Log in to InfoSec to complete the labs below and take screenshots at the steps

 
Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Setting Up The Sniffer – Step 27 – Wireshark Showing TCPDump Capture
Detecting Unwanted Incoming Attacks – Step 14 – Output from Alert.IDS
Detecting Unwanted Outgoing Traffic – Step 32 – Wireshark TCP Stream of Traffic Between Victim and Target
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

  Incident response is an important component in a security awareness program. W

 
Incident response is an important component in a security awareness program. While not all incidents can be prevented, incident response capabilities can promptly detect and reduce the losses resulting from security attacks.
In September 2014, Home Depot stated that over 56 million credit cards had been compromised in a five-month cyber-attack on their payment systems. This attack simply highlighted the vulnerability of the U.S. retail store’s payment systems. Research the Home Depot incident and reflect on the basic elements of an incident response plan and the attack vectors.
In your initial post, answer the following questions:
Was the Home Depot incident handled correctly? Incorrectly?
Could more have been done? If so, what?

All Country Insurance wants to upgrade its network protection based on a string

All Country Insurance wants to upgrade its network protection based on a string of recent breaches. The chief information officer (CIO) boasts that his business network has never had security issues and already has a properly configured firewall. All Country has a number of field service representatives selling various insurance policies that require different levels of network access. The ability to meet the requests for information and control network access of information has become difficult. For your main post, develop a resolution summary describing how you can provide access to the network based on user credentials, maintain control over access points, and detect access attempts by unauthorized users. Your main post needs to address network access, tracking, and alerts that relate to the concerns of this situation.
 

7 Submission You need to submit a detailed lab report, with screenshots, to desc

7 Submission
You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply attaching code without any explanation will not receive credits.
Acknowledgment
I would like to thank CSender (GitHub ID), Eric Dong, and Chao Gong, for their suggestions on improving the SYN flooding attack task in this lab.

In this lab, you will calculate and assign CIDR designated subnets, to include b

In this lab, you will calculate and assign CIDR designated subnets, to include broadcast addresses and appropriate numbers of addressable hosts, given allocated IPv4 address space. Download the attached instructions for this exercise. When you have completed the lab, click on the assignment link to submit your finished work.

 Provide a 750 word (or 2.5 pages double spaced) minimum reflection. • Use of pr

 Provide a 750 word (or 2.5 pages double spaced) minimum reflection.
• Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Must have all required APA components: cover sheet, references as needed, and others.
• Share a personal connection that identifies specific knowledge and theories from this course.
• Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
• You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

 Identify a personal project of your choosing. This could be a family vacation,

 Identify a personal project of your choosing. This could be a family vacation, plans to clean or organize a part of your living space, etc.
For the discussion, you will use the tools provided in Chapter 4 of your textbook to provide a brief summary of your project that includes the scope of the project and at least three goals or objectives of the project.

Circuit City was an American consumer electronics company founded by Samuel Wurt

Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By the 1990s, Circuit City became the second-largest consumer electronics store in the  United States with annual sales of $12 billion. On March 8, 2009, Circuit City shut down all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City’s CEO  announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused e-commerce site” and a new business strategy for its retail stores12.
In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company.
The following information should be covered in the research paper. 
´1. History of Circuit City
´2. What were the issues and challenges that caused the collapse of Circuit City in 2009?
´3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?
´4. Discuss the major competitors in global e-commerce.
´5. How would IT deliver value to the business?
´6. Proposed the IT infrastructure required to support global e-commerce
´7. Proposed the IT budget for the e-commerce initiative
´8. Discuss the IT-based risks associated with global e-commerce
´9. Discuss how IT can leverage innovative technologies such as social media, big data, and business intelligence to provide value to the business
´10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.
Instructions: The paper must be 10 pages. There must be at least 5 APA formatted references (and APA in-text citations) to support the thoughts in the post as needed.  Use only the previous 3 years’ scholarly articles.