As you can see based on the files I submit and the instructions on the screenshots, I completed the Lab1 (I attached since you will need in to complete lab1 and lab2). I need you to complete both the Lab2 and Lab3 by following the instructions
Category: Graduate
Complete a port scan. Use NMAP for this. Showcase the findings.
Use wireshark and perform a TCPFlood attack. Record your findings.
Use Kali tools to perform a Hping3 attack. Record your findings.
Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.
It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn’t able to get a hold of anyone that could discuss what needed to be done. As we are discussing footprinting and we have colleague, I have a few things that I would like you all to run.
Install whois on Kali. You may have issues if this is not part of the repository list. Use the following commands.
/etc/apt/sources.list
This will let you know your repository listing. Ensure that the repository listing has the following inside.
deb http://http.kali.org/kali kali-rolling main contrib non-free
Run the following commands in terminal.
apt-get update
apt-get upgrade
apt-get dist-upgrade
that should allow you to run the WHOIS installation command.
apt-get install whois
Run queries against domains.
whois caltech.edu
whois -h whois.networksolutions.com caltech.edu
whois -h whois.networksolutions.com *caltech.edu
whois -h whois.networksolutions.com .banjo
Run this against a few different websites. Copy the text from the terminal and store it into a file. Write a one-page summary for how this information could be used to attack a network.
Given the lateness of the hour, I will be giving a full week of extra time on this. Please accept my apologies. I will be working on the next lab to ensure that you guys have it out before it’s due. Thank you for your time and understanding regarding this.
In your own words, define employment-at-will. Why did this doctrine become viewed as harsh, immoral, or unfair, from an employees perspective? Research the Internet and find a legal case that involves a wrongful termination claim. Briefly cite/describe this case, the final ruling, and if you agree with the case outcome. Review the cases posted by your fellow classmates, respond to at least three of your classmates posts, and discuss the outcomes and the applicability of the employment-at-will doctrine.
https://www.bls.gov/opub/mlr/2001/01/art1full.pdf
Minimum 2 paragraphs to 1 full page
The website of The Tennessee Comptrollers Office gives the appearance of transparency. There one can find an invitation to see how the office is fulfilling its mission as well as a plethora of audits on various state organizations.
http://www.comptroller.tn.gov/
Listen to the video of the Tennessee Office of Open Records Counsel Public Hearing in Nashville, TN.
https://www.youtube.com/watch?v=PylAhlelbwI (1:18:35)
Consider the following questions and be prepared to discuss in class:
1.Why is the comptroller of Tennessee holding a meeting?
2.What promises is he making?
3.How are the publics questions addressed?
4.What inferences can you make about the auditing practices in the Tennessee Comptrollers Office?
Thoughts on two of the essays that were published in the review:
Strategic Cyber: Responding to Russian
Online Information Warfare (Page 193)
Borders in Cyberspace: Strategic Information
Conflict since 9/11 (Page 245)
Use the following website to access articles
https://cyberdefensereview.army.mil/Portals/6/CDR-Special%20Edition-2019_r6.pdf
Please provide a post – of at least 350 words – with your commentary on some of the assertions made in the article.
In this problem we will apply discriminant analysis to recognize the digits in the MNIST data set (http://yann.lecun.com/exdb/mnist/). As a bonus problem we will construct “Fisher digits”. We will train our model using the training data sets (“train-images-idx3-ubyte.gz” and “train-labels-idx1-ubyte.gz”) and test the performance using the test data set (“t10k-images-idx3-ubyte.gz” and “t10k-labels-idx1-ubyte.gz”).
1. The images are 28 x 28 pixels in gray-scale. The categories are 0, 1, … 9. We concatenate the image rows into a 28 x 28 vector and treat this as our feature, and assume the feature vectors in each category in the training data “train-images-idx3-ubyte.gz”) have Gaussian distribution. Draw the mean and standard deivation of those features for the 10 categories as 28 x 28 images using the training images (“train-images-idx3-ubyte.gz”). There should be 2 images for each of the 10 digits, one for mean and one for standard deviation. We call those “mean digits” and “standard deviation digits” in CSE455/555.
2. Classify the images in the testing data set (“t10k-images-idx3-ubyte.gz”) using 0-1 loss function and Bayesian decision rule and report the performance. Why it doesn’t perform as good as many other methods on LeCun’s web page? Before coding the discriminant functions, review Section 2.6.
3. [Optional] Construct the “Fisher digits” from the MNIST data set according to Sections 3.8.2 and 3.8.3. This web page on Fisher faces (http://www.scholarpedia.org/article/Fisherfaces) and this web page (https://www.bytefish.de/blog/fisherfaces/) might be helpful. Answer two questions about these sections: (a) Why should the vector w minimizing Eq. (103) satisfy Eq. (104)? (b) Why should the between-class scatter matrix in Eq. (115) is n subscript 1 asterisk times n subscript 2 divided by n times the one in Eq. (102) in two-class case (i.e., c=2)? In addition, convince ourselves that Eq. (125) is the quotient between two “volumes” by referring the Wikipedia page on determinant (https://en.wikipedia.org/wiki/Determinant).
Please submit your code, documentation and solutions electronically through UBLearns. Please typeset your mathematics in LaTeX or Word.
Part 1: Interpreting Correlations
A meta-analysis (Anderson & Bushman, 2001) reported that the average correlation between time spent playing video games (X) and engaging in aggressive behavior (Y) in a set of 21 well-controlled experimental studies was r+ = .19. This correlation was judged to be statistically significant. In your own words, what can you say about the nature of the relationship? Write a one-page response to this question.
Part 2: Correlations
You will use the following resources for this assessment. They are linked in the Resources.
Complete this part of the assessment using the DAA Template.
Read the SPSS Data Analysis Report Guidelines for a more complete understanding of the DAA Template and how to format and organize your assessment.
Refer to IBM SPSS Step-By-Step Instructions: Correlations for additional information on using SPSS for this assessment.
If necessary, review the Copy/Export Output Instructions to refresh your memory on how to perform these tasks. As with your previous two assessments, your submission should be narrative with supporting statistical output (table and graphs) integrated into the narrative in the appropriate place (not all at the end of the document).
You will analyze the following variables in the grades.sav data set:
gender.
gpa.
total.
final.
Step 1: Write Section 1 of the DAA
Provide a context of the grades.sav data set. Include a definition of the specified variables and corresponding scales of measurement. Indicate the type of correlation for each X, Y pair (for example, Pearson’s r, Spearman’s r, point-biserial r, et cetera). Specify the sample size of the data set.
Step 2: Write Section 2 of the DAA
Test the assumptions of correlation for gpa and final. Paste the SPSS histogram output for each variable and discuss your visual interpretations. Paste SPSS descriptives output showing skewness and kurtosis values and interpret them. Paste SPSS scatter plot output with gpa set to the horizontal axis and final set to the vertical axis. Conduct a visual inspection of the scatter plot to analyze other assumptions of correlation. Summarize whether or not the assumptions of correlation are met.
Step 3: Write Section 3 of the DAA
Specify a research question related to gpa and final. Articulate the null hypothesis and alternative hypothesis. Specify your alpha level.
Step 4: Write Section 4 of the DAA
Paste the SPSS output of the intercorrelation matrix for all specified variables.
First, report the lowest magnitude correlation in the intercorrelation matrix, including degrees of freedom, correlation coefficient, p value, and effect size. Interpret the effect size. Specify whether or not to reject the null hypothesis for this correlation.
Second, report the highest magnitude correlation in the intercorrelation matrix, including degrees of freedom, correlation coefficient, p value, and effect size. Interpret the effect size. Specify whether or not to reject the null hypothesis for this correlation.
Third, report the correlation between gpa and final, including degrees of freedom, correlation coefficient, p value, and effect size. Interpret the effect size. Analyze the correlation in terms of the null hypothesis.
Step 5: Write Section 5 of the DAA
Discuss the implications of this correlation as it relates to the research question. Conclude with an analysis of the strengths and limitations of correlational analysis.
Reference
Anderson, C. A., & Bushman, B. J. (2001). Effects of violent video games on aggressive behavior, aggressive cognition, aggressive affect, physiological arousal, and prosocial behavior: A meta-analytic review of the scientific literature. Psychological Science, 12(5), 353359.
write a simple C program. (No headings or screen captures are required.) You will submit a single .c file.
Here are the requirements of the program:
1. Ask the user for their age in years.
2. Ask them for their height in inches.
3. Ask them for their weight.
4. Calculate and show their age in months.
5. Calculate and show them their height in feet (this will be a decimal number).
6. Calculate and show their BMI.
Please see attached document with specifications. Not sure what the effort would be in doing this whole project so any feedback on Design timeline is welcome. Interested in a Book ordering system with multiple Customers and their details would be a starting point for discussion. Some fields would be :
Customer Name
Customer Phone Number
Customer Email address
Transaction history
Number of Books purchased, what they were.
Orders Paid for and shipped
Customers Wish List
Has Customer Made any complaints or returned items- details of.
Any feedback would be welcome. I’m not sure re cost, apologies if you feel its too low. I am flexible re price. thx