Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help

Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help. Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help.


(/0x4*br />

You work as a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed. This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this. Your deliverable will be a 7 page APA style research report with your findings. Discover current attacks being performed through this port, or current state of a known scanning suite. Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code. List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain). Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat. Use the FAIR methodology to derive your threat assessment. The attached FAIR PDF will walk you through your analysis. To complete the FAIR document:

  • Step 1: Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2: You will provide this answer based on your research.
  • Step 3: You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
  • Step 4: You will provide this answer based on your research.
  • Step 5: Assume the e-Commerce server is fully up-to-date and running the following base software: Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
  • Step 6-7: Calculate
  • Step 8: Assume Moderate
  • Step 9: Assume Moderate
  • Step 10: Calculate and create this chart in excel with the appropriate item highlighted. Include this chart in your paper and presentation.

Once you complete your paper, you will need to create a presentation. Make sure to include the chart from step 10 in your presentation, everything else is up to you on how you want to brief the class on your findings.

————————————————————————–

Research Paper Guidelines

You will be writing a research paper in the following format using APA guidelines:

INTRODUCTION

  • State the research question you are trying to answer (You will pick 1 of the topics available as a group)
  • State why the question is important
  • State the issues involved
  • State why we should be concerned with resolving whatever issues are involved
  • State how answering the question will help us
  • State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE
Identify who has tried to answer the question before by doing the following:

  • Summarize how each of the sources presents and deals with the subject
  • Explain how each source presents and deals with its findings or results
  • Explain the relevancy of each source to your research question
  • State what you learned from each of your sources
  • State in what way(s) each source contributes to answering your research question

DISCUSSION
State your answer to your research question
State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your research question
State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS
State the conclusions regarding your topic you have reached from having surveyed, interpreted, evaluated the literature
Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
State the implications of your conclusions
State what might be the possible consequences of your conclusions
State the social significance these implications and consequences might have

DOCUMENTATION
On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
You should have a MINIMUM of three (3) sources for your paper
Not meeting this minimum requirement of three (3) sources will lead to a lower evaluation of your paper for each missing source
Use APA format for documenting your sources

-For APA help: Purdue OWL
-For more details on journal types, refer to this link: Rutgers Library

Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help[supanova_question]

Emerging Threats and Countermeasures Computer Science Assignment Help

***Note***: No additional materials will be provided

1. You will need 2 Virtual Machines (VM)

On windows “disable the firewall and windows defender”

1: Replace the example IP with the Kali IP go to terminal >enter ifconfig.

2: Get the IP of the Windows OS. Run>CMD>ipconfig (it’s the IPv4)

3. Ping the Windows IP from Kali to test connection (ping <IP>)

Follow Directions

Provide screenshots of your process from the lab

– Screenshots must generate from your computer

– Screenshots must show the time in the bottom right screen (windows) or Mac top right corner.

2. Continuing from the WK 7 Research Paper, provide a short summary of the Kali tool you researched.

Explain how is it a threat, provide background information, how it is used, how you can defend against it (your opinions).

– Respond to two other students.

[supanova_question]

2.Help to solve 25-30 questions of Number Theory Mathematics Assignment Help

Help to solve 25-30 questions of Number Theory

Please number each question from 1 to the end as the order I put in the folder when you answer them.

This is an Elementary Number Theory class. Please make sure you can handle it very well.

You have to promise at least 75 percent of your answers are completely correct because this assignment is very important.

The name of the textbook is “Elementary number theory” by James K. can be found on internet if you need.

I have uploaded all questions need to be answered on to dropbox:https://www.dropbox.com/sh/y4gn75f0lutaych/AAD19vn…

Please go through every question carefully before you place your bid to make sure you can handle them.

Thank you very much!

[supanova_question]

need a research paper (7 pages) and ppt (10 slides) on port 1433 TCP. APA Format is a must in research paper. Requirements are below Computer Science Assignment Help

ou work as a research wing for a standard SOC (Security Operations

Center). The SOC keeps analytics on the current trends within the

network. Your team will be assigned a current issue that has been seen

at the border of the network, trying to infiltrate the organizations

network/systems. Upon being assigned your item, it will be your job to

go out and search OSINT (Open Source Intelligence) for more information

on the attack being observed. This could be a single port number, a

series of attacks that has been identified, or an IP address to research

and identify; your professor will assign this. Your deliverable will be

a 7 page APA style research report with your findings. Discover current

attacks being performed through this port, or current state of a known

scanning suite. Find sources, if possible, source code of attacks that

are known to exploit this weakness and break down the code. List known

services on the affected ports that are associated and current attacks

being performed on these services (list any CVE findings and briefly

list and explain). Look at SNORT rules that watch for these attacks and

list that SID.

Finally, to wrap-up your research, present the
current risk level associated with this threat. Use the FAIR methodology
to derive your threat assessment. The attached FAIR PDF will walk you
through your analysis. To complete the FAIR document:

  • Step 1: Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2: You will provide this answer based on your research.
  • Step
    3: You will provide this answer based on your research; however, keep
    in mind how many times per day this is scanning the network, which will
    be given to your when you receive your topic.
  • Step 4: You will provide this answer based on your research.
  • Step
    5: Assume the e-Commerce server is fully up-to-date and running the
    following base software: Red Hat Linux, Apache, MariaDB, Drupal, PHP and
    is hardened based on base NIST recommendations for operations.
  • Step 6-7: Calculate
  • Step 8: Assume Moderate
  • Step 9: Assume Moderate
  • Step
    10: Calculate and create this chart in excel with the appropriate item
    highlighted. Include this chart in your paper and presentation.

Once
you complete your paper, you will need to create a presentation. Make
sure to include the chart from step 10 in your presentation, everything
else is up to you on how you want to brief the class on your findings.

————————————————————————–

Research Paper Guidelines

You will be writing a research paper in the following format using APA guidelines:

INTRODUCTION

  • State the research question you are trying to answer (You will pick 1 of the topics available as a group)
  • State why the question is important
  • State the issues involved
  • State why we should be concerned with resolving whatever issues are involved
  • State how answering the question will help us
  • State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE
Identify who has tried to answer the question before by doing the following:

  • Summarize how each of the sources presents and deals with the subject
  • Explain how each source presents and deals with its findings or results
  • Explain the relevancy of each source to your research question
  • State what you learned from each of your sources
  • State in what way(s) each source contributes to answering your research question

DISCUSSION
State your answer to your research question
State
how and elaborate on how, explain how, illustrate how each of the
sources you previously reviewed help you answer your research question
State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS
State the conclusions regarding your topic you have reached from having surveyed, interpreted, evaluated the literature
Indicate
how each of the sources have contributed to your conclusions (and
clearly, accurately, correctly document those sources within your text)
State the implications of your conclusions
State what might be the possible consequences of your conclusions
State the social significance these implications and consequences might have

DOCUMENTATION
On
a separate page, include a section labeled References which provides
the full publication information for all the sources you used in your
paper
You should have a MINIMUM of three (3) sources for your paper
Not meeting this minimum requirement of three (3) sources will lead to a lower evaluation of your paper for each missing source
Use APA format for documenting your sources

-For APA help: Purdue OWL
-For more details on journal types, refer to this link: Rutgers Library

[supanova_question]

english315 assignment Humanities Assignment Help

Due Week 2 and worth 100 points

Choose one of the professional scenarios provided in Blackboard under the Student Center tab, or click here to view them in a new window.

Write a Professional Email Message (in the form of Figure 5.1 on page 84 of BCOM9) from the perspective of a character in the scenario. The email should discuss the communication issue provided in the scenario and should be addressed to another character from the scenario.

The message should take the form of an email; however, you will submit your assignment to the online course shell.

The professional email message must adhere to the following requirements:

1. Content:

  1. Address the communication issue from the scenario.
  2. Request a face-to-face meeting to discuss the issue (at a specific time).
  3. Concentrate on the facts of the situation and avoid using overly emotional language.
  4. Assume your recipient is learning about the situation for the first time through your communication.

2. Format:

  1. Use a descriptive subject line or heading.
  2. Include an appropriate and professional greeting / salutation.
  3. Use email form including: To:, From:, Subject:, and Signature.

3. Clarity / Mechanics:

  1. Focus on clarity, writing mechanics, and professional language/style requirements.
  2. Run spell/grammar check before submitting.

4. Your assignment must:

  1. This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

5. Submitting your assignment:

  1. Submit your assignment through the online course shell only.

6. The specific course learning outcomes associated with this assignment are:

  1. Plan, create, and evaluate professional documents.
  2. Deliver professional information to various audiences using appropriate tone, style, and format.
  3. Analyze professional communication examples to assist in revision.

[supanova_question]

[supanova_question]

Assignment Computer Science Assignment Help

Part 1:

Help yourself with octave or other software of your choice and load daily stock prices for 512 days (5 stocks): date, open, high, low, close, volume

ibm.us.txt

tsla.us.txt

aapl.us.txt

fb.us.txt

a.us.txt

1)

(a) What is the largest relative close price change during 512 days given, and

(b) which stocks exhibits it, and

(c) what are the dates for minimum and maximum closing prices that give the largest relative change (% change)?

2)

Using all the closing prices for each stock, find all the possible covariances between the given stocks.

3)

After normalizing all the closing prices for each stock in the range from 0 to 1 (for all dates) create in a figure histogram for each stock price distribution. Use Use 16 bins for the histograms.

Part 2:

Submit in a plain text the answers to questions given in MDT.pdf


Assignment Computer Science Assignment Help[supanova_question]

Write a 3- to 4-page paper in which you address the following: Writing Assignment Help

Write a 3- to 4-page paper in which you address the following:

  • Summarize the criminal procedures that occurred in this case, from arrest through appeal, if applicable.
  • Explain the crime the defendant allegedly committed.
  • What are the elements of that crime? Is there sufficient evidence to believe the defendant guilty of this crime beyond a reasonable doubt?
  • Identify the legal defenses used in this case. Explain what the defense entails and the effectiveness of the defense.
  • Describe the sanctions were given in the case?
  • What were the factors in sentencing? What sentencing goals were met with the sentence?
  • Explain if you believe the death penalty is effective at preventing crime?
  • Does the amount of time a prisoner spends in death row impact how effective it is?
  • Explain if the death penalty should be abolished?
  • Why or why not?

[supanova_question]

Writing Persuasive Researched Essay About Status Symbol Related to Fashion Humanities Assignment Help

PERSUASIVE/ARGUMENTATIVE ESSAY #4

1. Write a 1000 word essay. Submit a formal outline.

2. Submit typed final copy following the MLA format from our texts.

3. Essay should include introduction with a thesis statement, body, and conclusion.

4. You must use 2 RESEARCHED SOURCES FROM THE COLLEGE LIBRARY DATABASE. You must then incorporate this material in your writing and CITE SOURCES CORRECTLY IN YOUR ESSAY USING THE MLA FORMAT AS A WORKS CITED at the end of your essay. Follow the models in your text.

5. The mode is Persuasive/Argumentative. You must convince the reader (me) of the point you are arguing. YOUR ESSAY MUST PROVE YOUR THESIS!

6. No first person “I” point of you.

7. The topic is STATUS SYMBOL RELATED TO FASHION). It should be DEBATABLE-either personal,local, statewide, national or global, something you care about, something important, something controversial.

[supanova_question]

Multiple choice and essay Humanities Assignment Help

1. Developing a sociological imagination

a. turns a sociologist into a revolutionary

b. enhances our understanding of advanced statistics

c. reveals that history often repeats itself

d. offers a broader picture of the economic and political forces of society past and present that impinge on each person’s life

2. According to Stiglitz and other social scientists, reducing inequality can be accomplished by

a. increasing the strongly enforced income tax on corporations and rich persons who pay little or no taxes by evasions and loopholes

b. providing a strong social safety net for the disadvantaged population

c. expanding educational and employment opportunity for youth

d. all of the above

3. According to Dr. Franke, a just society

a. guarantees total equality

b. assures male dominance according to evolutionary theory

c. protects at the very least the civil liberties of all citizens

d. eliminates capitalism

4. The distinction between a micro-level of analysis and a macro-level of analysis

a. is a matter of opinion

b. is based on whether we employ conflict theory or functionalism

c. is based on whether we are studying small-group interaction or studying larger structures such as society itself

d. none of the above

5. The modern welfare state among Western democracies can be identified as one which

a. puts most of its domestic budgetary resources into the benefit of the poor

b. possesses an activist government to regulate the economy

c. is dedicated to invest in the well-being of all its citizens in building social capital for the country

d. b and c

6. What is special in America’s recent economic history of the period 1945-1973?

a. the rise of the youth movement—make love not war

b. the great expansion of manufacturing and the improvement of living standards for the working class

c. the shift from manufacturing to services

d. the high cost of imported oil

7. Neoliberalism is a current favorite belief system of an economic elite. It is based upon the assumption

a. it is up to government to help the poor

b. private enterprise is always more efficient and effective in providing services than government run ones

c. government has no business interfering with the free market

d. b and c

8. Symbolic Interaction theory emphasizes

a. micro-level analysis

b. individual perceptions and definitions of situations

c. a degree of unpredictability and spontaneous actions

d. all of the above

9. Conflict theory has a general meaning and a specific Marxian meaning.

a. clashes or struggles between groups possessing unequal power(general meaning)

b. each individual pursuing the American Dream

c. struggles over class conflict in terms of economic groups with antagonistic interests

d. a and c

10. Which answer below best describes Senator Bernie Sander’s view of socialism

a. the future belongs to socialism not capitalism

b. socialism in his speeches really represents a more generous form of government programs and a better social safety net

c. Progress is inevitable

d. converting profitable private property over to the workers for the common benefit of their communities

11. The so called free market

a. increases freedom for all Americans

b. is a myth in the face of corporate monopolies determining prices

c. reduces inequality

d. none of the above

12. Functionalism and conflict theory

a. reject evolutionary theories of society

b. are macro-level theories

c. are completely different having nothing in common

d. evolved from the works of Durkheim

13. The social order of any society has certain characteristics, one of which is

a. a determination of a system of inequality

b. the provision of equality regardless of race, class or ethnicity

c. the preference for male dominance according to evolutionary theory

d. none of the above

14. Maintaining the social order and warding off extreme change like the overthrow of a government is dependent on

a. compliance of the population to laws and customs due to willingness to conform as well as the fear of punishment of non-conformity

b. the effectiveness of propaganda by those in power

c. the success of government to suppress social movements advocating change

d. all the above

15. The instructor explained that the relationship between the individual and society is complex. He meant that:

a. complexity can only be understood under laboratory conditions

b. sociology must employ complex statistical methods to obtain reliable and valid data

c. there are many intervening variables and conflicting forces between the two.

d. each person is unique and has his or her own opinions and beliefs

16. The pluralist model of political power is characterized by

a. the ultimate battle between the Democrats and the Republicans

b. a broad representation of different interest groups competing for elected government office

c. the party that gets the most votes wins an election

d. third party candidates who compete for office

17. C. Wright Mills and William Domhoff

a. offer different examples of elite models of political power

b. both men are members of the Communist party and followers of Marx

c. take into account the effects of religion on politics and the economy

d. reject the existence of a military-industrial complex

18. The de-industrialization of the American economy

a. resulted in the loss of millions of factory jobs

b. created a condition of surplus labor doomed to join the ranks of low-wage service labor

c. meant that blue-collar workers could no longer count on secure and well-paying jobs

d. all the above

19. Absolute scarcity of resources like food and clean water can result in mass hunger and starvation, or in the case of insufficient clean water serious epidemics. Artificial scarcity occurs

a. in places like North Korea where a dictator rules

b. in capitalist America where there is an abundance of everything but sufficient wages for many workers to be able to buy what they need

c. countries with high inflation

d. in economically undeveloped countries

20. The instructor’s position on the introduction of new technology highlights

a. technological change being increasingly rapid and inevitable in its impact on society

b. automation and artificial intelligence will replace most human workers

c. the impact of technological change actually depends on the presence or absence of government to intervene in behalf of public interest

d. the desirability of cutting labor costs for American companies

21. The concept of McDonaldization emanates from Ritzer’s research on the fast food industry. What is his main message?

a. McDonaldization is a threat to Western civilization

b. McDonaldization as an economic process and philosophy permeates much of American society and has expanded in much of the world today

c. offers young entrepreneurs ways of competing with big corporations

d. relies on quality rather than quantity

22. It is pretty clear from the study of the sociology of emotions that

a. how one expresses one’s feelings to others is instinctive

b. emotions play an important part in the way we interact with others

c. women are more emotional than men

d. as Max Weber uttered: all the world is a stage and all of us are actors

23. Globalization studies cover many aspects of the nations of the world in their interaction and integration. One big idea stands out:

a. the processes of globalization are upon us whether we like it or not

b. the market forces of capitalism solves the problem of world poverty

c. globalization as of 2019 has little to no connection to the past

d. America can expect to be the sole global superpower for the next 1000 years

24.Instrumental rationality is associated with what process?

a. the organization of social movements

b. McDonaldization

c. maintaining the social order

d. the construction of ideal types

25. Which sociologist was concerned that the danger of the iron cage of rationality would destroy human spontaneous emotions

and increase disillusionment with the world?

a. Karl Marx

b. Emil Durkheim

c. Max Weber

d. C. Wright Mills

26. According to the instructor, the split labor force in America today

a. has been created solely by the effects of McDonaldization

b. reflects primarily a two-tier labor force, one relatively secure and well-paid and the other relegated to low-wage service work

c. represents a sharp break between those who have attended college and those who have not.

d. offers upward social mobility for entry level service jobs.

27. In the book “McDonaldization of Society”, Ritzer relates McDonaldization’s mass production of hamburgers to the Holocaust’s

mass extermination of the Jewish population under Nazi occupied Europe. How are the two related?

a. it is a gross mistake to make that connection

b. Both use systematic assembly line processes to effectively and efficiently achieve certain objectives

c. The means always justify the ends

d. Both activities prove to be profitable for McDonald’s corporation as well as the Nazis regime

28. What are we to learn from Hochschild’s work “Strangers in their Own Land”?

a. We may disagree with those whom we view as different from us, but we can try to be open in our feelings–to empathize with conservative people of Louisiana as fellow human beings

b. we can only conclude that those people who voted for Trump are idiots

c. the older population were more conservative than the younger folks

d. Hochschild’s observations were tainted by her friendships with her subjects

Required Essays: To get full credit number each essay and identify each part of the essay such as (a) or (b). These are to be written as answers to essay questions. For any quote, identify its source, and put it in your own words in explaining it.

1. Wallerstein’s World Systems theory is one model in describing the globalized world. How applicable is it in describing globalization now in 2019?

2. Various forms of inequality are found more or less in all societies with respect to wealth, power, and social status. What can be done in a democracy to foster greater political and economic equality? Must there be such gaps between the very rich and the very poor?

3. There are two important historical periods in the United States in the 20th century: 1945-1973 and post l973 through today. Describe those two periods to understand the American job market now. What are the key factors to differentiate those two periods?

4. Domhoff and others have demonstrated the superiority of the elite model over the pluralist model as to the concentration of political power in America. Present their argument. Do you see any flaws in their position?

5. (a) explain concisely what did you learn about the topic( low-wage service workers)[1] you didn’t know before (b) in conducting this research what did you learn about research methods that will improve your conducting future research studies in sociology or in other fields of interest?

6.As described by the instructor, science and technology represent a rational world view of our age. (a)With the serious problems of poverty, war and climate change occurring globally, why would you describe the growth of science and technology as a double-edged sword in terms of the precarious and yet hopeful future of humankind? (b) what are the arguments for and against the continuation of global capitalism for the future of mankind?


[1]

[supanova_question]

Emerging Threats and Countermeasures Computer Science Assignment Help

**Note***: No additional materials will be provided

1. You will need 2 Virtual Machines (VM)

On windows “disable the firewall and windows defender”

1: Replace the example IP with the Kali IP go to terminal >enter ifconfig.

2: Get the IP of the Windows OS. Run>CMD>ipconfig (it’s the IPv4)

3. Ping the Windows IP from Kali to test connection (ping <IP>)

Follow Directions

Provide screenshots of your process from the lab

– Screenshots must generate from your computer

– Screenshots must show the time in the bottom right screen (windows) or Mac top right corner.

2. Continuing from the WK 7 Research Paper, provide a short summary of the Kali tool you researched.

Explain how is it a threat, provide background information, how it is used, how you can defend against it (your opinions).

– Respond to two other students

[supanova_question]

Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help

Need a research paper (7 pages) and ppt( 10 slides) on port 1433 TCP. APA format is must in research paper. Requirements are below Computer Science Assignment Help

× How can I help you?