Discussion Seven – Social Networking Social networking Web sites create onlin

 
Discussion Seven – Social Networking
Social networking Web sites create online communities of Internet users that eliminate barriers created by time, distance, and cultural differences. These sites allow people to interact with others online by sharing opinions, insights, information, interests, and experiences.  Members may use the site to interact with friends, family members, and colleagues they already know, but that they may also wish to develop new personal and professional relationships on the sites.
Social network advertising uses social networks to inform, promote, and communicate the benefits of products and services, and there are several advertising strategies.  Banner ads on social networks can either be displayed to each visitor to the Web site or by using the information in user profiles, directed toward those members who would likely find the product most appealing.  People frequently make decisions based on input from their close group of friends and advertising and use an individual’s network of friends.  Company owned social networking web sites allow users to talk about new products, services, or improvements they would like to see and the company can implement customer-submitted ideas. Viral marketing is where users pass along a marketing message to others, creating the potential for exponential growth.
Many companies are using social media to advertise, collect information, or gather background on individuals. Do you think this is ethical?
Resources
please read this and the attach document
https://www.nea.org/nea-today/all-news-articles/social-medias-impact-students-mental-health-comes-focushttps://www.
mayoclinic.org/healthy-lifestyle/tween-and-teen-health/in-depth/teens-and-social-media-use/art-20474437

  Digital Intellectual Property The Internet is an ideal communication mechanis

 
Digital Intellectual Property
The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power. Intellectual property is a work of the mind, such as art, books, formulas, inventions, and processes that are distinct and created by a single person or group.  Copyright law protects authored works such as art, books, film, and music. Patent law protects inventions, and trade secret law helps safeguard information that is mission critical in an organization
Discuss how freedom of expression and intellectual property rights might ethically conflict. In your reply, consider how your own freedom of expression might affect your privacy or personal intellectual property. Please provide examples when possible.
Read these resources
https://en.wikibooks.org/wiki/Information_Technology_and_Ethics

Contingency planning is an important part of the cybersecurity process. It is n

Contingency planning is an important part of the cybersecurity process. It is necessary to have a plan for mitigating and recovering from damage.
In your journal, you will reflect on cryptography and contingency planning. Specifically, you will discuss cryptography, keys, algorithms, business continuity, and disaster recovery.
Your journal entry should be three or more sentences per prompt and address the following questions:
What cryptographic applications are used in information system security?
What is business continuity management?
What is a disaster recovery plan (DRP)?
What role do backups play in disaster recovery?

   Exp19_Word_Intro_Cap_Thinking Project Description: As a class assignment, yo

  
Exp19_Word_Intro_Cap_Thinking
Project Description:
As a class assignment, you are working with a research report related to decision making. You are finalizing the first draft and will submit it for your instructor’s approval. In so doing, you edit and format text, include a table of contents and a cover page, design a table, and include citations and a Works Cited page.
Steps to Perform:
   
Step
Instructions
Points    Possible
 
1
Start   Word. Download and open the file named   Exp19_Word_Intro_Cap_Thinking.docx. Grader has automatically added your   last name to the beginning of the filename.
0
 
2
By displaying nonprinting characters, you see such   indicators as page and section breaks, which are helpful when managing   document flow.
 
  Display nonprinting characters. Note that the document includes a blank first   page. Change the document theme to Retrospect and select Colors of Blue Warm.   Select all text in the document and change the font to Times New Roman. Click   the View tab and display the ruler.
4
 
3
Some   phrases, such as full names of people or publications, display more   attractively if they are not divided between lines, as is the case with the   name of the publication referenced in this paper. By including a Nonbreaking   Space, you ensure that the publication name will not be divided between   lines.
 
  Remove the word why from the second   sentence in the first body paragraph on page 2. Remove the space following   the word Cognitive in the last   sentence of the first body paragraph on page 2 and insert a Nonbreaking Space   symbol between Cognitive and Creativity.
5
 
4
Insert check mark bullets on the three single-line   paragraphs in the first body paragraph, beginning with the irrationality of humans and ending with the nature of well-being. Reduce the indent to position bullets at   the left margin and ensure that each bulleted text begins with a capital   letter. Change the left and right margins to 1”.
6
 
5
In   Outline view, you can collapse headings to any level of detail and then   manage sections, perhaps dragging to rearrange them as you do in this step.
 
  Change to Outline View. Change the Show Level setting to Level 2. Drag Stages of Prospect Theory directly   below the heading Prospect Theory   so that it becomes the first sublevel in the Prospect Theory section. Close Outline View. Bold the bulleted   items on page 2.
5
 
6
Select all text in the document and adjust   paragraph spacing before and after to 0 pt. Double-space the document. Add a   first line indent of 0.5″ to the first body paragraph on page 2   (beginning with The study of behavioral   economics). Center the title and subtitle (Cognitive Creativity and An   Analysis). Change the line spacing of the first line, Cognitive Creativity, to 1.0.
5
 
7
Text   that is formatted in a particular style adheres to the design requirements of   the style. To quickly change all text based on a particular style, or to   ensure that text that is typed in that style is formatted appropriately, you   can modify a style. By default, style settings are applied to the open   document only.
 
  Modify document properties to include Parker Adams as the author, removing any   existing author. Modify Heading 1 style to include a font of Times New Roman,   14 pt., Black, Text 1. Modify Heading 2 style to include a font of Times New   Roman, Black, Text 1. Changes in style should apply to the current document   only.
6
 
8
Tabbed text can, in some cases, be formatted and   worked with more easily if it is identified as a table. In this case,   arranging the tabbed text as a table enables you to apply a preset style and   to include an appropriate formula in a future step.
 
  Select the lines of tabbed text near the top of page 3 (beginning with System 1 and ending with 0.39) and convert the selection to a   table, accepting all default settings. Insert a row above the first row of   the new table, merge all cells, and type Systems of Decision Making. (Do not type the period.)   Center text in the first row.
7
 
9
Insert   a row below the first row. Split the cells in the row, adjusting the number   of columns shown in the dialog box to 4 and ensuring that Merge cells before split is selected.   Select the table and choose Distribute Columns on the Table Tools Layout tab   to align all columns.
3
 
10
Type the following text in row 2:
System   Theory Characterized by Percentage Employed Probability Factor
2
 
11
Insert   a row at the end of the table and merge the first three cells on the new row.   Type Average   Probability in   the merged cell on the last row and center the text. In the last cell on the   last row, enter a formula to average the numbers in the column above. You do   not need to select a Number format.
6
 
12
Apply a table style of List Table 3 – Accent 1 (row   3, column 2 under List Tables). Deselect First Column in the Table Style   Options group to remove bold formatting from the first column. Bold text on   the second row. Select the table and change all font to 10 pt. size. Center   all text in rows 2, 3, and 4. Center the numeric value in the last cell on   the last row.
5
 
13
Add a   caption below the table with the text, Table 1: Decision-Making Strategies. (Do not type the period and be   sure to include a hyphen between Decision   and Making.) Change the   probability factor for System 1 (in row 3) to 0.62. Update the field in the last cell on the last row   to reflect the change in probability.
5
 
14
Select rows 2, 3, and 4, click the Table Tools   Design tab and choose a Pen Color of Black, Text 1. Ensure that the line   style is a single line and the line weight is ½ pt. Apply the border   selection to All Borders.
2
 
15
A   footnote provides space for additional clarity or exposition on a statement   included in the document. Use a footnote if you want to provide additional   detail, but do not want to clutter the document text with that information.
 
  Click after the period that ends the last sentence in the first body   paragraph under System Biases   (ending in economical solutions to   problems). Insert a footnote with the text, For more information on theory-induced   blindness, visit http://cognitivecreativity.com/theory. (Include the period and be sure   to include a hyphen between theory and   induced.) Right-click the footnote   and modify the style to include Times New Roman 12 pt. font.
5
 
16
Shade the first two lines on page 2, Cognitive Creativity and An Analysis in Blue, Accent 2, Lighter   60% (row 3, column 6). Add a ½ pt. Box border, selecting color of Black, Text   1. Insert a DRAFT 1 watermark, colored Red (second column in Standard   Colors).
5
 
17
Click   before the Cognitive Creativity heading   at the top of page 2 (in the shaded area) and insert a page break. Click   before the new page break indicator on the newly inserted page 2 and insert a   table of contents, selecting Automatic Table 1.
 
  Mac users, select the Classic table of contents style.
5
 
18
Because you plan to format the first page   independently of the remaining pages, you insert a continuous section break   before the first page is inserted. Breaking a document into sections enables   you to format each section independently.
 
  Click before the table of contents title and insert a continuous section   break. Click before the page break indicator on the first page and insert   text from the file Cover.docx. Use   settings in the Page Setup dialog box to center the cover page vertically.   Ensure that the settings apply to the current section only.
3.5
 
19
Click   before the fourth blank paragraph below the words An Analysis on the Cover page. Insert Question_Mark.png. Change the picture height to 1.5” and choose   Top and Bottom text wrapping. Apply an artistic effect of Paint Strokes to   the picture (row 2, column 2).
5.5
 
20
Cover pages typically do not include such items as   watermarks, headers, or footers. You ensure that the cover page in this   document is clear of such items.
 
  Add a right-aligned header. Type Parker Adams and include a space following the name. Insert a   page number in the current position, selecting the Plain Number option if   available. Ensure that the header does not show on the first page. The   watermark may be automatically removed from the first page as well. Click   before Submitted by Parker Adams at   the end of the document. Insert a right tab at 5.5”. Press TAB to align the   text at the right tab stop.
4
 
21
Change   the writing style to MLA. Click before the period ending the first sentence   in the paragraph under the Decision   Systems heading on page 3 (ending in   and decisions are made). Insert a citation, using the existing source of Daniel Conner. Edit the citation to   show page 157 and to suppress Author, Year, and Title).
1.5
 
22
Click before the period ending the first sentence   under the System Biases heading   (ending in theory-induced bias).   Insert a citation to a new source as follows, making sure to include a hyphen   between Decision and Making in the Title:
 
  Type: Article in a   Periodical
  Author:   Leo James
  Title: Decision-Making   Strategies
  Periodical Title: Journal of Behavioral Economics
  Year: 2020
  Month: April
  Day: 21
  Pages: 45-52
2
 
23
Insert   a page break at the end of the document. Insert a bibliography, selecting   Insert Bibliography so that a title is not included. Mac users, delete the   title after inserting the bibliography. Click before the first source shown   and press ENTER. Click before the new blank paragraph and include a centered   line with the words Works Cited. (Do not include the period.) Select all text on   the Works Cited page and change the font to Times New Roman 12 pt. Change the   line spacing of the two bibliography sources to Double. Remove any Before or   After paragraph spacing from all text on the Works Cited page.
3
 
24
Select the heading, Decision Systems, on page 3. Insert a comment reading This is often   referred to as Decision Support Strategies. (Include the period.) Check spelling and   grammar, making corrections as necessary. The word spills is correctly used so you should ignore the error. Ignore   any clarity and conciseness concerns.
4.5
 
25
Save   and close Exp19_Word_Intro_Cap_Thinking.docx. Exit Word. Submit the file as   directed.
0
  
Total   Points
100

Different types of adversaries pose different types of threats depending on the

Different types of adversaries pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, organized crime might target a financial institution for financial gain, while a hacktivist might target organizations with differing ideologies.
For your initial post, identify a cybersecurity incident that happened within the last two years. Briefly summarize the incident. Ensure your summary identifies the threat actors involved, at least one characteristic of the threat actor (capability, intent, target), and hypothesize why the threat actor chose to attack.
Note: Try not to post the same example as your peers.
In responding to your peers, identify potential mitigation tactics (other than those identified in the article) for the threat actors they have identified.
RESPONSE ONE
A significant cybersecurity incident from the past two years was the Log4Shell vulnerability exploitation discovered in December 2021. This vulnerability, affecting the popular open-source logging library Apache Log4j, allowed attackers to remotely execute arbitrary code on vulnerable systems, leading to widespread concern across industries. The flaw (CVE-2021-44228) impacted many companies and organizations worldwide, as Log4j is widely used in enterprise software applications and cloud services.
Summary:
Threat actors, including nation-state hackers and cybercriminals, quickly exploited the Log4Shell vulnerability to gain unauthorized access to systems, launch ransomware attacks, steal sensitive data, and deploy malware. Given the widespread use of Log4j, the vulnerability was labeled one of the most severe in recent years, leading to millions of systems being at risk.
Threat Actor:
Nation-state actors and cybercriminals
Capability: Highly skilled in identifying and exploiting zero-day vulnerabilities for espionage, data theft, or deploying ransomware.
Intent: Nation-state actors exploited the vulnerability to conduct espionage, while cybercriminals sought to deploy ransomware and steal data for financial gain.
Target: A wide range of industries, including cloud providers, enterprise applications, and government systems.
The widespread nature of the vulnerability made it an attractive target for both nation-state actors and cybercriminals. Nation-state actors likely saw it as an opportunity to access critical infrastructure and sensitive data in government and corporate networks. Cybercriminals, on the other hand, likely viewed it as a chance to profit from exploiting companies with valuable data or critical services that might pay ransom to regain control of their systems. The scale and ubiquity of the vulnerability across various sectors made it an ideal target for a diverse range of attackers.
RESPONSE TWO
In May 2021, the Colonial Pipeline, which supplies nearly half of the fuel for the East Coast of the United States, was targeted by a ransomware attack. The threat actors behind this incident were a cybercriminal group known as Darkside, believed to be based in Eastern Europe. This group operates with a high level of capability, using sophisticated ransomware to encrypt the pipeline’s data, rendering it inaccessible until a ransom was paid.
One key characteristic of Darkside is their intent, which is financially motivated. They specifically target large organizations that can afford to pay substantial ransoms, often demanding millions of dollars to decrypt the affected data. In this case, they demanded a ransom of $4.4 million, which was paid by Colonial Pipeline shortly after the attack to regain control of their systems and resume fuel distribution.
Darkside likely chose to attack Colonial Pipeline due to the critical nature of its operations. By targeting a key piece of infrastructure, they knew they could cause significant disruption, increasing the pressure on the company to pay the ransom quickly. The attack not only led to fuel shortages and panic buying across several states but also highlighted the vulnerability of essential services to cyber threats. The choice of target reflects Darkside’s strategy to maximize financial gain by attacking entities where the impact of disruption would be severe.

  IT544-1: Determine vulnerabilities in both systems and application software c

 
IT544-1: Determine vulnerabilities in both systems and application software configurations.
Unit 3 Assignment:
Purpose
You are in the role of a cybersecurity manager and are a new hire for a medium-sized global organization (500 people) that manufactures components for autonomous automobile vendors. The organization also has one government contract. You have received the go ahead from upper management to kick off a data security project. The goal of the project is to understand where all the critical and confidential data and data systems are located, describe the types of possible threats targeting the critical and confidential data, determine why the threats exist, and determine why the enterprise systems may be vulnerable to cyberattack and where vulnerabilities may lie.
You are going to write a paper describing the overarching goal of the project that includes at least three examples so that the project manager can get a clear understanding of the goals.
Assignment Scenario:
By conducting research, select three types of enterprise systems, including at least one that operates in the cloud. All systems store some confidential data in their data store.
System 1: Stores confidential information in a relational database system like Microsoft SQL Server or Oracle DBMS that resides on premise.
System 2: Stores confidential information in the cloud using a NoSQL (Not Only SQL) database technology like Mondo DB or Apache Cassandra.
System 3: Stores big data in a big data database (like AWS Dynamo DB or Azure Cosmos DB), hybrid on premise/cloud and overseas.
All systems are accessible using a browser, and each enterprise system has a mobile application that can be used to access data from the enterprise system.
Assignment Instructions:
Create a header for each system. Under the header for each system:
Describe vulnerabilities and threats that specifically target confidentiality on the data-driven system and its associated infrastructure. While some threats might apply to all of the systems, describe one threat that is more likely for each scenario and consider the different security issues for each type of database (e.g., a NoSQL database distributes data across many servers). Consider and discuss at least one of the following for each system:

Built-in Protection
Authorization and Authentication
Encryption
SQL Injection 

Determine why the threats you describe exist, and determine at least two data/database vulnerabilities in each of the systems.
Determine one known malicious software that could confiscate confidential information from the database system and scenario
Assignment Requirements:
3–4 pages of content (exclusive of title page, etc.), double-spaced in 12pt Times New Roman font, using correct APA formatting and including a title page, table of contents, abstract, and reference page(s).
At least 3 credible sources
No spelling error
No grammar error
No APA errors.
For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.

  Project 1—UNIX shell This project consists of designing a C program to serve

 
Project 1—UNIX shell
This project consists of designing a C program to serve as a shell interface that accepts user commands and then executes each command in a separate process. Your implementation will support input and output redirection, as well as pipes as a form of IPC between a pair of commands. Completing this project will involve using the UNIX fork(), exec(), wait(), dup2(), and pipe() system calls and can be completed on any Linux, UNIX, or macOS system.
I. Overview
A shell interface gives the user a prompt, after which the next command is entered. The example below illustrates the prompt osh> and the user’s next command: cat prog.c. (This command displays the file prog.c on the terminal using the UNIX cat command.)
osh>cat prog.c
One technique for implementing a shell interface is to have the parent process first read what the user enters on the command line (in this case, cat prog.c) and then create a separate child process that performs the command. Unless otherwise specified, the parent process waits for the child to exit before continuing. This is similar in functionality to the new process creation illustrated in Figure 3.3.3. However, UNIX shells typically also allow the child process to run in the background, or concurrently. To accomplish this, we add an ampersand (&) at the end of the command. Thus, if we rewrite the above command as
osh>cat prog.c &
the parent and child processes will run concurrently.
The separate child process is created using the fork() system call, and the user’s command is executed using one of the system calls in the exec() family (as described in Section Process creation).
A C program that provides the general operations of a command-line shell is supplied in the figure below. The main() function presents the prompt osh-> and outlines the steps to be taken after input from the user has been read. The main() function continually loops as long as should_run equals 1; when the user enters exit at the prompt, your program will set should_run to 0 and terminate.
#include
#include
#define MAX_LINE 80  /* The maximum length command */
int main(void)
{
char *args[MAX_LINE/2 + 1]; /* command line arguments */
int should_run = 1; /* flag to determine when to exit program */
while (should_run) {
printf(“osh>”);
fflush(stdout);
/**
* After reading user input, the steps are:
* (1) fork a child process using fork()
* (2) the child process will invoke execvp()
* (3) parent will invoke wait() unless command included &
*/
}
return 0;
}
This project is organized into several parts:
Creating the child process and executing the command in the child
Providing a history feature
Adding support of input and output redirection
Allowing the parent and child processes to communicate via a pipe
II. Executing command in a child process
The first task is to modify the main() function in the figure above so that a child process is forked and executes the command specified by the user. This will require parsing what the user has entered into separate tokens and storing the tokens in an array of character strings (args in the figure above). For example, if the user enters the command ps -ael at the osh> prompt, the values stored in the args array are:
args[0] = “ps”
args[1] = “-ael”
args[2] = NULL
This args array will be passed to the execvp() function, which has the following prototype:
execvp(char *command, char *params[])
Here, command represents the command to be performed and params stores the parameters to this command. For this project, the execvp() function should be invoked as execvp(args[0], args). Be sure to check whether the user included & to determine whether or not the parent process is to wait for the child to exit.
III. Creating a history feature
The next task is to modify the shell interface program so that it provides a history feature to allow a user to execute the most recent command by entering !!. For example, if a user enters the command ls −l, she can then execute that command again by entering !! at the prompt. Any command executed in this fashion should be echoed on the user’s screen, and the command should also be placed in the history buffer as the next command.
Your program should also manage basic error handling. If there is no recent command in the history, entering !! should result in a message “No commands in history.”
IV. Redirecting input and output
Your shell should then be modified to support the ‘>’ and ‘<' redirection operators, where '>‘ redirects the output of a command to a file and ‘<' redirects the input to a command from a file. For example, if a user enters osh>ls > out.txt
the output from the ls command will be redirected to the file out.txt. Similarly, input can be redirected as well. For example, if the user enters
osh>sort < in.txt the file in.txt will serve as input to the sort command. Managing the redirection of both input and output will involve using the dup2() function, which duplicates an existing file descriptor to another file descriptor. For example, if fd is a file descriptor to the file out.txt, the call dup2(fd, STDOUT_FILENO); duplicates fd to standard output (the terminal). This means that any writes to standard output will in fact be sent to the out.txt file. You can assume that commands will contain either one input or one output redirection and will not contain both. In other words, you do not have to be concerned with command sequences such as sort < in.txt > out.txt.
V. Communication via a pipe
The final modification to your shell is to allow the output of one command to serve as input to another using a pipe. For example, the following command sequence
osh>ls -l | less
has the output of the command ls −l serve as the input to the less command. Both the ls and less commands will run as separate processes and will communicate using the UNIX pipe() function described in Section Pipes. Perhaps the easiest way to create these separate processes is to have the parent process create the child process (which will execute ls −l). This child will also create another child process (which will execute less) and will establish a pipe between itself and the child process it creates. Implementing pipe functionality will also require using the dup2() function as described in the previous section. Finally, although several commands can be chained together using multiple pipes, you can assume that commands will contain only one pipe character and will not be combined with any redirection operators.

A new medium-sized health care facility just opened and you are hired as the CI

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
User authentication and credentials with third-party applications
3 common security risks with ratings: low, medium or high
Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.
Your paper should meet the following requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.