Secure Web Systems

Answer the following questions :-

 

1. Compare and evaluate black box and white box testing.

2. What is the rationale for carrying out a W-APT?

3. Explain briefly what types of vulnerabilities may be present in a web application due to insufficient input validation.

4. With relevance to web-application vulnerabilities, what are race conditions and how can they be exploited?

5. Give an example of web application logic vulnerability.

1. Compare and evaluate black box and white box testing.

Security testing and examination techniques can be divided into two broad techniques depending on the amount of knowledge of the implementation details of the system being tested that are available to the testers

2. What is the rationale for carrying out a W-APT?

A penetration test is undertaken on a computer system that is to be deployed in a hostile environment, in particular any internet facing site, before it is deployed. The purpose of the test is to provide a level of practical assurance that any malicious user will not be able to penetrate the system.

3. Explain briefly what types of vulnerabilities may be present in a web application due to insufficient input validation.

Since the internet “environment” is so diverse and contains so many forms of programmatic content, input validation and sanity checking is the key to Web applications security.

4. With relevance to web-application vulnerabilities, what are race conditions and how can they be exploited?

Vulnerability scanners check only for the possible existence of vulnerability but the attack phase of a penetration test exploits the vulnerability to confirm its existence. One of the vulnerabilities exploited by penetration testing is race conditions.

5. Give an example of web application logic vulnerability

Cross-site scripting or XSS is an example of Web application logic vulnerability. XSS is the most prevalent and pernicious web application security issue.

For a complete essay, order with us now!

Secure Web Systems

  1. 1.    Describe the functional differences between firewalls, IDS and IPS software.
  2.  what ways does snort resemble wireshark? Go on to explain how they differ.
  3. 3.     Which is better – NIDS or HIDS? Justify your answer.
  4. 4.     List and explain the main features of a proxy server.
  5. 5.     What is a reverse proxy server?

 

Describe the functional differences between firewalls, IDS and IPS software.

                     A firewall is software which protects networked machines from malicious intrusion that could breach the confidentiality or data corruption. The program runs on a secure host computer and performs the basic function of inspecting packets to check if they match the criteria required to pass through to the protected network.

What ways does snort resemble wireshark? Go on to explain how they differ.

Wireshark is an open source network protocol analyzer applicable in both Unix and Windows. It allows a user to look at data from a live network or from a capture file on disk right into the level of the packet detail. Wireshark boasts a rich display filter language and the ability to view the reconstructed stream of a TCP session.

Which is better – NIDS or HIDS? Justify your answer.

Both Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are tools used in security management for computers systems or networks. Basically in HIDS approach, anti-threat software is installed in every computer in the network that contains two-way access to volatile environment such as the Web. In NIDS, these anti-threat applications are installed only at strategic points such as servers that interface the unsafe environment and the network entity that is being protected.

List and explain the main features of a proxy server.

Caching: This happens when a user requests for a file. The proxy first browses its cache and forwards it if present; otherwise it forwards the request to the web server.

Connection sharing: Proxies facilitate users to share the internet connection by configuring them to access the web through it instead of providing a direct link to each user.

Filtering: Since the proxy servers handle all the users requests, it can therefore be used to restrict certain URLs.

Security: The proxy server assists in security by hiding the IP address of the users.

Scanning traffic: Sometimes proxies integrate with open source anti-virus software to scan the network traffic for viruses and worms.

Bandwidth Control: The proxies use delay pools to control bandwidth by allocating specific bandwidth to internet traffic. This helps prioritise traffic thus reducing the network overload.

What is a reverse proxy server?

A reverse proxy server is a server similar to a normal proxy server but it is located at the edge of the fire wall. This reverse proxy has its own external IP address on the external NIC and usually links it to one of the internal IP addresses. Reverse proxy’s main aim is to shield the public users ….

for a complete essay, order with us now!

New York Construction Project

New York Construction Project

Develop an essay that would consist of the following:

1.)Indicate and describe a major construction project that is on-going, or that was completed recently.

2.)Provide a brief description of the scope of the project, as well as the construction cost.

3.)Provide an introduction to the project, including the objectives (goals), management system used, controlling and monitoring techniques.

4.)What are the lessons learned?

5.)Do you think there could be better ways to handle the project and to make it more cost efficient?

 

For a complete paper, order with us now!

Policy and Planning of the Crminal Justice System; chapter analysis

Chapter 5

1 Define and describe the following terms:

(a)   Action planning

This is a blueprint that methodically specifies the sequence of tasks that need to be completed in order to successfully launch or implement the program or policy. It involves specifying, in clear and concise detail, the steps required to implement the program or policy design.

(b)   Resource plan

A resource plan is a comprehensive statement of the specific fiscal, material, and social resources required to implement an intervention. This plan enumerates all the specific costs associated with each program or policy component, including staff salaries, benefits and training; physical space etc.

2. Describe the purposes (goals) of a resource plan.

A resource plan attempts to achieve the following goals:

–          To match resources to objectives: in other words, one must carefully ensure that all the resources necessary to achieve the objectives of the program or policy are in place.

–          To identify the availability of current resources and resources still needed to implement the program or policy design.

–          To control expenditures over a specified period of time, usually by specifying how much money is to be spent over specific periods of time, such as each quarter

To provides data for monitoring fiscal aspects of the program or policy and providing feedback to funding sources and other stakeholders……

for the complete chapter analysis, order with us now!

Essay; the Meth epidemic

What do you think of the Meth Epidemic Documentary?  The meth epidemic documentary touches on two of the most important solutions to the meth problem or crisis and explains why neither has fully worked nor being tried.

What is one meth related issue that you learnt from watching from watching the film? By watching the film one learns that investigations and statistics have come to a conclusion that meth has led to quite a huge number of foster children, a rise in crime especially property crimes which has led to a lot of mayhem.

What did you think of the Government/drug company connection to the current epidemic? Both The government and the drug companies have in a way aggravated the current meth situation since with the drug companies opposing, the government was unable to set new controls to regulate the retail sale of cold medicine and key meth’s ingredients.

 

 

Reference:

Carl, B. (Producer), & Mitch, W. (Director). (14th February 2006). The Meth Epidemic [Motion picture]. U.S.A: Oregon Public Broadcasting.

For the essay, order with us now!!

Nestle; case study

Guidelines for a Case Analysis

STEP 1: Select a specific company or product that interests you

STEP 2: Introduce mission statements of the company/product:  What is the business?  Who is the customer?  What does the customer value?  What is the value proposition of the company?

STEP 3: Analyze international business environments of the company (SWOT)  What are strengths and weaknesses of the company (Internal resources) for going global?  What are opportunities and threats facing the company (external environment) for going global?

STEP 4: Describe strategic management factors (management problems/challenges) facing the company in the pathway of going international.

STEP 5: Discuss competitive advantages of the company in the pathway of going international.

STEP 6: Discuss the role of going global to resolve a problem of the company

STEP 7: Proofread the manuscript and make appropriate reference (APA style) IMPORTANT NOTE: Analyze and synthesize information from various materials, including newspapers, websites, company annual reports, and other presentation materials.

 

Nestlé is the de facto leader in the world’s Nutrition, Health and Wellness sector. Nestlé’s mission is to provide consumers with the best tasting, most nutritious choices in a wide range of food and beverage categories and eating occasions, from morning to evening. The Multi-national was founded in 1866 by Henri Nestlé in Vevey, Switzerland, where their headquarters are located.

Nestlé’s Corporate Business Principles are the basis of the company’s culture, which has developed over the span of 140 years since Henri Nestlé first developed his successful Minfant cereal “Farine Lactée”. The management has built the business on the fundamental principle that to have long-term success for their shareholders, they not only have to comply with all applicable legal requirements and ensure that their activities are sustainable, but also they have to create significant value for society.  They call this Creating Shared Value. At Nestle leadership is not just about size; it is also about behaviour. Trust, too, is about behaviour; and they recognise that trust is earned only over a long period of time by consistently delivering on their promises. These objectives and behaviours are encapsulated in the simple phrase, “Good Food, Good Life”, a phrase that sums up our corporate ambition.

Nestlé’s portfolio covers almost every food and beverage category; they offer tastier and healthier products enjoyed at every eating occasion more so in times of special nutritional need. Nestle employs around 280 000 people and has factories or operations in almost every country …..

For the complete essay. order with us now!!

 

 

 

Mobile Phone Data: The Next Generation of Technology

 

a) Research and select a current trend in the area of telecommunications. Then, prepare a 10-15 page paper in Microsoft Word in APA format. At a minimum include the following:

i. Detailed description of the area researched

ii. Technology involved in the area

iii. Future trends in the area

iv. Example companies involved in the area

v. Regulatory issues surrounding the area

vi. Global implications for the area

 

Background Information

Ever since the inception of the telephone by Alexander Graham Bell in the late nineteenth century, there has been a remarkable increase in the number of telephone subscribers. This has led to new developments in the telephone industry, particularly in the cellular sector. As the number of subscribers increases, so does their expectation of good Quality of Service. One of the essential functions for wireless communication systems is multiple access for a large number of users to share a resource.

There are three main multiple access techniques namely Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA). FDMA divides a frequency band into many frequency channels after which it assigns each user his own channel (Korowajczuk, 2004).

It is an almost obsolete technology however, since it was used mainly for analog technology. TDMA was introduced with the onset of digital technology. It divides the frequency band into time slots. Once a user exhausts his allocated time slot, the communication channel is ‘yanked’ from him and given to the next user (Vijay, 1999). This process goes on unstill the first user is connected again and the cycle continues. In CDMA, unlike the previous two, all users use the band at the same time. This achieved by assigning a specific code, called a pseudo-random code, to each communication channel. Thus, only users using the same channel can communicate to each other, without much interference from other users using the same band (Korowajczuk, 2004)…..

for the complete essay, order with us now!

Summaries Chapter 2 Marketing

Summaries Chapter 2 Marketing

The objective of the weekly summaries is for you to take the reading. In the weekly summaries I expect that you will undertake substantial additional reading in addition to the material presented in class. I expect the weekly summary to contain at least 20 quality references. It will comprise two parts: 1. A general overview of the topic discussed. 2. Specific answers to the discussion question: Chapter 2 Marketing – A, C, D I will provied you with the book chapter also you will find referene page in the end you can use it. In regards to the chapter summary

 

Introduction:

Marketing can be said to be the process that is responsible for identifying, anticipating and satisfying the requirements of consumer profitably. Thus it’s the  process of analyzing, planning, implementing, coordinating, pricing, promotion and distribution of products, services and ideas designed to create and maintain beneficial exchange with target markets for the purpose of achieving organizational objectives. (Moutinho, 2000, p. 121)

The international hotel industry:

The hotel industry is said to be   a service industry, as the society has changed both globally and locally most people who have shown to have dispensable income, free time and urge to explore new product inventions have proved to have more awareness and desire for service-oriented products such as the hotels. For example china, due to china’s huge population and the opening of the country’s border to international travel, very important and significant impact will be seen in the hotel industry word wide. Thus understanding is being needed for the products that are being marketed, along with his change.

The P’s of marketing:

Organizations have to decide on a combination of tools that meet their objective and in which they can use against the competitor. Since early 1960’s most organizations have been using the four tools of marketing mainly Price, Product, Promotion and Place. …..

For the complete essay, order with us  now!

Law; Winston Graham Vs Alan Daly

Winston Graham Vs Alan Daly

Introduction:

In the case of Winston Graham who is a partner in a large firm of Antique dealers, and Alan Daly who is the proprietor of Daly car sales ltd a commercial vehicle dealer who specializes in vans and light trucks, Antique dealers buy and sell large pieces of valuable furniture and they need a minimum of three vans to cope with regular deliveries and purchase of furniture in the course of their business. Unfortunately one of the firm’s vans was written off in an accident and thus Winston was asked to find an urgent replacement immediately. On visiting Daly car sales ltd Winston spoke to the proprietor and outlined his requirements for an urgent replacement of a van which led them to engage in a contract of sale of goods.

Contract:

A contract is a legally enforceable agreement between two or more parties with mutual obligations. The remedy at law for breach of contract is “damages” or monetary compensation. In equity, the remedy can be specific performance of the contract or an injunction. Both remedies award the damaged party the “benefit of the bargain” or expectation damages, which are greater than mere reliance damages, as in promissory estoppel.

International Marketing

“Although domestic and international markets differ in nature and character, generic marketing principles are equally applicable in both contexts.” To what extent do you agree with this statement? Justify the position you take.

 

Introduction

There is a growing trend of global standardization as more companies endeavor to upgrade to world standards for increased efficiency and productivity. In order to achieve this global competitiveness, managers are strategically consolidating their markets through alliances, mergers or acquisitions to achieve the necessary edge essential for global operations.

The absolute knowledge and understanding of the international marketing environment in which these companies operate is of utmost importance. This is so because the international market is characterized by geographical outstrips and operating complexities emanating from disparate markets rigged with risk and uncertainty. Therefore marketing managers around the world are recognizing the pressing need to equip their companies or organizations with the necessary strategies, skills and aptitudes to compete efficaciously in international markets.

The combination of all these elements has led to companies developing a marketing orientation that moves outside the traditional domestic realm into the wide international standards. Marketing managers therefore have to possess the required skills needed to analyze, plan and implement marketing strategies in more than one country. This is necessary since international markets generally differ from domestic markets in the complexities posed by the nationality of markets involved, reduced mobility of production factors, customer heterogeneity across markets, fluctuation of business ethics and political orientation, variance in business regulations and commercial policies and differences in currencies used among others.

 

International Marketing research carries the role of explaining and predicting the unique intricacies involved in shifting business from a domestic operation to international context and the establishment of a framework that systematically addresses the key differences. The intuition that marketing principles are similar in some regards yet varied in others is not a novel proposition. However, an approach that seeks to bring out the similarities and differences in order to outline an empirical basis for international cross-national comparabilities is a noble contribution in terms of international marketing research which invaluable for decision making as a firm moves into international operations.

 

International Marketing

At its most basic level, international marketing entails a company diversifying and making more marketing mix decisions in a different region or country. Otherwise, it entails the company laying down manufacturing facilities across national boundaries and establishing marketing strategies globally…..

For the complete essay, order with us now!