You are tasked with developing a relational database model for a Fleet Management System. Refer to your reading assignment for a sample relational database model. The purpose of this system is to produce an asset listing of all trucks in the company’s fleet including information on the truck, acquisition cost and depreciation. In addition, the system must provide a history of operational costs and maintenance costs categorized by the type of cost, e.g. gas, oil, and types of repairs. The deliverable for this assignment must include: A list of the tables in this model for use in the Fleet Management System. Each table must contain the top three attributes. A list of application areas such as Purchasing and Accounts Payable which will be the source of the transactions necessary to update the Fleet Management System. A system diagram of the Fleet Management System including databases and source data applications. Brief narratives explaining your rationale behind the list of attributes and the contents of the system diagram, and list of source applications. Your paper should be a minimum of 2 pages in length, not including title and reference pages, and must fully address the assignment requirements. It should conform to CSU Global Writing Center (Links to an external site.) . Include at least two credible references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.
In Chapter 2 of Law, Policy & Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, Eduardo Gelbstein discusses the resulting economic costs consequential to information security incidents. Review this recent report issued by Symantec, Symantec_ISTR_24_2019_en.pdf . Preview the document, not for the techniques or security suggested, but for the definitions used. Select some key definitions presented in this report to run a search on one of the various cyber definitions glossaries identified in this article, https://cybersecurityventures.com/cybersecurity-glossary/ (Links to an external site.) . Discuss how the terms you selected comport with the Symantec definitions in their report. Are there differences, and if so, how do those differences impact the results presented in this report? Overall, how does the global lack of harmonious definitions relating to cybersecurity affects the reporting, consequences, impact, and potential costs associated with the cyber risks described in the Symantec 2019 Report?
1. How do businesses benefit by having ubiquitous access to TCP/IP network standards and its accompanying protocols, especially the higher level protocols that provide access to Internet applications, and the World Wide Web? 2. One in five Americans are smartphone-only users of the Internet (see http://www.pewinternet.org/fact-sheet/internet-broadband/). – What are the implications of this finding for business access to customers – Why do you think this is? – Is this percentage likely to get larger or smaller, in future? Why? 3. In the majority of developing countries, people access the Internet on feature phones (not even smartphones) – See https://qz.com/india/945127/internet-use-in-india-proves-desktops-are-only-for-westerners/, https://asia.nikkei.com/Economy/India-s-mobile-internet-boom-goes-supersonic2 – The same can be argued for many areas of underprivileged America. – What are the implications for business here? – What are the implications fo other areas of human services, not necessarily for-profit, such as healthcare outreach, poverty-relief, or ecological land management? 82
Part 1: Check computer addresses and start up Wireshark Capture Determine the Physical MAC address and the IP address for the Ethernet interface of the computer you are using. Start up Wireshark, click CaptureàInterfaces and click the Capture button corresponding to your active Ethernet interface. Wireshark will begin running in Capture Mode and will open up a Wireshark Capture window showing you how many packets have been captured in real time. Part 2: Download Web Page With Wireshark still running in Capture Mode, start up your favorite browser (Internet Explorer, Mozilla, Firefox or whatever). Enter an URL for any website (E.g.: use following address) http://facweb.cs.depaul.edu/cwhite A web page should appear in your browser. Close your browser window. Go back to the Wireshark Capture window and click the Stop button to stop the packet capture. Part 3: Verify that the Web Page Download has Been Captured Back in the Wireshark window, you should now see lots of packets in the top summary pane. You can filter out all packets except HTTP packets by typing the word http into the Filter box (click ViewàFilter Toolbar if you dont see a Filter box at the top). This will make things much easier to read. You should see a packet containing something like GET /facweb.cs.depaul.edu/cwhite sent by your PC to request the web page download. If the next packet listed (containing the reply from the web server to your PC) contains HTTP/1.1 200 OK and the next 3 are Continuation packets, then you have successfully captured the packets containing the lab html web page. Skip the following step. On the other hand, if the reply from the web server contains HTTP/1.1 304 Not Modified, then this means Wireshark did not capture the packets from the web site because the web page was already stored (cached) in your browser. In this case you must clear your browser cache and then go back and re-do the capture as follows: First, you must clear the web cache in your browser. For Internet Explorer, click Tools à Internet Options, then, under the General tab, click the Delete Files button within the Temporary Internet Files box area. For Firefox, click Tools à Options, then Privacy, Cache and click Clear. For other browsers, youre on your own. Now in your Wireshark window, again select CaptureàInterfaces and click the Capture button corresponding to the Ethernet interface. When prompted whether to save the previous capture, click Continue without saving. Go back to Part 2, step 1 above to download the web page again while Wireshark is capturing packets.
1) The OPM incident has been linked to various elements, including Chinese hacking groups, the Chinese government, and many others. So, let us assume that there has been a certain amount of success in tracking down the actual hackers who committed the crime. You now get to investigate the various law, organizations, treaties, etc. that are going to be available to prosecute the hackers. Finally, can we make use of the technology of browser fingerprinting and other tools to identify the computers that may have been used for the attack? I want you to run a brief set of fingerprinting tests on your own computer and paste your results at the end of the assignment.
CLA 2 Comprehensive Learning Assessment 2 CLO 3, CLO 6, CLO 7 In your role as Director of Operations, you have collaborated with department heads to create a cross-functional and collaborative organization, good work. Thus far, Management Information Systems (MIS) has been supporting the organizations activities, and assisted in organizational management. Now it is time for you to continue with the next phases of the organizations strategic management plan. In your meeting with the board of directors, you must present on many aspects of the organization, including technology. Specifically, the board needs to understand how your current and future technology implementations will facilitate the decision-making process. Please present a detailed analysis of the following topics in the context of decision-making and strategic planning: Data Mining in the context of predictive analytics & Big Data, as a competitive strategy CRM as a source of sustaining competitive advantage Hardware & Software in terms of disaster recovery & business process continuity (BPC) Enterprise Resource Planning (ERP) in terms of sustaining a cross-functional organization Telecommunications in terms of using networks & social media to compete on the global stage Systems implemented to mitigate the effects of risk on information security and the ethical use of information Summary of how to integrate all of these systems Your detailed analysis should be presented using these bullet-points as subject headings in your paper.