Categories
Cyber Security

Write a post of at least 100 words summarizing the key areas of the script, and how it can be used to provide configuration or automation in a particular environment.

1. Scenario: You have been tasked with creating two PowerShell scripts. The first PowerShell script should save system documentation information to a file, whereas the second PowerShell script should locate large files on the filesystem and list them in descending order. Search the Internet for two different PowerShell scripts that provide this functionality and modify them if necessary to suit your needs. Test each script on your system to ensure that it works as expected.
Read the scenario.
Obtain (and optionally modify) the PowerShell scripts described in the scenario.
2. Consider what you’ve learned by sharing your opinions and insights with your peers.
Windows PowerShell is the most versatile way to configure Windows Server 2019 hosts, small footprint hosts, virtual machines and containers. Consequently, there are many different personal and professional blogs, as well as many different online forums that offer PowerShell tips and example scripts that you can use.
Using a search engine, such as Google, locate a PowerShell blog or forum that you find easy to navigate.
Next, search for a post that provides a sample PowerShell script that can be used configure or automate a task on Windows Server 2019.
Write a post of at least 100 words summarizing the key areas of the script, and how it can be used to provide configuration or automation in a particular environment.
Use complete sentences and check your grammar and spelling.
Finally, ensure that you attach the PowerShell script to the post.

Categories
Cyber Security

Research automated software tools with manual review processes and clearly define the two methods.

Document requirements:
– Word Format Only
– Add references (APA Style) from IEEE or Elsevier publishing websites, just the last 5 years publications
– Add a Table of content
– Add a Table of Figures
– Add Add list of abbreviations
– Avoid Plagiarism
– spell-check
– grammar-check
– Be sure to write the document in a research-oriented way (Technical Writing) by using the APA format template
Critical Thinking Requirement:
About the cost of software flaws and a variety of code analysis tools.
Research automated software tools with manual review processes and clearly define the two methods.
Research automated software tools with manual review processes and identify the pros and cons of each method to draw a distinction between the two methods.What criteria did you use to draw the distinction between the two methods?
What Can Be Tested?
Detail the two main Static Testing Techniques and the four different types of reviews included in static testing.
How would you validate the output results for the two methods?
The report should be 5 pages, not including the title and reference pages

Categories
Cyber Security

Describe an exception handler that you would use in this program to address that feature.

Refer to the Interactive Assignment content for help with this assignment’s topics.
In this unit you’ve been learning about exception handlers, which allow programs to “try” an algorithm and “catch” a potential fault. They can prevent the program from crashing and take other actions, such as logging the event, notifying tech support, and presenting the user with a message that explains what happened. Many built-in exception handlers are present in Java, such as one that can catch errors in mathematical calculations. Having handlers look for specific kinds of crashes allows for differences in handling, such as a more specific message to the user than if the program detected only a “general” crash.
Read this list of 12 commonly used exception handlers in Java.
For this discussion, consider an application that is used by a local pizza restaurant. The app is intended to include the following features for their customers:
Place an order online
Save, edit, and reorder favorites
Factor local sales tax into the calculation at checkout
Add a tip
Create an account, storing personal info including address and credit card details
Select pick up or delivery
Select a pick up or delivery time
View restaurant address and operating times
Fill out a contact form to inquire about franchising opportunities
Join the company’s rewards program
Based on your knowledge, experience and ideas, select one of the features listed above and describe an exception handler that you would use in this program to address that feature. Explain why this handler would be appropriate, how it would guard against a crash, what it would tell the user (the error message), and what other actions the program might take when your exception handler is engaged.

Categories
Cyber Security

Explain the nature of the cyberattack that occurred.

Cyberattacks are far more common than many realize. Select a national or international organization that has suffered from a cyberattack. Then, address the following requirements:
Provide information about your organization (e.g., mission, vision, values, purpose, and industry).
Explain the nature of the cyberattack that occurred. Provide specific details about what happened and the impact of the cyberattack.
Do you believe the company did a good job addressing the cyberattack:Before it happened?
When the attack occurred?
After the attack?
What might the company do to prevent future cyberattacks?
Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.