Discipline: Computer Science

Computer Science 5-2 Lab: Intrusion Detection Using Snort: Network Security Fundamentals AssignmentComputer Science 5-2 Lab: Intrusion Detection Using Snort: Network Security Fundamentals Assignment

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Setting Up The Sniffer – Step 27 – Wireshark Showing TCPDump Capture Detecting Unwanted Incoming Attacks – Step 14 – Output from Alert.IDS Detecting Unwanted Outgoing Traffic – Step 32 – Wireshark TCP Stream of Traffic Between Victim and […]

Computer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals AssignmentComputer Science 4-3 Lab: Securing the pfSense Firewall: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Testing The Firewall From The External Network – Step 6 – Output from Zenmap Closing Unnecessary Ports On The Pfsense Firewall – Step 6 – Challenge #3 Complete Closing Unnecessary Ports On The Pfsense Firewall – Step 8 – Challenge […]

Computer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals AssignmentComputer Science 4-2 Lab: Configuring a Linux-Based Firewall to Allow Ingoing and Outgoing Traffic: Information Security Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: Configuring and Testing the Linux-Based Firewall – Step 22 – Checking Outbound FTP Configuring and Testing the Linux-Based Firewall – Step 33 – Display of Current Rules Configuring and Testing the Linux-Based Firewall – Step 34 – Results of NMAP […]

Computer Science 4-4 Draft of Training Manual Section Two: Firewall Configuration AssignmentComputer Science 4-4 Draft of Training Manual Section Two: Firewall Configuration Assignment

Firewall Configuration Overview You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place. Prompt Now it is […]

Computer Science 4-2 Final Project: Milestone Two: Security Policies Development AssignmentComputer Science 4-2 Final Project: Milestone Two: Security Policies Development Assignment

In Module Four, you will submit 10 security policies as part of the planned solution to mitigate the 10 security gaps identified in the Case Document. There should be one policy per security gap identified in the Case Document. Consider policies that address topics such as remote access, encryption and hashing (to control data flow), […]

Computer Science 3-3 Lab: Configuring a Windows Firewall to Allow Incoming Traffic: Network Fundamentals AssignmentComputer Science 3-3 Lab: Configuring a Windows Firewall to Allow Incoming Traffic: Network Fundamentals Assignment

  Log in to InfoSec to complete the labs below and take screenshots at the steps below: Configuring and Testing the Windows-Based Firewall – Step 21 – NMAP Output Showing the 3 Open Services Configuring and Testing the Windows-Based Firewall – Step 35 Wireshark TCP Stream of HTTP Session Using Internal Services from An External […]

Computer Science 3-2 Lab: Network Security – Firewalls: Network Fundamentals AssignmentComputer Science 3-2 Lab: Network Security – Firewalls: Network Fundamentals Assignment

Log in to InfoSec to complete the labs below and take screenshots at the steps below: View Windows Firewall Features – Step 8 – Challenge 2 Complete View Windows Firewall Features – Step 10 – Challenge 3 Complete Configure An Exception In Windows Firewall – Step 21 – Challenge 4 Complete View And Configure Windows […]

Is building an AI system to predict long-term unemployment “risky” from an ethical perspective?Is building an AI system to predict long-term unemployment “risky” from an ethical perspective?

What can go wrong with using algorithms to predict long-term unemployment? How could it be used for social bad? How realistic is the chance of that happening? Remember this tool from Case StUDY 1 was built for the Portuguese government. The case study data uses personal information such as geographic location/address, physical and/or mental disabilities, […]

The use of generative AI tools like ChatGPT in academic settings is a form of cheatingThe use of generative AI tools like ChatGPT in academic settings is a form of cheating

dont use chatGPT dont go above 600 words provide a plagirism and AI check please write based on the rubric i have provided and make sure that it is all checked out at submission please upload another file with the sections that correspond to each section of the rubric highligted in different colours. instructions are […]

draw use case diagrams and activity diagrams for the Professional and Scientific Staff Management (PSSM)draw use case diagrams and activity diagrams for the Professional and Scientific Staff Management (PSSM)

For this assignment, you are required to draw use case diagrams and activity diagrams for the Professional and Scientific Staff Management (PSSM) case you were provided. Please make sure you provide thoughtful and professional diagrams. Additionally, provide use case descriptions for each identified use case. Also, please note the following specific guidelines: Upload your submission as a single Word file. I […]