You have been promoted as the manager of the e-commerce site for the company you

You have been promoted as the manager of the e-commerce site for the company you working for. You are concerned about a recent SQL attack that happened. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the website and database to be compromised by an SQL injection attack.
Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.
Follow the instructions below
Provide at least three reasons why it is less expensive to build secure software than to correct security issues after a breach.
Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.
Evaluate which method of the secure software development lifecycle will best serve your team, and explain how you plan on implementing your thoughts into your existing processes.
Identify three resources that can be used as “reference material” and act as a beginner’s guide for new employees. Outline the importance of each resource and how each resource can assist new coders. 
Outline all the major aspects of the best practice coding guideline, including objectives, purpose, resources, and methodology

Question #1: Research two software firewalls and explain the advantages and disa

Question #1: Research two software firewalls and explain the advantages and disadvantages of each one of them. Which one would you recommend and why?
Question #2: What are the challenges in securing networks (internet, LANs, wireless)? Which network is most difficult to secure and why?

Using  the same dataset as last week or a different one, select two  qualitative

Using  the same dataset as last week or a different one, select two  qualitative variables and two quantitative variables. Explain why you  selected these variables. 
Analysis: For your qualitative variables, create a contingency table and calculate the association between them. 
For  your quantitative variables, calculate the correlation between them.  Include scatter plot to visually represent this relationship. 
Interpretation:  Explain your findings. What does the association or correlation say  about the relationship between your variables? Is the relationship  strong, weak, positive, negative, or nonexistent? 
Reflection:  Reflect on the importance of understanding associations and  correlations in data analysis and how they can guide further data  investigation. 
Submission Format: Your submission should be a maximum of 500-600 words. Submit your assignment in APA format as a Word document or a PDF file. Include  both your written analysis and any visualizations or tables that  support your findings. If you use any software for your calculations  (Excel), please include your code or  formulas as well.

Purpose In this assignment, you will examine a forensic disk image for evidence

Purpose
In this assignment, you will examine a forensic disk image for evidence of corporate espionage. Read the scenario document carefully, as you may consider it interview notes with your client. This represents a more complex scenario than Investigation 01 and thus contains a greater degree of irrelevant data. Be sure to give yourself plenty of time to perform the examination, and be sure to take advantage of Autopsy’s features to assist your disambiguation.
Instructions
You’ll need to use the following resources to complete the assignment:
Investigation 02 Sample Evidence*
Autopsy the open-source forensic suite* (or another suite, such as EnCase or FTK.)
(Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)
*Accessed via the Virtual Lab.
After reading the Investigation 02 Scenario, open your forensic tool and import the sample evidence into the tool. Begin a forensic report and begin your search. As you do, be sure to take special note of these answers to these questions. These questions represent those that need to be answered to arrive at a logical conclusion to this scenario. They are provided here, but in the future, you will be required to decide these questions on your own.
Scenario
This scenario takes place circa 2008.
M57.biz is a hip web start-up developing a body art catalog. They’ve pulled in over $3 million in funding with a net return of $10 million. The company is small, with only seven employees, including founder Alison Smith. Alison was co-founder with her long-time partner Raoul Perdoga, but she recently forced him out of the business following a nasty break-up.
Current employees are:
President: Alison Smith
CFO: Jean Jones
Programmers: Bob Blackman, Carol Canfred, David Daubert, Emmy Arlington
Marketing: Gina Tangers, Harris Jenkins
BizDev: Indy Counterching
Despite their recent success, they have a decentralized office. Most people work at home or on the road. Communication and collaboration are primarily by email through their own @m57.biz domain. This worked fine until a spreadsheet containing confidential proprietary company information was posted as an attachment in the technical support forum of a competitor’s website.
The spreadsheet came from CFO Jean’s computer, but she denies any knowledge of the leak. She says that Alison asked her to prepare the spreadsheet as part of a new funding effort and to email it to her. Alison denies she ever asked for the spreadsheet and never received a copy by email. A recreation of the spreadsheet table is found below for you to use.
Questions
When did Jean create the spreadsheet? Jean asserts that she created the spreadsheet after Alison had asked for it by email.
How did the spreadsheet get from Jean’s computer to the competitor’s website? Jean says she emailed it to Alison but denies ever visiting the competitor’s website.
Is anyone else from the company involved? What about people who are not in the company? What possible motive could they have?
If what Jean says is true, what steps can we take to continue our investigation?

  Instructions Week 2 Assignnment: Key Hardware  This week’s assignment we are g

 
Instructions
Week 2 Assignnment: Key Hardware 
This week’s assignment we are going to start digging into the specifics of the hardware that makes up both of our water treatment facilities, remember your company is responsible for purification of both drinking water and wastewater. You need to make sure you note key hardware and machines for the actual processes, but you also need to do work on the devices and systems you will need for the control systems for both facilities. The goal of the paper is to develop a rough list of hardware that goes into the water treatment facilities. If you remember your video and documents from last week, things will be much easier in knowing what type of hardware is needed.
Assignment Guidelines
Step 1: Using the documents from last week and Google, you will need to list all the key hardware and machines that make up the water treatment facilities and their ICS/SCADA systems. Below you will find a few sources of information to help you get started. Also, a hint, lots of companies in water treatment have technology pages. Don’t forget to mention what hardware and security you would use to build out the network, you only need to focus on standard networking for this week.
 https://www.samcotech.com/how-much-does-an-industrial-water-treatment-system-cost/
 https://www.samcotech.com/cost-wastewater-treatment-system/
 https://www.process-logic.com/content/images/SCADA.pdf
Step 2: Once you have gathered up all the information you will compile the data into a PowerPoint presentation. Each step of the processes will be a single slide. Each slide will list the hardware needed for that respective step, make sure to include photos and brief descriptions of the hardware explaining their usage and their role in the process. Your final slide should cover the hardware and security you would put into place for the networking.

  Instructions You must use the template I provided for this assignment since it

 
Instructions
You must use the template I provided for this assignment since it will make it a lot easier for you. Failure to do so will result in a return of your paper for you to redo, a reduction in points, or both.
This second assignment also has three parts. 
The first part involves picking something you found interesting from week six, exploring it beyond the readings, and expanding on it in a paper. This section of your paper needs to be at least three pages long and cannot be about something you wrote directly about in a forum.
The second part involves picking one of the critical infrastructures you learned in week four and writing about it using the six guidelines below. You cannot write about the critical infrastructure that you wrote about in the first paper or the forum.
The third part involves picking one of the critical infrastructures you learned in week five and writing about it using the six guidelines below. You cannot write about the critical infrastructure you wrote about in the forum.
It is up to you to decide what will be the most interesting for you! 
You need to use the following outline for each of the two critical infrastructures:
Provide a Hypothetical Threat (cyber, natural disaster, or physical)
Brief background on the Critical Infrastructure as it relates to National Security
Elaborate on the known Risks/Threats/Hazards/Vulnerabilities from the Hypothetical Threat
Explain how damage from the Hypothetical Threat could impact the Dependencies/Interdependencies between critical infrastructure sectors
Existing Resiliency related to the Continuity of Operations
Consider how to Minimize Disruption that improves First Responder Safety. 
Technical Requirements
Write at least seven pages, per the guidance above, and include the title page, an abstract, and a reference page (these last three items are not part of the total page count).
Scholarly and credible references should be used. A good rule of thumb is at least two sources per content page.
Type in Times New Roman, 12 point, and double-spaced.
Students will follow the current APA Style (7th Edition) as the sole citation and reference style used in written work submitted as part of coursework. 
Points will be deducted for the use of Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
All submissions will be graded using the assignment rubric.

  Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.
NASCAR
Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option to investigate, 
 Blockchain for Data Security
In your role as a consultant in your chosen business scenario, create a digital artifact (student choice: video, animation, presentation, storyboard, report, infographic, etc.) that covers:
An executive summary or abstract (integrate business scenario description)
The business and/or societal factors that contributed to the interest in and/or growth of this emerging technology
The tools and techniques used to gauge and evaluate the usefulness and/or efficiency of this emerging technology
3 scholarly references

  Instructions Instructions:  This assignment consists of two questions (below)

 
Instructions
Instructions: 
This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives.  You are to pick ONE and answer it in 6-8 page paper.  Grading will be based on the rubric.  Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc).  YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY. You must also have a strong introduction, thesis statement and conclusion.
Question #1: Select one of the studies presented in weeks 6 or 7 of this class or another case of your choosing with instructor approval. You might have to look ahead. Write an analysis paper providing more details of the attack, to include the following:
a.   Victim, attacker, and probable motivation for the attack.
b.   Nature and sophistication of the attack.
c.   What was the desired outcome of the attack?
d.   How successful was it?
e.   How effective were the attackers in covering their tracks?
f.    How did the victim respond?
OR  
Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:
a.   How future wars will be fought.
b.   How ethical is cyber warfare?
c.   How the United States is preparing defensively to counter cyber-attacks?
d.   What is next?

Your manager at work is extremely impressed with your computer skills since you

Your manager at work is extremely impressed with your computer skills since you took a computer course. The company is installing computers in its production facility, and she has asked you to create a brief PowerPoint presentation that shows tips for working in the new software. Specifically, she wants the layout and topics for the presentation to be organized as shown below.
Slide 1: Include a title slide.
Slide 2: Describe the basics of computer software and what software does.
Slides 3–4: Describe basic functions and techniques that will be used when creating and editing documents in Microsoft Word.
Slides 5–6: Provide what you think are the top tips for creating aesthetically pleasing PowerPoint presentations.
Slide 7: Outline the basics of opening a blank workbook and using Formulas to work with data in Microsoft Excel.
Slide 8: Discuss some basic features of Microsoft Access (e.g., tables, queries, forms) and how employees might utilize this software to track production.
Slide 9: Include a reference slide.

  Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.
NASCAR
Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option  
Picked   Blockchain for Data Security
In your role as a consultant in your chosen business scenario, write an informational email to the project manager that includes:
The benefits that business derive from crowdsourcing
The different types of crowdsourcing
Examples of how crowdsourcing can be used to enhance or promote technology solutions
How bias exists in technology solutions
 
Assessment Requirements/Submission Requirement:
750-word minimum
2 scholarly references