2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an

2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an. 2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an.

2808ICT/7623ICT Information and Security Management

Supplementary Assessment

Supplementary Tasks

This is an individual task. You need to submit a report on Learning@Griffith.

PART A. Learning Summary (25%)

Write a summary on the concepts you learned in Lectures B and H. The summary should cover the following topics.

The general concepts of access control and how it is used in databases.

How do file/directory permissions work in Linux systems?

How to use SQL command to grant various privileges in MySQL databases?

Word limit: The text should not exceed one A4 page in a 12pt font.

PART B. Risk Assessment (25%)

As part of a formal risk assessment of the Cyber Range, the following assets and threats are identified.

Complete the table by suggesting reasonable values for the items in the risk register.

Write a couple of sentences on each risk to provide justifications for your choice.

 Asset

Threat/

Vulnerability

Existing

Controls

Likelihood

Consequence

Level of Risk

Confidentiality of student grade data

Unauthorized access to the grades

Integrity of student grade data

Students changing their grades

Confidentiality of student account information

Leak of students’ account information

Integrity of the grading system software

Malware attack to lock or delete critical information

Availability of the course information

Students cannot access course information from the website

PART C. Linux Access Control (25%)

Step 1. Start SEEDubuntu VM and the Terminal, and create a new user with your snumber, following the instructions from Lab A. Provide at least one screenshot for each step, and make sure your screenshots include your snumber.

Use long listing ls -l to display the files and subdirectories in your current directory.

Step 2. Make a subdirectory named www in your home directory. Use long listing to display the permissions of the subdirectory.

Q1: Please give screenshots and describe the permissions in terms of what the owner, the group, and others can(not) do.

Change the permissions to give read, write, and execute permissions to the owner and the group of the directory. Use long listing to display the new permissions.

Q2: Please give screenshots and describe how you can tell the change is successful.

Step 3. Enter into the www subdirectory. Create a file named index.html. Use long listing to display the permissions of the file.

Q3: Please give screenshots and describe the permissions in terms of what the owner, the group, and others can(not) do.

Change the permissions to give read and execute permissions to everyone (including the file owner, the group owner, and others). Use long listing to display the new permissions.

Q4: Please give screenshots and describe the permissions in terms of what the owner, the group, and others can(not) do.

Step 4. Change the owner and the group of index.html to be the root. Use long listing to display the permissions.

Q5: Please give screenshots and explain what you did.

PART D. Database Access Control (25%)

Step 1. Start phpMyAdmin and import the SQL script dept_staff.sql (following the instruction in Lab G). You should now have a database company. Have a look at the structure of the tables and the data in them.

Step 2. Use SQL to create the following user accounts.

staff name

user name

host name

password

Sue Burnus

sue

%

Sue@1234

Kim Morre

kim

%

My5martPasswd

Glen Roe

glen

%

glenNn237

Q6. Provide the SQL commands you used and screenshots of the result (i.e., successful execution and the users created).

Step 3. Grant the following privileges to Sue:

see the names and nationality of the staff and can grant such privileges to others;

insert and update staff nationality information.

Q7. Provide the SQL commands you used and screenshots of the result (i.e., successful execution and what you can see when logged in as Sue).

Step 4. Grant the following privileges to Kim:

see the names and salary of only those staff whose salary is below 80000.

Q8. Provide the SQL commands you used and screenshots of the result (i.e., successful execution and what you can see when logged in as Kim).

Revoke the above privileges from Kim.

Q9. Provide the SQL commands you used and screenshots of the result.

Step 5. Grant the following privileges to Glen:

see the names of the staff and their corresponding department names, only for those staff whose salary is below 80000.

Q10. Provide the SQL commands you used and screenshots of the result (i.e., successful execution and what you can see when logged in as Glen).

Page 5 of 8[supanova_question]

Impact of Ageism and Adultism

Impact of Ageism and Adultism.

 Post an analysis of the influence of adultism in the Logan case. Then, explain how gender, race, class, and privilege interact with adultism to influence the family’s discourse related to Eboni’s pregnancy as well as other family dynamics. Adultism refers to the oppression of young people by adults. The popular saying “children should be seen and not heard” is used as a way to remind a child of his or her place and reaffirm the adult’s power in the relationship. The saying suggests that children’s voices are not as important or as valid as an adult’s and they should remain quiet. Children are often relegated to subordinate positions due to socially constructed beliefs about what they can or cannot accomplish or what they should or should not do; this in turn compromises youth’s self-determination. This oppression is further highlighted when considering the intersection of age with race, ethnicity, socioeconomic status, and sexual orientation. You will be asked to consider all of these when reviewing the Logan case and Parker case. Learning Resources Required Readings Adams, M., Blumenfeld, W. J., Castaneda, C., Catalano, D. C. J., DeJong, K., Hackman, H. W,… Zuniga, X. (Eds.). (2018). Readings for diversity and social justice (4th ed.). New York, NY: Routledge Press. Chapter 116, (pp. 553-559) Chapter 118, (pp. 565-567) Chapter 120, (pp. 572-574) Chapter 124, (pp. 583) Chapter 127, (pp. 590-592) Plummer, S.-B., Makris, S., & Brocksen S. M. (Eds.). (2014). Sessions: Case histories. Baltimore, MD: Laureate International Universities Publishing. [Vital Source e-reader]. “The Parker Family” “The Logan Family” Document: Kaltura Automatic Captioning (PDF) Document: Guide for Creating and Uploading a PowerPoint Presentation (PDF) Required Media Laureate Education (Producer). (2013). Parker Family (Episode 30) [Video file]. In Sessions. Retrieved from https://class.waldenu.edu Note: The approximate length of this media piece is 4 minutes. Accessible player Laureate Education (Producer). (2013). Logan Family (Episode 34) [Video file]. In Sessions. Retrieved from https://class.waldenu.edu Note: The approximate length of this media piece is 2 minutes. Accessible player

https://anyessayhelp.com/

[supanova_question]

A market entry plan for FCV International Football Academy

2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an Writing Essay Help A market entry plan for FCV International Football Academy.

It is a market entry plan for a UK based company (A football Academy) attempting to enter the Chinese and Hong Kong Markets. So far, I have managed to finish half of the assignment which is 6000 words. I have researched and finished areas such as the internal analysis, external analysis including PESTLE, SWOT, FIVE FORCES ETC. At this stage, I need to finish and decided on a realistic and reliable : *Market entry mode. *Suitable strategy to follow. (This should include theories to support the argument) *Controls which include: Financial budgets (sales forecasting and budgeting), marketing metrics and cash flow. (which should all be realistic and match the real markets).

https://anyessayhelp.com/

[supanova_question]

Conducting a Community Risk Analysis

Conducting a Community Risk Analysis.

 Within the DB area, write 3–5 paragraphs that respond to the following questions with your thoughts, ideas, and comments: What do you think is the scope of the definitions of the terms risks, threats, and hazards? Explain. How do you think these concepts should be utilized within the emerging discipline of homeland security? Explain in detail.

https://anyessayhelp.com/

[supanova_question]

Discuss the Functionalists’ arguments

Discuss the Functionalists’ arguments.

Write a 4-5 page, double-spaced paper, with 1-inch margins, in response to the following prompt. This is an essay which means you should NOT number your responses. A bibliography is not necessary. But make sure it’s clear which sources you are using in your paper. Do not use material or sources outside of class. Discuss the Functionalists’ arguments for: 1) explaining why there is economic inequality in society, and 2) the function of education in society. Then, critique the Functionalists’ arguments using Conflict Theory. Include: 1) the ways in which Conflict Theorists’ explanations for economic inequality differ from the Functionalists, and 2) the ways in which the Conflict Theorists’ arguments about the role of education in society differ from the Functionalists. Be sure to use examples to help you explain both theories. Your paper must have a total of four sources that you’re using as examples (see below). The Parsons, Turner, and Bowles & Gintis readings do not count as sources. You can use them but they don’t count as part of the four sources. • You must use the Wilcox article and Lareau book as two sources for examples. Be specific in your discussion of the research by Wilcox and Lareau, which means both summarizing their work and using direct quotes. For all direct quotes, you must explain the meaning in your own words (do not assume we know how you’re using the quotes). Proper citation rules apply for direct quotes – for example, in parentheses (author’s last name, year published, page number). • You must also use examples from two additional sources. You can draw from examples given in lecture, your investigative assignment, videos shown in class, other class readings, and your own personal experiences. An “A” paper is one that accurately discusses all the main points by the Functionalists and Conflict Theorists in response to the above prompt, uses appropriate examples from four sources to support the discussion of both theories, and that is clear and coherent. If you are concerned about your writing, please go to OASIS before submitting your paper

https://anyessayhelp.com/

[supanova_question]

2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an

2808ICT/7623ICT Information and Security Management Supplementary Assessment Supplementary Tasks This is an