CMIT312 – Week 3 Quiz

At what layer of the TCP stack does web browsing take place?

This type of attack is usually the result of faulty programming practices. It allows an attacker to place data into a buffer that is larger than the allocated size, resulting in an overflow, overwriting, and corruption of adjacent data spaces.

IP spoofing is not difficult and can be used in a variety of attacks. However, the attacker will not see the packets that are returned to the spoofed IP address. In this case, the attacker uses ______________ and then sniffs the traffic as it passes.

Which tool helps hackers hide their activities by removing IIS log entries based on the attacker’s IP address?

This IIS vulnerability allows a remote user to view server-side scripts

Once an initial sequence number (ISN) has been agreed to, all the packets that follow will be the ____________. This makes it possible to inject data into a communication stream.

In _____________ hijacking, the attacker uses a packet-sniffer to capture the session IDs to gain control of an existing session or to create a new unauthorized session

Which of the following tools automates and takes advantage of directory traversal exploits in IIS?

Identify two vulnerabilities of Microsoft’s Internet Information Services (IIS) from the options listed below. (Select two.)

Which of the following is the best countermeasure against hijacking? (Select all that apply.)

This IIS vulnerability allows files to be accessed only when they reside on the same logical drive as the web folders

An attacker sends packets to a target host using a spoofed IP address of a trusted host on a different network. What kind of packets will be returned to the attacker? 

At what layer of the TCP stack does the three-way handshake occur?

In this type of attack, an attacker uses forged ICMP packets to redirect traffic between the client and the host through the attacker’s host.

_____________ is the US government’s repository of standards-based vulnerability-management data that includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics.

_____________ is an open-source development platform that allows users to configure exploit modules and test systems against attack.

By default, where are the IIS logs recorded?

What are the three steps in session hijacking? (Select all that apply.)

Which steps should be taken to increase web server security? (Select all that apply.)

 

This IIS 7 component allows clients to publish, locks and manages resources on the web, and should be disabled on a dedicated server.

Answer all the questions


Post your answers to the following exercise by clicking Reply.

 

Directions

Review the Summarizing, Paraphrasing, and Citing reading. Read the following paragraph:

Decision making is a process by which several possibilities are considered and prioritized, resulting in a clear choice of one option over others. Decision making is a fact of life personally and in business. We make dozens of decisions each day. Some decisions are simple, while others are complex. Some are made for us while others require a great deal of analysis and thought. From what to wear to work to what computer system to choose to how to reward top performers to what movie to see, we use a variety of complex thought processes to make decisions from an array of options. Our ability to make decisions helps us to navigate through life, avoiding potential problems and expanding our horizons. Decision making plays a similar role in business. Decision making aids managers in identifying and selecting among potential opportunities, helping them solve immediate problems and make future problems more manageable. Good decision makers are those who are effective at processing information, assessing risks, and making choices that will have positive outcomes for their organization.

  • Source 
    • Authors: S. C. De Janasz, K. O. Dowd, & B. Z. Schneider
    • Date: 2002
    • Title of book: Interpersonal Skills in Organizations
    • City of publication: New York, NY.
    • Publisher: McGraw-Hill.
    • Page number: 372

Complete the following:

  1. Write a brief summary of the main ideas of the paragraph. Create an in-text citation for your summary.

Answer:

 

  1. Paraphrase a specific point or points made by the author within the paragraph. Create an in-text citation for your paraphrase.

Answer:

 

  1. Identify a direct quote from the paragraph. Create an in-text citation for your direct quote.

Answer:

 

  1. Create a reference for your paragraph.

Answer:

 

 

 

 

 

Post your response to the following discussion question by clicking Reply.

Review the Resources to Prevent Plagiarism reading, and respond to the following question: Suppose one of your classmates asks you to proofread a paper before he or she submits it for a grade. When reviewing the document you begin to suspect that some portions are plagiarized. How would you approach your classmate about your concerns? What advice could you offer and what tools would you recommend to help that classmate avoid plagiarism?

 

Directions

Use the source information and the paraphrase portion of your Exercise 2 assignment to create citations in the Center for Writing Excellence Citation Generator. Save the paraphrase and citation as a Microsoft Word document and submit it to the Center for Writing Excellence Plagiarism Checker. After submission, post a 150- to 300-word summary of what you learned from using these resources and how you can use them in the future.

 

 

CIS 517 Case Study 1 Green Computing Research Project – Part 1 ( CIS517 Case Study 1 Green Computing Research Project – Part 1 )

CIS/517 Case Study 1 Green Computing Research Project – Part 1 (***** 4 Pages + APA Format + Answered All Parts + Matrix + References *****)

 

Read the Green Computing Research Project, Part 1 in Appendix C. Assume the project budget is $500,000 and will take six months to complete and that you must select the project team as soon as possible. Use project charter examples from Chapters 3 and 4 as support in your answer.

 

Prepare a project charter for the Green Computing Research Project.

 

Write a two to three (2-3) page paper in which you include the following:

 

1. Project title and date of authorization

2. Project manager name and contact information

3. A summary schedule

4. Project budget summary

5. Brief description of the project’s objectives

6. Project success criteria

7. Summary of planned approach for managing the project

8. Roles and responsibilities matrix

9. Use at least two (2) quality resource

Note: Wikipedia and similar Websites do not qualify as quality resources.

 

CIS517 Case Study 1 Green Computing Research Project – Part 1

CIS/517 Case Study 1 Green Computing Research Project – Part 1

CIS 517 Case Study 1 Green Computing Research Project – Part 1

Network Adminstration – ITNA359 DB4

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

In this assignment, you will research graphical troubleshooting tools for a Microsoft Windows network. Using the course materials and the Web, select and describe 3 graphical troubleshooting tools that can be used with a Microsoft Windows network. Be sure to address the advantages and disadvantages of each tool.

Discussion Board Assignment Guidelines

   Research and select 3 graphical troubleshooting tools that can be used with a Microsoft Windows network.

   Answer the following questions:

                           What are the 3 tools that you have selected?

                           What is the purpose of each tool?

                           What advantages does each tool offer?

                           What limitations or disadvantages are associated with each tool?

   Post a new topic to the Discussion Board that contains your answers to the 4 questions above.

   Respond to 2 other students’ posts on the Discussion Board, and critique their answers.

   Use APA references and citations to support your assertions.

                           Do not include a table of contents or abstract.

Your submitted assignment (60 points) should include the following:

   40 Points: Your Discussion Board topic containing your responses to the 4 questions in the assignment guidelines

 

20 Points: Responses to 2 other students’ Discussion Board posts

ITNA357 Network Security Management discussion 4

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

Some organizations have gone as far as inserting radio-frequency identification (RFID) chips into their employees to control their access into secure areas and to monitor their movement and location.

   Research and discuss where RFID tags have been used for security measures.

   Discuss your feelings on how these devices are being used.

   Be sure that you fully explain your viewpoint and justify your response.

As the popularity and use of RFID tags increase, the concern about these devices also continues to grow.

 

               

week5 Assignment

Assignment 2: APA Fundamentals

Due Week 5 and worth 75 points

Login to iCampus (https://icampus.strayer.edu/login) and review Strayer University’s APA guidelines located in the Learning Resource Center under the Student Services tab. This information is also available by clickinghere.

Review the following tutorials which demonstrate the use of MS Word to create a paper according to APA Sixth edition standards.

Download and use the text document provided here. (Note: You must use the provided information to complete the assignment.) Using the document’s content, create one (1) APA Sixth edition paper writing template in which you: 

  1. Format a title page according to APA Sixth edition standards.
  2. Format the provided abstract, introduction and thesis statement, body, and conclusion according to APA Sixth edition standards.
  3. Format the provided block quote in the body of the template according to APA Sixth edition standards.
  4. Format the provided references according to APA Sixth edition standards.
  5. Format the overall paper (font, font style, spacing, margins, etc.) according to APA Sixth edition standards.

The specific course learning outcomes associated with this assignment are:

  • Use word processing software to create and format documents.
  • Use technology and information resources to research issues in information systems.  
  • Write clearly and concisely about introductory information systems topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

 

Week 4 Assignment 1 Submission Click the link above to submit your assignment. Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. Instructors, training on how to grade is within the Instructor Center. Assi

 

Click the link above to submit your assignment.
        

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.  
Instructors, training on how to grade is within the Instructor Center.

Assignment 1: Computer Architecture
Due Week 4 and worth 110 points

Computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver the machine’s intended performance characteristics. Therefore, it is important for you to understand the basics.

Write a four to five (4-5) page paper in which you:

  1. Describe Von Neumann architecture and explain why it is important.
  2. Explain what a system bus is and why it is needed.
  3. Summarize the use of Boolean operators in computer-based calculations.
  4. Categorize the various types of memory and storage.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Illustrate the use of information and communication technologies to solve problems as an information technology professional.
  • Explain how organizational context is influenced by the development and deployment of information technology systems.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric. 

Pre-Sentence Investigation ( PSI)

Part I: This essay is a critical thinking exercise. Do not read into this! Just base your decision(s) on the information that you have. There is no one right or wrong response but you will be graded on your knowledge of correctional treatment, their options, supportive input, and logical reasoning.
Instructions: After reading this scenario, assume you are before Judge Judy. Judge ***** *****kes things brief. So keeping that in mind:
A. Prepare and write a PSI review. What would be the highlights of this scenario that you would tell the judge that would cover the core categories?
B. What information is pertinent that would give a good description of the client that would benefit an appropriate sentencing? Remember to be brief in your comments to the judge, but also relay to her the PSI core categories information.
C. What sentence would you recommend to the judge? If you recommend jail time or probation, list an additional intermediate punishment/sanction appropriate to the offender. Explain your response.
Case Scenario:
1. You are a probation officer assigned to the case of Joe, a 21 year old man convicted of burglary from a business during the nighttime. Joe admitted to and was convicted of breaking into the City Liquors And Smokes and stealing cash from the register, and several cases of beer. Joe was quickly apprehended and during his arrest, police found a switchblade in Joe’s pocket. As a teenager, Joe already had a long history of juvenile offenses. His delinquency included truancy, shoplifting, possession of weapons (knives), and marijuana and alcohol possession and consumption. He frequently got into fights while in high school and he was known as a bully. As a juvenile, Joe spent a total of some 10 days in a juvenile facility. For the most part, when in trouble with the law, Joe received probation that included mandatory drug treatment.
Now an adult, Joe did not stop his criminal behavior. At age 19 he served 30 days in jail for drug possession and shoplifting. His current offense is the burglary and theft.
When you compiled Joe’s PSI, you discovered that Joe grew up in a two-parent household in which there was constant domestic abuse. His parents are now unavailable because his father abandoned the family years ago and his mother is currently undergoing inpatient treatment at a local drug clinic. Joe currently lives with his girlfriend who is 4 months pregnant. Joe has a G.E.D. and minimal employment skills. At the time of his current arrest, Joe was unemployed. The only jobs he had are those of unskilled labor. His work history is scant and often Joe was fired from jobs due to tardiness. Joe reports that he is in good health and there is no reported history of out-patient or in-patient treatment for psychological or emotional disorders. He admits to being a heavy alcohol drinker and occasionally smokes marijuana. After compiling information for the PSI, you believe that Joe has a severe alcohol addiction and limited education/skills to obtain steady employment. You must now make a decision about Joe. What mode of correctional treatment, intermediate sanction, or sentence would you choose and why? Remember to address Judge Judy’s questions as written in the instructions.
Part II: On the following questions, please provide a short response.
2. When ordering probation, the court imposes general conditions to follow. Often, the probationer may also be told to follow specific conditions. What is the difference between general and specific conditions of probation?
3. What is Tourniquet Sentencing?
4. List the major functions of probation. (just list the functions, no need to provide additional details.)

Help with Health Informatics!

CASE SCENARIO – WEEK 1—NuWave Health System –
BACKGROUND
You are a Chief Operating Officer for one of the hospitals for an integrated health system that operates hospitals, clinics, health centers – NuWave Health System. You have been appointed to lead a new working group for the system. The group is tasked with improving the governance and management of health information technology
The NuWave Health System has recently adopted new strategic initiatives around transitioning from the acute “sick care” model of healthcare to one focused on wellness and integrated care delivery in the new “wellness” healthcare model.
New business objectives underway include the addition of a home health capability, better outreach to the community, better integration with the physician community, and new and more intimate relationship with the patient community. As always, several continuing business objectives exist to proved best quality of care at most effective cost.
A recent HIPAA violation resulted in the inadvertent release of information that caused the system a significant penalty and bad publicity in the community. It involved personnel sharing passwords and accessing unauthorized information.
The system has an EHR and automated systems for their ancillary (radiology, laboratory, pharmacy) departments and is underway for updates across the board to meet requirements for Meaningful Use within the hospitals but have different systems in their ambulatory facilities.
The system has standardized automated applications in the business side within revenue cycle, finance, supply chain and communication applications.
THE CHALLENGE
You want to make your best contribution to the working group that currently consists of the CIO, IT department directors, the CFO and nursing representatives. Prior to the first meeting, each member is asked to bring input as to suggestions on topics, initiatives, approaches, etc Based on some preliminary communication and your own experience in operations, you know not all the working group members are technology or information management experts, that the organization has previously treated past information technology projects as strictly “IT projects”

ASSIGNMENT:
-Using the information from your reading, please cover the following points in your preparation for this meeting
-Based on your reading, identify some keys for success, describe and tell why they are important

– In framing your working group’s agenda, what are some of the major areas you will need to address in the coming future meetings
-Imagine an application technology that might be useful in helping achieve their new strategies

ITCO331 – Unit 1 Individual Project

Your first task is to download and install SQL Server 2008, Express Edition. Once that is installed, set up the Northwind database, which will be used throughout the class.

Complete the following tasks:

•.Download and install SQL Server 2008, Express Edition.

                           Refer to Appendix A of the textbook.

•.Open and run the attached script to create the Northwind database.

                           To download the script, click here.

•.Create the following tables in the Northwind database:

 

•.

•. 

•.Alter the Employee table to establish a foreign key between Employees and Departments.

                           Employees.DepartmentID references Departments.DepartmentID

•.Alter the Territories table to establish a foreign key between Territories and Regions.

                           Territories.RegionID references Regions.RegionID

•.Update the data in the Employees table so that employees with the following managers are listed as working in the following departments:

•.ReportsTo

•.Department

•.Andrew Fuller

•.Sales

•.Steven Buchanan

•.Marketing

•.All Others

•.CEO

 

Submit the SQL, DDL, and DML scripts needed to complete tasks 2–8 and a database diagram of the final database.