05 September, 2019

Big Data and its Business Impacts


Research paper basics:
      8 pages inlength
      APAformatted
      Minimum six (6) sources – at least two (2)from peer reviewedjournals
      Include an abstract, introduction, andconclusion
      Use an Compelling Chart, Table, or Map to Illustrate Something in the Paper
      Intext citations

Don’t forget the headings.


Functions of DNS and DHCP in Windows(R) Server 2012

Description
write a 1- to 2-page (400 words)`24678 technical document on the installation and configuration of DNS and DHCP in Windows®Server 2012 for Wadley, Inc. This will become part of the final install, configuration, and support plan for Wadley.

Include the following:

How to install DNS and configure it, including the DNS tree
Explain ongoing monitoring and management of server installation
Recommendations for utilizing Hyper-V®
Format according to APA guidelines.

Security & Safety in IFF – Assessment Task 2

Scenario for questions 1 - 10
Your company provides freight forwarding services along with operating a freight storage warehouse in Sydney.
You have been asked by your manager to review the Transport Security Plan (TSP) for your company.
Question 1
Briefly describe the purpose of a TSP.
Question 2
What are 2 INTERNAL (within your company) resources that you can use to do the TSP assessment?
Question 3
What are 2 EXTERNAL (outside of your company) resources that you can use to do the TSP assessment?
Question 4
Provide a link or contact information for your responses to question #3.
Question 5
How often and why should the TSP be reviewed?
Question 6
Who is accountable for ensuring the TSP is reviewed and contains the correct information to resolve a safety or security situation?
Question
7 What is your recommendation on how to train the employees in your company on the content of the TSP?
Question 8
What is a key performance indicator (KPI) that you can use to determine the effectiveness of the SAFETY section of your TSP?
Question 9
What is a key performance indicator (KPI) that you can use to determine the effectiveness of the SECURITY section of your TSP?
Question 10
You have a security concern about the upcoming storage of several high value containers in your warehouse for the next 2 days. You do not have time or the budget to purchase and install new security equipment. Your warehouse does have basic security measures installed such as internal and external lighting, door locks and video cameras. Given the budget and timing constraints, outline at least 3 security measures that can you implement to reduce risk of theft or damage to these high valued containers?
Question 11
A. What current Australian legislation applies to:
I. ASIC (Aviation Security Identification Card)
II. MSIC (Maritime Security Identification Card)
B. Who are the issuing bodies for?
I. ASIC Identification Card
II. MSIC Identification card

UNIFIED COMMUNICATIONS AT BOEING


Discussion Points
1. Some virtual teams at Boeing have discussions focused on military aircraft. Do some Internet research on UC security mechanisms and identify and briefly describe several that Boeing should have in place to ensure the privacy and integrity of such discussions.

2. To what extent do the UC benefits experienced by Boeing mirror those of other firms that have deployed UC capabilities over converged IP networks?

3. To date, Boeing has not implemented the full range of capabilities available through UC systems. If you were the CIO at Boeing, what additional UC capabilities would you implement? What benefits would you expect Boeing to derive from deploying these capabilities?

Sources
[MICR10] Microsoft Case Studies. “Boeing Expects to Lower Costs and Improve Productivity with Messaging Solution.” March 16, 2010. Retrieved online at: http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid =4000006703.
[MICR11] Microsoft Case Studies. “Boeing Promotes Knowledge Sharing for Global Workforce with Communications Solution.” April 29, 2011. Retrieved online at: http://www.microsoft.com/casestudies/Microsoft-Lync-Server2010/Boeing/Boeing-Promotes-Knowledge-Sharing-for-Global-Workforcewith-Communications-Solution/4000009654.
[REED08] Reed, B. “AT&T snags big Boeing voice/data contract.” NetworkWorld. August 12, 2008. Retrieved online at: http://www.networkworld.com/news/2008/081208-boeing-att-contract.html

30 June, 2019








Project
Name
Course Title
Course Code
Submission Date












One
The article is direct to the point regarding the issue of communication when it comes to incident response team. The task involves trying to solve a problem after a breach into the network as occurred. The team should be able to understand each other as it has been specified by the writer. The writer perfectly addresses the future of computers and goes to the depth of even giving an example of a movie which tries to give a picture of how the future will look like. The future of technology with perfect utilization of huge data available will bring different advantages to us.
Two
According to the writer computer forensic keeps on changing and growing every single day. It is a fact which I as an individual agree with. The computer forensic field keeps growing every single day and as a result an individual needs to keep on researching and reading new materials. The writer also highlights the issue of certificate and experience which is required to work in the computer forensic field. The aspect of block chain technology used by cryptocurrencies such as Bitcoin is a mirror of how our future will look like. The technology gives additional security to the system which makes it impossible to get into the system.
Three
According to the writer the incident response team should be equipped with necessary personal knowledge to handle the challenge which is brought around with the task. They should posses’ personal technical skills to handle different types of breaches into the network. They should also be able to communicate perfectly. This will enable the team members to reduce the risk of the hack by mitigating the issue quick.  The writer also highlights the impact which computer forensic has brought to the world. The application of the computer forensic to the general technology world also is a part which is critical in ensuring security.
Four
The writer highlights the key logger type of attacks which keeps tracks of all keyboard strokes and sends it to the attacker. They exist in both software and hardware types, the one which is the most dangerous is the software type. This is because it is very hard to detect making unless an antivirus scan Is conducted. The hardware can be detected physically and hence it can be removed. Black box testing is conducted without prior information about the network and it is conducted by hackers while white box testing is conducted by security officers with an aim of testing the network. Port scanning can be stopped using different security installations has put across by the writer.  Port scanning can be divestating to a network when done to get
Five
Antivirus and anti-malwares are the first line of defense but they don’t detect every threat towards a computers system as implied by the writer. Some threats are physical and are to be detected through a physical security sweep which is tasked to look for the threats and delete them. These kind of physical threats exist as mostly key loggers which track all the key strokes made on a computer system. Black box testing popular among hackers is done without knowing the logic behind how the system operates the attacker has no knowledge about how the network work which makes it a black box testing. A white box testing the attacker knows how the system works and tries to test if they can withstand a real attack from hackers. Port scan is stopped by installing a good security system such as intrusion prevention system, intrusion detection system and a good firewall.
Six


05 April, 2019

INSY 3400 (Programming Assignment 1)

INSY 3400
Programming Assignment 1

It is not always practical to compute the steady state or absorbing probabilities analytically for
complex systems. In this assignment, you will use the programming language of your choosing
to compute the specified probabilities. It is recommended that you use python, but if you have
not yet taken INSY 3010 you may prefer to use matlab or another language that you have used
before.
Consider the skittle and m&m problem from the homework (and exam), that is restated below.
Three mini bags of skittles and three mini bags of M&Ms are distributed in two candy
bowls (one red, one brown) in such a way that each bowl contains three bags of candy. At
each step we draw one candy bag from each dish and exchange them. Let Xn be the
number of bags of skittles in the red candy bowl at time n.
The recommended steps to solve for the steady state probabilities empirically are listed below.
• Create a list of lists for the one-step transition probability matrix P using the appropriate
values. Keep in mind that this is a problem you have already worked, so you may refer
back to your homework to obtain P.
• Generate a random starting state, s, from {0,1,2,3} and record it in the list of states visited
• Create list, referred to as lim below, populated with 0s, to store the number of times each
state has been visited.
• Execute a transition 10,000 times:
o Generate a random uniform number between 0 and 1.
o Depending on what the current state is, determine what the next state will be by
using the conditional pmf for the given state.
 Remember that you can convert the conditional pmf to a cdf, and then find
the bracket containing the generated random number
 For the row of the transition matrix that corresponds to the current state,
add the transition probabilities one by one from left to right until the sum
exceeds the value of the random number. The first time when that happens
determines the next state.
o Add 1 to the entry in lim corresponding to the selected state.
• Divide each entry in lim by the total number of transitions executed to obtain the
estimated steady state probabilities.
Submission Instructions
Upload a code file with all of your code and a pdf with your submission report.
For your code file:
• Put your name in the comments at the top of the file
• Include your empirically determined steady state probabilities in the comments at the top
of the file
• Your code must be commented
• If you are using python, submit a single py file
• If you are not using python, submit all of the files needed to execute your experiment.
For the report:
• The header should include your name (as it appears on canvas) and the name of the
assignment.
• Write a one paragraph introduction that outlines the problem, objective, and states which
programming language you are choosing to use. If you are not using python, include
brief instructions for how to use your submitted files to re-create your results.
• Write a one paragraph analysis of the results. Clearly state what your randomly selected
initial state is, and what computed steady-state values are. Discuss any similarities and/or
differences to the steady state values you have computed by hand in previous
assignments.

21 September, 2018

Project Brief


The University of Sydney has made several significant changes to its infrastructure over the past few years (new buildings, new services, etc.). The intention has been to provide better infrastructure, services and facilities that suit the needs of staff and students while respecting the interests of the local community. The university wants to know how these improvements have changed how staff and students use and move around the university campus. You have been tasked with analysing the change (from 2016 to 2018) in staff, student and visitor movements, investigating other potential improvements and making recommendations to the university for what it should do next.
Since this is a large task, you have been asked to focus on one of the following issues:
• Transport
• Safety and security
• Marketing opportunities
• Retail and food
• Recreation and leisure facilities
• Study facilities
Since the university recognises the importance of geography, you have been provided with a number of spatial datasets to use for your analysis. The datasets have been collected by a number of organisations using a variety of different methods. For this reason, the datasets may contain errors or contradict each other. The same applies to the same type of data collected over several years. The following datasets have been provided:
a) Copies of the wifi access logs for 24 hours in 2016 and for another 24 hours in 2018. These show every time a person connects a device to the university’s wifi network. This includes laptops, smartphones, tablets, raspberry pi and any other device which has a wifi radio. For privacy reasons the data has been anonymised by changing the user ids but it can be assumed that all data (from the same year) with the same user id is collected from the same person.
b) Pedestrian traffic counts
c) Vehicle traffic counts
d) Locations of university buildings
e) Locations of university amenities
f) Opal data for all modes around The University of Sydney (2016 and 2018)
You may also use any other data you have available to you including the data provided to you and any data you find on the internet. You must include a section in your report listing the sources of data.

This problem involves several tasks. Note, there is no ‘right’ or ‘wrong’ answer here, and it is likely you will come up with different solutions to other students. Your performance will be judged based on your correct choice and application of GIS techniques, the logic of your solution and ultimately the extent to which you can make a persuasive argument for your recommendations.
Task 1: Assessment of current situation (2018)
➢ Using appropriate GIS procedures identify the movement patterns (where they go, how many buildings each person goes to, etc.), and how this varies by time of day.
➢ Create one map using R – it is up to you what you show on this map.
➢ Conduct any other analysis necessary to understand the current situation for your specific focus (i.e. retail and food, study facilities, etc.)
Task 2: Assessment of change in movements (relative to 2016)
➢ Take the analysis conducted in task 1 and analyse the change from 2016
➢ Identify the major differences between 2016 and 2018
➢ Determine how the changes in the university differ from changes in the area around the university
Task 3: Final Recommendations
➢ Based on Tasks 1 and 2, identify one option for further improvements to the university’s facilities or services.
➢ Analyse the impact of your proposed improvement using the data provided
➢ Based on your analysis of your identified option and tasks 1 and 2, provide some final recommendations to the university. Your recommendations must be based on the results of your analysis.

Your report must be a maximum of six pages including (one) title page containing a title, course code, date and student number; up to five pages including any maps, tables, references or appendices. If you can cover everything you need to in fewer pages you may do so – the page limit is a maximum, not a target.
It must contain at least the following but how you organise the report is up to you:
• The results of tasks 1, 2 and 3
• One map created using R
• At least two other maps that can be done in R, ArcGIS or QGIS. You may include additional maps if you wish.
• A section listing all the datasets you used and, if they were not provided to you as part of data, where you got them from. In the same section you should also explain any assumptions you have made about the data. A bulleted list is sufficient for this section.