Threat modeling begins with a clear understanding of the system in question Computer Science Assignment Help. Threat modeling begins with a clear understanding of the system in question Computer Science Assignment Help.
(/0x4*br />
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://umuc.equella.ecollege.com/file/ba8223ef-07…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://umuc.equella.ecollege.com/file/ba8223ef-07…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://lti.umuc.edu/contentadaptor/page/topic?key…
https://umuc.equella.ecollege.com/file/ba8223ef-07…
https://umuc.equella.ecollege.com/file/ba8223ef-07…
https://lti.umuc.edu/contentadaptor/page/topic?key…
Threat modeling begins with a clear understanding of the system in question. There are several areas to consider when trying to understand possible threats to an application: the mobile application structure, the data, identifying threat agents and methods of attack, and controls to prevent attacks. With those aspects in mind, you can create a threat model, which consists of an outline or checklist of items that need to be documented, reviewed, and discussed when developing a mobile application.
In this project, you will create a threat model. The length of this threat model should be eight to 10 pages. There are seven steps that will lead you through this project, beginning with the scenario as it might occur in the workplace, and then continuing with Step 1: “Describe Your Mobile Application Architecture.” Most steps of this project should take no more than two hours to complete, and the project as a whole should take no more than two weeks to complete.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
- 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
- 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
- 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
- 1.4: Tailor communications to the audience.
- 2.1: Identify and clearly explain the issue, question, problem under consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.5: Develop well-reasoned ideas, conclusions, checking against relevant criteria.
- 6.3: Specify security solutions based on knowledge of principles, procedures, & tools of data mgmt, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, & data standardization processes.
Step 1: Describe Your Mobile Application Architecture
In your role as a cyber threat analyst, you will identify for senior management how a particular mobile application of your choosing conforms to mobile architectures where you are asked to describe device-specific features used by the application, wireless transmission protocols, data transmission mediums, interaction with hardware components, and other applications. You will identify the needs and requirements for application security, computing security, and device management and security. You will describe the operational environment and use cases, and identify the operating system security and enclave/computing environment security concerns, if there are any. This can be fictional or modeled after a real-world application. Be sure to use APA citation format. This will be part of your final report. To guide you in your completion of this task, click the following links and review the topics and their resources:
- network security threats
- threat modeling
- mobile architectures
- application security
- operating system security
- enclave/computing environment
Begin by first reviewing the OWASP Mobile Security Project Testing Guide.
Architecture Considerations
Although mobile applications vary in function, they can be described in general as follows:
- wireless interfaces
- transmission type
- hardware interaction
- interaction with on device applications/services
- interaction with off device applications/services
- encryption protocols
- platforms
In Section 1 of your research report, you are to address a number of questions as they apply to your selected mobile application. You will focus your discussion on the security threats, vulnerabilities, and mitigations of the above considerations.
The following resources will continue to educate your management about mobile devices and mobile application security: mobile platform security, mobile protocols and security, mobile security vulnerabilities, and related technologies and their security. Related technologies can include hardware and software that are needed to interoperate with mobile devices and mobile applications. Include an overview of these topics in your report.
Use Mobile Application and Architecture Considerations to review the architecture considerations for mobile applications and architecture. Then, in your report to senior management, include those that are relevant to your mobile application. Address the following questions:
- What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc.)?
- What are the common hardware components?
- What are the authentication specifics?
- What should or shouldn’t the app do?
You will include this information in your report.
When you have completed the work for Section 1, describing the architecture for your app, move on to the next step, where you will define the requirements for the app.
Step 2: Define the Requirements for Your Mobile Application
In the previous step, you described your app’s architecture. For Step 2 and in the second section of your report, you will define what purpose the mobile app serves from a business perspective and what data the app will store, transmit, and receive. It’s also important to include a data flow diagram to determine exactly how data is handled and managed by the application. You can use fictional information or model it after a real-world application. Here are some questions to consider as you define your requirements:
- What is the business function of the app?
- What data does the application store/process (provide data flow diagram)?
- This diagram should outline network, device file system, and application data flows
- How is data transmitted between third-party APIs and app(s)?
- Will there be remote access and connectivity? Read this resource about mobile VPN security, and include any of these security issues in your report.
- Are there different data-handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME)
- Does the app use cloud storage APIs (e.g., Dropbox, Google Drive, iCloud, Lookout) for device data backups?
- Does personal data intermingle with corporate data?
- Is there specific business logic built into the app to process data?
- What does the data give you (or an attacker) access to? Think about data at rest and data in motion as they relate to your app. Do stored credentials provide authentication? Do stored keys allow attackers to break crypto functions (data integrity)?
- Third-party data: Is it being stored and/or transmitted? What are the privacy requirements of user data? Consider, for example, a unique device identifier (UDID) or geolocation being transmitted to a third party. Are there regulatory requirements to meet specific-to-user privacy?
- How does other data on the device affect the app? Consider, for example, authentication credentials shared between apps.
- Compare the impacts of jailbroken devices (i.e., a device with hacked or bypassed digital rights software) and non-jailbroken devices. How does the differences affect app data? This can also relate to threat agent identification.
When you have defined the requirements, move to the next step, where you will identify any threats to the app’s operation.
Step 3: Identify Threats and Threat Agents
Now that you have identified the mobile app’s requirements, you will define its threats. In Section 3 of the report, you will identify possible threats to the mobile application and also identify the threat agents. Additionally, you will outline the process for defining what threats apply to your mobile application.
For an example of threat agent identification, review Threat Agent Identification Example.
For a list of threat agents, review List of Threat Agents.
After you’ve identified threats and threat agents, move to the next step, where you will consider the kinds of ways an attacker might use to reach your app’s data.
Step 4: Identify Methods of Attack
In the previous step, you identified threat agents. In this step and in Section 4 of the report, you will identify different methods an attacker can use to reach the data. This data can be sensitive information to the device or something sensitive to the app itself. Read these resources on cyberattacks and provide senior management with an understanding of the possible methods of attack of your app.
When you have identified the attack methods, move to the next step, where you will analyze threats to your app.
Step 6: Controls
You’ve just identified the methods of attack, and now you will discuss the controls to prevent attacks. Consider the following questions:
Note: Not all of the following may apply. You will need to address only the areas that apply to the application you have chosen.
- What are the controls to prevent an attack? Conduct independent research, then define these controls by platform (e.g., Apple iOS, Android, Windows Mobile, BlackBerry).
- What are the controls to detect an attack? Define these controls by platform.
- What are the controls to mitigate/minimize impact of an attack? Define these controls by platform.
- What are the privacy controls (i.e., controls to protect users’ private information)? An example of this would be a security prompt for users to access an address book or geolocation.
- Create a mapping of controls to each specific method of attack (defined in the previous step)
- Create a level of assurance framework based on controls implemented. This would be subjective to a certain point, but it would be useful in guiding organizations who want to achieve a certain level of risk management based on the threats and vulnerabilities
Step 7: Complete Your Threat Model
You’ve just discussed the controls to prevent attacks. By now you should have completed all the components of your report. Now, you will compile all your findings and produce your threat model.When you have completed the Workspace exercise, provide a 8-10 page double-spaced Word document including your findings and any recommendations for mitigating the threats found with citations in APA format. The page count does not include figures, diagrams, tables or citations.Submit your threat model report to the Assignments folder.
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.- 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
- 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
- 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
- 1.4: Tailor communications to the audience.
- 2.1: Identify and clearly explain the issue, question, problem under consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.5: Develop well-reasoned ideas, conclusions, checking against relevant criteria.
- 6.3: Specify security solutions based on knowledge of principles, procedures, & tools of data mgmt, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, & data standardization processes.
Threat modeling begins with a clear understanding of the system in question Computer Science Assignment Help[supanova_question]
Project Resources and Budget Business Finance Assignment Help
The project for the company offsite 2-day training session has been given a preliminary go-ahead. However, a budget needs to be submitted for approval.
Update the Microsoft® Project file submitted in Week Two by adding the following information:
- Identify resources (both personnel and materiel) needed for the project.
- Assign the resources to the project tasks.
- Estimate the costs for the resources, and add the costs to the resource information in the Microsoft Project file.
- Estimate the total cost for the project, using the Microsoft® Project budget or cost reports.
Attached is MMP folder from last week assignment as a guide. Also, below is the instructor feedback from last week
Excellent project schedule task list with well defined tasks and good duration estimates. Project plan provided a good layout of the project life cycle phases and project management processes. Needed to include the WBS codes aligned with tasks. In MS Project 2013 to show WBS codes (or outline numbers) go to the “Format” tab then click on the “Outline Number”box (far right side). This is a best practice so that you and the project team can identify what tasks are being discussed and helps organize the plan (practice his when you download the tool). Needed to show tasks hierarchically grouped (as per assignment instructions) use Visio to create a hierarchical graphical structure similar to an org chart. Overall fairly well done.
[supanova_question]
Describe defense models and Explore database defensive methods Writing Assignment Help
- Step 4: Describe defense models
- To be completed by a designated team member
- State everything as requirements in context of the medical database
- Provide approximate timeline for delivery
- State overall strategy for defensive principles
- Explain importance of principles
- Read about
- Enclave/computing environment
- Cyber operations in DoD policy and plans
- Explain how it relates to the defensive principles
- Network domains have different
- Security levels
- Accesses
- Read and write permissions
- Network domains have different
- Define enclave boundary defense
- Include enclave firewalls separating databases and networks
- Define different database environments expect databases to be working
- Applicable security policies
- Step 5: Explore database defensive methods
- A team member will perform the MySQL lab
- Devise defensive methods that should be used in protecting databases
- Include information on threats, risks and possible recommendations to these threats.
[supanova_question]
Complete Human Resource Management Assignment Workplace Shifts Business Finance Assignment Help
Workplace Shifts
Society has evolved over the last century causing organizations to change with the times.
This evolution has, in turn, required workers to “re-tool” to be a productive and indispensable member of the workforce.
- Using this lead-in as the context, describe the workforce shifts in types of jobs during the past hundred years. Also, answer the over-arching question, “What implications have these workforce shifts created for today’s HR manager?”
The requirements below must be met for your paper to be accepted and graded:
- Write between 750 – 1,250 words (approximately 3 – 5 pages) using Microsoft Word in APA style, see example below.
- Use font size 12 and 1” margins.
- Include cover page and reference page.
- At least 80% of your paper must be original content/writing.
- No more than 20% of your content/information may come from references.
- Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
- Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
References must come from sources such as, scholarly journals found in EBSCOhost, CNN, online newspapers such as, The Wall Street Journal, government websites, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
[supanova_question]
Step 3: Provide Vendor Security Standards Computer Science Assignment Help
Step 3: Provide Vendor Security Standards
In the previous step, the team provided context for tasks in the RFP. In this step, the team will provide a set of internationally recognized standards for the competing vendors to incorporate into the manufacturing of the database and security mechanisms.
These standards will serve additionally as metrics of security performance to measure the security processes incorporated in the product. To prepare, read the following resources:
- Database Models
- Common Criteria (CC) for information technology security evaluation
- evaluated assurance levels (EALs)
- continuity of service
To be completed by a designated team member:
Address the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks. Include this in the RFP.
In the next step, the team will describe defense models for the RFP.
Step 4: Describe Defense Models
Now that team members have established security standards for the RFP, they will now focus on defense models. As the contracting officer’s technical representative (COTR), you can provide an approximate timeline for delivery since the networking environment will have numerous users and classes of access to be granted.
To be completed by a designated team member:
Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read about defensive principles.
Then, read these resources on the enclave computing environment. Explain how it relates to the defensive principles. The network domains should be at different security levels and have different accesses, as well as different read and write permissions using non-members of the enclave to taint access to resources and information in the enclave, or vice versa. Read these resources on enclave computing.
In the enclave computing environment, define enclave boundary defense and include enclave firewalls separating databases and networks. This can be fictional or modeled after an existing model, using your IEEE standard citation format. Define the different environments you expect the databases to be working in and the security policies applicable. Provide this information in the RFP.
In the next step, the team will consider database defenses.
[supanova_question]
[supanova_question]
Data Mining assignment Computer Science Assignment Help
Business Case Analysis 1
1. Dimension Reduction (5%)
This item requires the dataset Utilities.xls which can be found on the subject Interact site.
This dataset gives corporate data on 22 US public utilities. We are interested in forming groups of similar utilities. The objects to be clustered are the utilities.
There are 8 measurements on each utility described below. An example where clustering would be useful is a study to predict the cost impact of deregulation. To do the requisite analysis economists would need to build a detailed cost model of the various utilities.
It would save a considerable amount of time and effort if we could cluster similar types of utilities and to build detailed cost models for just one ”typical” utility in each cluster and then scaling up from these models to estimate results for all utilities. The objects to be clustered are the utilities and there are 8 measurements on each utility.
X1: Fixed-charge covering ratio (income/debt)
X2: Rate of return on capital
X3: Cost per KW capacity in place
X4: Annual Load Factor
X5: Peak KWH demand growth from 1974 to 1975
X6: Sales (KWH use per year)
X7: Percent Nuclear
X8: Total fuel costs (cents per KWH)
a. Conduct Principal Component Analysis (PCA) on the data. Evaluate and comment on the Results. Should the data be normalized? Discuss what characterizes the components you consider key and justify your answer.
b. Briefly explain advantages and any disadvantages of using the PCA compared to other methods for this task.
2. Naïve Bayes Classifier (10%)
This item requires the dataset UniversalBank.xls which can be found on the subject Interact site.
The following is a business analytical problem faced by financial institutions and banks. The objective is to determine the measurements for personal loan acceptance.
The dataset UniversalBank.xls contains data on 5000 customers of Universal Bank. The data include customer demographic information (age, income, etc.), the customer’s relationship with the bank (mortgage, securities account etc.), and the customer response to the last personal loan campaign (Personal Loan). Among these 5000 customers, only 480 (= 9.6%) accepted the personal loan that was offered to them in the earlier campaign. In this exercise we focus on two predictors: Online (whether or not the customer is an active user of online banking services) and Credit Card (abbreviated CC below) (does the customer hold a credit card issued by the bank), and the outcome Personal Loan (abbreviated Loan below). Partition the data into training (60%) and validation (40%) sets.
a. Create a pivot table for the training data with Online as a column variable, CC as a row variable, and Loan as a secondary row variable. The values inside the cells should convey the count (how many records are in that cell).
b. Consider the task of classifying a customer who owns a bank credit card and is actively using online banking services. Analyse the pivot table and calculate the probability that this customer will accept the loan offer. Note: This is the probability of loan acceptance (Loan=1) conditional on having a bank credit card (CC=1) and being an active user of online banking services (Online=1).
c. Design two separate pivot tables for the training data. One will have Loan (rows) as a function of Online (columns) and the other will have Loan (rows) as a function of CC. Compute the following quantities [P(A | B) means “the probability of A given B”]:
i. P(CC=1 | Loan=1) (the proportion of credit card holders among the loan acceptors)
ii. P(Online=1 | Loan=1)
iii. P(Loan=1) (the proportion of loan acceptors)
iv. P(CC=1 | Loan=0)
v. P(Online=1 | Loan=0)
vi. P(Loan=0)
d. Using the quantities computed in (c), compute the Naive Bayes probability P(Loan=1 | CC=1, Online=1).
e. Based on the calculations above, suggest the best possible strategy for the customer to get the loan.
Data Mining assignment Computer Science Assignment Help[supanova_question]
Filezilla Test Programming Assignment Help
This assignment will be to:
1. Create 3 pages with navigation between pages named: Home, Page 1 and Page 2
2. Make the H1 headers Red (have 2 H1 headers)
3. Make the H2 header Green
4. Make the entire Home page yellow color(use embedded style) and Put your name in a H1 Heading on Page 1 and Title.
5. Make the entire Page 1 Blue color (use embedded style)
6. Create a paragraph on the home page Make the first word italicized and the last word of the paragraph bold and red. (Use inline style)
7. Put an ordered list on page 1
8. Put an unordered list on the home page
9. Put a detailed list (dd and dt) on page 2
10. Upload all pages to your assigned web url.
You will put your url in this assignment –
Please i need the codes.
[supanova_question]
SOAP Note – Cardiovascular Patient “Myocarditis, cardiomyopathy” Health Medical Assignment Help
SOAP Note – Respiratory or Cardiovascular Patient
Complete a SOAP NOTE on a pediatric patient with “Myocarditis, cardiomyopathy”
Please include a heart exam and lung exam on all clients regardless of the reason for seeking care. So, if someone presented with cough and cold symptoms, you would examine the General appearance, HEENT, Neck, Heart and Lungs for a focused/episodic exam. The pertinent positive and negative findings should be relevant to the chief complaint and health history data. This template is a great example of information documented in a real chart in clinical practice. The only section that will not be included in a real chart is differential diagnosis. The term “Rule Out…” cannot be used as a diagnosis.
Subjective Data
Chief Complain (CC):
History of Present Illness (HPI):
Last Menstrual Period (LMP- if applicable)
Allergies:
Past Medical History:
Family History:
Surgery History:
Social History (alcohol, drug, or tobacco use):
Current medications:
Review of Systems
(Remember to inquire about body systems relevant to the chief complaint and HPI)
Objective Data
Please remember to include an assessment of all relevant systems based on the CC and HPI. The following systems are required in all SOAP notes. If it is a child, include the Tanner stage. You will proceed to assess pertinent systems.
Vital Signs/ Height/Weight:
General Appearance:
HEART:
RESP:
Assessment
A: Differential Diagnosis
Please rule out all differential diagnosis with subjective and objective data and/or lab-work.
1.
2.
3.
B: Medical Diagnosis
Rule in diagnosis with subjective and objective data and lab-work. They need to let us know how they arrived at the diagnosis.
1.
PLAN
A: Orders
- Prescriptions with dosage, route, duration, amount prescribed, and if refills are provided
- Diagnostic testing
- Problem oriented education
- Health Promotion/Maintenance Needs
- Referrals
Cultural Diversity: What cultural considerations would you suggest for this patient?
Patient/Family Education: If patient is currently on any medications, please address if you want them to discontinue or continue. You always want this to be clear at the end of the visit.
B: Follow-Up Plans (When will you schedule a follow-up appointment and what will you address in the subsequent visit —F/U in 2 weeks; Plan to check annual labs on RTC (return to clinic)
APA Format
Include a title page and references with all of your papers. There should be at least four references from textbooks, journal articles, CDC or NIH that are not older than 5 years. Please do not use Wikipedia, WebMD, dictionaries, or any websites that are not evidence based.
[supanova_question]
You have discussed Mr. McMahon’s case with your supervisor Business Finance Assignment Help
1,000–1,250 words
You have discussed Mr. McMahon’s case with your supervisor, and she agrees on your recommended course of action. She instructs you to inform the court of the violations that have been committed by Mr. McMahon in the form of a violation report, which will also include your recommendations. Your violation report should include the proper headings: “To,” “From,” “Date,” and “Re:.” The docket number and case file number should appear in the “Re:” section. Given what you know about Mr. McMahon, address the following in a Word document that is 750–900 words in length:
- Create a formal violation report that provides the court with all of the necessary information. Your report should be addressed to Judge J. Stone of the Lynchburg Circuit Court, and it should include the following sections:
- A narrative section for identifying information, which includes the original offense and disposition
- A narrative section for the violation information, which will include a listing of conditions violated
- A narrative section including your recommendations for the case
- For the purpose of this assignment, Mr. McMahon’s court docket number is 12358, and his case file number is 34711. Base the time frame of the violations off of today’s date, and feel free to add detail to your memo, provided that it does not change the character of the alleged violations.
Format your report in the form of a letter to a Circuit Court Judge. Remember this is a legal document to be submitted to the court, so be mindful of your grammar, syntax, and ton
N/B THE CASE CAN BE FOUND ONLINE ON THIS LINK
https://www.ukessayswriters.com/discuss-what-you-b…
[supanova_question]
Access the Hands-On Individual Assignment Computer Science Assignment Help
- Access the Hands-On Individual Assignment link for detailed instructions on completing this assignment.
- First, you will Install the LogixPro 500 PLC simulator on either your Windows machine or a Windows VM. (It can be used with a 15-day free trial.) Complete the three lab exercises on the website.
- Next, screenshot the logic diagram and the running program of each of the three lab exercises and submit those in a single word document using the assignment link.
- Finally, your assignment will be graded based on the six screenshots required from above. Each screenshot is either complete or incomplete
[supanova_question]