When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what ip address.

Instructions
If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.
The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.
Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.
On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?
Your report should be about a page in length and address the following:
Choose and restate one of the problems identified as you understand it and explain why it is a problem.
Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
Describe how the tool can be used to solve similar problems in the future.
Provide a detailed overview of the tool’s functionality and options.
Include a screenshot of your selected tool from the appropriate uCertify lab.

Explain what the stored procedure would do.

Scenario
You have been asked to design a database system for ConsultMatch, a company that wants to match consultants and clients via an online service.
They have an existing list of 1500 consultants who have signed up so far. For each consultant, they need to display their name, degrees/education, experience, expertise, rate, and previous clients.
Potential clients look for a consultant at ConsultMatch by browsing a free list of consultants or using the ConsultMatch search engine. Once they have found the person who meets their needs, they can sign in to provide an overview of their project via the website.
The potential client needs to provide information about the project: customer name, address, project description, tasks for consultant, preferred starting time, and a sample of the materials if available.
ConsultMatch provides an opportunity for consultants to agree or disagree with a project after reading the description. They can also request more information from the potential client.
Tasks
Design a database for this project.
Show the ER diagram for your database. There should be at least 4 entities with their relations. Clearly describe the symbols you use for your ER diagram (entities, attributes, relationships, cardinalities, etc) – 50 points
Show the corresponding Relational Model with PK, and FK constraints. Show the required vs optional attributes along with data types for each attribute. – 30 points
Show examples of Insert, Update, and Delete statements (DML). – 30 points
Describe at least one stored procedure for this project. Explain why using a stored procedure would be a good idea. Explain what the stored procedure would do. – 50 points
As a software designer, you already know that ConsultMatch will want to do data mining later on. What type of data would you recommend that ConsultMatch tracks and stores in a database? And why? – 40 points

The paper should address why the overall information security planning objective is important and outline methodologies in which an information systems infrastructure can be appropriately secured while ensuring confidentiality, integrity, and availability of the infrastructure.

The paper should address why the overall Information Security Planning objective
is important and outline methodologies in which an information systems infrastructure can be
appropriately secured while ensuring confidentiality, integrity, and availability of the
infrastructure.

Briefly describe the content areas covered by each of them.

Exercise 1:
(a) How many policy documents does the ISO 27000 standard provide? Briefly describe the content areas covered by each of them.
(b) Compare the ISO 27000 series of documents with the NIST documents discussed in Chapter 8. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST program compared to the ISO standard.
Exercise 2: What is SANS SCORE and why is it useful? Review the security policy documents provided by SANS SCORE and discuss contents of the relevant documents available under each of the following categories: (a) Server Security (b) Application Security (c) Network Security (d) Incident Handling.
Exercise 3: What is the fundamental difference between a security management model and a security architecture model? Explain with an illustrative example.
Exercise 4:
(a) What are the key principles on which access control is founded?
(b) What two access control methods that use a state machine model to enforce security? Compare and contrast the two methods by explaining their similarities and differences.
Exercise 5: What is separation of duties? Discuss the various ways through which this method can be used to improve an organization’s InfoSec practices.

For this assignment, you are asked to complete the hudson fisher associates (hfa) bring your own device (byod) registration form (attatched below) to ensure your device meets the organization’s minimum information technology (it) baseline specifications and security requirements.

For this assignment, you are asked to complete the Hudson Fisher Associates (HFA) Bring Your Own Device (BYOD) Registration Form (Attatched below) to ensure your device meets the organization’s minimum information technology (IT) baseline specifications and security requirements. The first part of the assignment requires you to access and document your machine’s specifications.
In the second part, you will provide explanatory details on the specifications.
By documenting your specifications and explaining your results in an effective narrative format, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill. Include a screenshot showing key system information.