed. National deception method focuses on using selective technologies, tools and methods to prevent an attack. However, deception is not efficient to deal with botnet attacks.

nagi -Denial of Service by Nagi

Cyber-attacks are now becoming a global concern that appears inevitable. The recent cyber-attack in Travelex company showcases a vivid demonstration that cyber-attack is everywhere. The attack has halted all Travelex operations. Many businesses, such as Travelex have experienced similar attacks. Some have lost billions of dollars while others have close down due to cybercrimes. Sadly, the attacks seem not ending. Today, hackers have introduced deceptions strategies that make individuals and organizations’ data vulnerable to numerous attacks. Although there are several deceptions techniques, hackers use denial of service attack frequently.

Denial of Service is a type of attack that focuses on networks and machine. The attack generally shut down a particular network connection or stop the functionality of organization machine preventing users from getting regular services. Hackers through denial of service targets servers in high profile industries such as media, banking and commerce companies (Dolk, Tesi, De Persis & Heemels, 2016). Other organization include trade and government entities.

To deny users routine services, denial of services sends big data that crashes the system or floods the targeted web servers with traffic. The two technique deprives the legitimate users the accessibility of services that web server offers. The flooding method succeeds when a system obtains excessive traffic making the server slow that eventually shut down. Flooding attacks include ICMP flood, SYN and buffer overflow. The other method exploits vulnerabilities that result in a crash.

To prevent Denial of services organization controlling the servers should implement various countermeasures. The first step to take is to develop a response plan. It is crucial to establish a prevention plan. High profile organizations should develop a complex infrastructure controlled by multiples groups when planning denial of services countermeasure (Razak, 2016). A plan facilitates a quick response when a denial of service occurs.

Correspondingly, it is vital to secure network infrastructure. Preventing network crash can only succeed when there is advanced level protection framework. The framework necessitates establishing threat detection systems and prevention of intrusions such as the use of anti-spam, load balancing, VPN as well as counter filtering (Zare, Azadi & Olsen, 2018). Additional countermeasures include maintaining complex network architecture and leveraging cloud.

Read more

Systems and Ethics in Decision Making

I don’t know how to handle this Writing question and need guidance.

Write a 2-page-report in which you analyze the relationships within a health care system that are necessary to achieve an organizational goal, explain how the health care system can serve as the framework for problem solving, and explain ethical questions associated with a specific situation.

  • Option A: Increasing Patients

    The CEO of your health care organization has asked you to form a task force to increase the number of patients who access your community health center for primary care. You must determine the internal and external partners you would enlist as collaborators.

  • Requirements

    Develop a business report for the option you selected. In the report:

    • Analyze the relationships within a health care system that are necessary to achieve an organizational goal.
      • Identify the partnerships you will need to complete your task.
      • Explain why you chose the partnerships you identified. What will each contribute to your task?
    • Explain how the health care system itself serves as the framework for problem solving.
    • Explain any ethical questions related to your task that could arise.
    • Deliverable Format

      The business report is a professional document and should therefore follow the corresponding MBA Academic and Professional Document Guidelines, including single-spaced paragraphs.Also include:

      • Title page.
      • References page.
      • APA-formatted references.
      • 2–3 pages in addition to the title page and references page.
      • At least three supporting resources.

      Evaluation

      By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:

      • Competency 2: Analyze relationships between elements of a health care system and organizational goals.
        • Analyze the relationships within a health care system that are necessary to achieve an organizational goal.
      • Competency 3: Analyze how health care systems influence decision making within health care organizations.
        • Explain how the health care system itself serves as the framework for problem solving.
      • Competency 1: Analyze how economic, legal, regulatory, and policy factors influence the organization and financing of health care delivery systems.
        • Explain any ethical questions related to an organizational goal that could arise.
      • Competency 4: Communicate health care management needs, opportunities, and strategies with multiple stakeholders.
        • Correctly format citations and references using current APA style.
        • Write content clearly and logically with correct use of grammar, punctuation, and mechanics.

Read more

Discussion: Organizational Change and the Marketing Five Cs Week 2

I’m studying for my Marketing class and need an explanation.

  • Locate a recent news article on an organization that has undergone a significant change, such as entering a new international location, scaling back from a particular market, downsizing, cutting back on product or service offerings, or moving manufacturing offshore.
  • Review the Academic Writing Expectations for 2000/3000-Level Courses, provided in this week’s Learning Resources.

By Day 3

Post a 150- to 225-word (2- to 3-paragraph) analysis of the environment for the organization featured in the news article using the five Cs of situational analysis. In your analysis, address the following:

  • How do you think each of the five Cs had an effect on the company’s change? (Be sure to mention each C and provide your hypothesis for how that factor impacted decision making.)
  • Which one of the five Cs was the most significant factor in this decision? Provide a rationale for your answer using specific examples.
  • Based on the information you have available, did this company make the right decision? Why or why not?
  • To support your response, be sure to reference at least one properly cited scholarly source.
Read more

500 word discussion

I’m working on a Marketing question and need guidance to help me study.

One concept you have been introduced to is the concept of ‘value-adding.’ Associated with value-adding is the concept of value proposition. How are both of these necessary for a firm to be successful in its marketing strategy? How might these lead to ethical situations within marketing practices?

Include in your discussion post, personal observations as well as concrete examples to support your views. Initial posts should be at least two paragraphs and include direct references to the readings and/or additional articles. Word choice and sentence structure should be suitable for professional level work, and all sources should have appropriate references and citations.

Read more

Shared Practice: Evaluating the Budgeting Process

I’m studying for my Business class and don’t understand how to answer this. Can you help me study?

****500 words, use USA based examples and try to reference something from the attachment.

Budgeting is an important part of an organization’s overall planning. Through budgeting, each part of an organization’s structure can be identified for decision making and control. For example, if the budget shows that one million units are to be sold in the next 3 months, the sales department knows that it must achieve that goal. At the end of the first month, the sales department can determine by looking at the budget if it is on track or not and what decisions it must make to meet the goal. A reasonable budget can allow an organization to allocate resources and provide a plan and direction for the organization. A budget can also help measure performance and ensure that managers are held accountable for their decisions.

To prepare for this Discussion, “Shared Practice: Evaluating the Budgeting Process,” take a moment to think about your organization or an organization you are familiar with. Consider the importance of the budgeting process, forecasting, and strategic planning for informing how the organization operates with regard to decision making.

Post the following:

  • Provide an evaluation of how forecasting, strategic planning, and budgeting processes impact your organization.
  • Provide 2–3 examples from your professional experience in your current or former organization, or from your interview, to support your position. Be sure to include specific budgeting tools used by the organization.
  • Identify the key stakeholders in the budgeting process at the organization and explain how they are involved in the processes.
  • Explain how knowledge of forecasting, strategic planning, and budgeting processes might impact your decisions in the organization you currently work for or one that you will work for in the future.
Read more

Discussion 1-Critique the post below-De

Need help with my Science question – I’m studying for my class.

The future is a bright one for smart devices like voice activated smart home controllers and smart thermostats. Including smart devices in our renovations keep us on the cutting edge and competitive with our competition. These devices enhance our customers lives by automating tasks and allowing them more free time to enjoy the things they would rather be doing. Unfortunately, our company may be liable for damages if our customers lose privacy due to the insecurity of these devices.

A simple hack could expose our customers’ data if the manufacturers do not build them with security in mind and continue to provide security updates throughout the life of the product. Concerning mobile health smart devices that transmit client health data to doctors, Arabo says that the manufacturers are not concerned with security and do not put effort into making them secure (Ararbo, Brown, & El-Moussa, 2012). Even when care is taken by the company providing the smart device to include better security features, it is still up to the consumer to activate or use them. Security features such as Two-Factor Authentication (2FA) which, besides a password, requires another medium such as a phone registered to the account in order to authenticate can help protect devices from being hacked. But, these require the consumers to set up or elect to opt in to that feature in the first place.

Due to the nature of most smart devices requiring access to and from the internet, they pose a risk that those devices will be accessed by someone other than the intended party. In a recent study of 34,686 “controlled experiments”, 72/81 smart devices were monitored “talking” to a destination that was not the manufacturer. This study also revealed that all of the devices that were tested exposed at least some information in plain text, allowing anyone listening to easily read the data. Information Exposure From Consumer IoT Devices:

There are many recent cases of consumers suing companies for negligence when installing smart devices that are not well protected or easily hacked to leak personal data. Toyota and Chrysler installed devices were claimed to be controlled remotely and “exceedingly hackable” by the plaintiffs. Even the home security company ADT has been taken to court with the plaintiff claiming that ADT’s wireless security systems can be remotely turned off or used to spy on the owners (Gorman, n.d.). Baby monitors are even a target now too. Many wifi connected baby monitors are cloud enabled so that the parents can view their children from anywhere. This internet connectivity creates risk and several camera models have been hacked over the internet allowing the hacker to view, listen, and talk through the camera (Vaas, 2019). Beyond the financial impact associated with lawsuits, we risk our reputation and client trust if we knowingly install insecure equipment and we don’t take the time to ensure our customers know how to effectively secure them. A smart thermostat may record daily activities in order to save the owner money on energy costs. But if the device has not been updated from the default password the owner risks losing that data to a hacker using a simple password guess. The question then is who is liable for the damages?

If we decide to install a smart fridge that can order groceries when the customer is running low on milk, we need to inform the customer of the risk associated with their data and provide security measures the customer can take to protect their data. We should have a team or task force designated to research the security of the smart device products we install to make sure we provide our customers low risk options.

References

Arabo, A., Brown, I., & El-Moussa, F. (2012). Privacy in the Age of Mobility and Smart Devices in Smart Homes. 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. doi:10.1109/socialcom-passat.2012.108

Gorman, L. (n.d.). The Era of the Internet of Things: Can Product Liability Laws Keep Up?, Defense Counsel Journal, 84(3). Retrieved from https://www.iadclaw.org/publications-news/defensecounseljournal/the-era-of-the-internet-of-things-can-product-liability-laws-keep-up/

Vaas, L. (2019, November 26). Parents say creep hacked their baby monitor to tell toddler they ‘love’ her. Retrieved from https://nakedsecurity.sophos.com/2019/11/26/parents-say-creep-hacked-their-baby-monitor-to-tell-toddler-they-love-her/

Read more

Psy2010 discussion 1

I’m studying for my Writing class and don’t understand how to answer this. Can you help me study?

The diagnosis of a mental disorder is based on a specific set of criteria derived from case studies and research. DSM-5 provides a system of diagnosing mental disorders based on established symptoms and conditions. A diagnosis is a shorthand method to describe a set of particular symptoms for a disorder. Improper use of a diagnosis can have a negative impact when it is used to label individuals.

  • Review current information on the use of the DSM-5 and explain how diagnostic criteria are used to establish a mental illness.
  • Describe some of the issues regarding labeling individuals with a mental disorder. Explain some ways in which the mental health field and the public in general have lessened this issue.
Read more

Legal and Ethical Reaction-G8

I’m stuck on a Business Law question and need an explanation.

You work for a large international corporation. The director of your department has called a meeting to state that the company must always consider international issues when conducting business globally. Safe work environments, fair wages, abuse of child labor, unfair treatment of workers, the environment, and legal business practices are all topics that are unfortunately in the news all too often. Previously, these were problems or issues that were present in the United States. Fortunately, the legal system and regulations, for the most part, have made these issues a thing of the past. However, in many foreign countries, these problems still exist. Societies are bound to repeat their mistakes if they do not learn from the past. Therefore, consider an ethical issue faced by American businesses in the international arena.

Define what should be the legal and ethical reaction of the business community for these types of violations.

  • If the issue was domestic, construct the proper solution. Describe how conducting business internationally might change your analysis.
  • Interpret whether we have to consider ethics universally and provide a rationale if ethics apply specifically to practices within a country.

Your document should be 350-500 words in APA writing style, including the restated questions.

Read more

Provide a formal definition for the generic notion of requirement in an IT context

Help me study for my Computer Science class. I’m stuck and don’t understand.

*********************************APA FORMAT******************************************************

**************************STRICTLY NO PLAGARISM*******************************************

Discuss the following topics:

  • Provide a formal definition for the generic notion of requirement in an IT context. Specialize your definition to a requirement applied to the specification of data modeling and data architecture decisions.
  • Research the following data-related criteria, define each criterion in your own words, and discuss how a data analyst can use them to organize data requirements: adaptability, business and organizational policies, change control demands, compatibility, completeness, consistency, currency, ease of use, evolution, extensibility, functional features, maintainability/manageability, performance, reliability, scalability, security, standards, support, testability, and ubiquity.
Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information