I just need 1 word document with the questions from each lab answered after each step. Only 2-3 sentences each when needed. Thank you.
Category: Cyber security
-
Styling a Wanted Poster: Using HTML and CSS to Create a Dynamic Webpage Making the Image Responsive and Styling the Footer
Introduction
So far, we have been focused on HTML — using the markup to create the structure of webpages. For this assessment, you will be provided with some raw HTML, an image and a little CSS, and will need to complete the styling to develop a page that looks like a wanted poster.
Objectives
To test comprehension of HTML tables and associated features.
At the end of the skills check, your page will look similar to:
Instructions
To get started
In your local GitHub repository, create a new sub-directory (folder) named wanted-poster. Next, download the wanted-poster.zip Download wanted-poster.zipsupport files. The compressed file contains:
an HTML file
a folder with a style sheet
a folder with images
a folder with typeface files
Extract the compressed files to your wanted-poster sub-directory in your local GitHub repository; then, open the HTML file in your web browser. Notice that the page displays without the style information being applied – there’s no reference for it in the code!
Open the wanted-poster index.html file in Visual Studio Code (or your preferred text editor) and carefully examine the existing code. Make note of the comments provided.
Lastly, edit the code so
your name is given as the author
the web browser knows what external file to reference for style information
From this point forward, you will complete the remaining work in the .css document; and, as long as the appropriate code is used, the page will display as intended.
Add selectors
In Brackets (or your preferred text editor), open the style.css file from the wanted-poster sub-directory’s css folder.
Examine the existing code carefully; then, test your site in a web browser to make sure the existing CSS is being applied to the HTML. While the CSS is incomplete, you should now see some style on the page.
Using the comments in the .css document as a guide, add the style selectorsyou will need to complete the code and include the curly brackets that will contain the declarations.
Hint: For this assessment, you will be using HTML element names as the style selectors.
To get a better idea of what your CSS will look like at this point, the example below shows some of the code without declarations.
Add declarations
Once the CSS selectors are in place, add the appropriate declarations (CSS properties and values) to complete the style rules.
headings
Heading levels 1 through 4 should have the same text shadow, foreground color, font family, margin and text alignment, and use uppercase letters. Additionally:
the level 2 headings should have a font size of 48px and letter spacing of 4px – both expressed in rem units – and a normal font weight.
the level 3 headings should have a font size of 32px – expressed in remunits – and a normal font weight.
the level 4 heading should have a font size of 24px, letter spacing of 4pxand bottom padding of 18px – all expressed in rem units – and a normalfont weight.
The level 5 heading should be styled with:
a font size of 16px, top margin of 4px, padding (top, bottom, left, and right) of 8px – all expressed in rem units.
a background color of #333 and foreground color of #FFF.
a normal font weight, and a text alignment that matches the other headings.
If you decide that you would like to use a different foreground color for the headings, you are more than welcome to change it; just make sure that it is suitable for display on the Web and easy to read.
section & paragraph
The sections should be styled with a top margin of 8px, expressed in remunits, while the paragraphs should have:
a top and bottom margin of 16px, expressed in rem units, and a left and right margin set to auto.
padding top and bottom of 0 and padding left and right of 16px, expressed in rem units.
a width of 90% and left-aligned text.
figure, image, & footer
The figure must be styled with a bottom margin of 32px, expressed in remunits. Additionally:
give the figcaption a top padding of 8px, expressed in rem units, and text that is right aligned.
We also want to make the image somewhat responsive to the size of the browser window, and prevent it from exceeding its actual pixel size. In this case, give the image:
a width of 100%.
a top and bottom margin of 0, and a left and right margin set to auto.
a maximum width of 800px, expressed in rem units.
For the footer, apply a padding (top, bottom, left, and right) of 16px, expressed in rem units, and give it a top border with:
a width of 32px, expressed in rem units
a solid style and a color of #333.
One more thing
The two symbols in the level 4 heading don’t quite display with enough space next to the text. To adjust it, use a child selector to create a new style rule that targets the span element within the heading.
Style the symbols with:
a top and bottom padding of 0
a left and right padding of 8px, expressed in rem units.
Post to the discussion
Are you stuck? Is it 1:00 a.m. and you’ve been staring at your code for hours trying to figure out why your page won’t display correctly? Don’t panic; there is help!
Post your questions to the Skills Check 5 Discussion forum for assistance. Code samples and/or screen shots are optional; but, could be useful. The forum is a great resource for assistance on the coursework; your peers often have the same questions and/or may be able to provide helpful insight.
How to Submit
Complete all steps below to successfully submit your work for review.
Publish your page
In GitHub Desktop:
commit all local changes to the master
push all local commits to GitHub
Once you have pushed your commits, you will need to allow a little bit of time for the remote server to refresh before your changes are live on the Web.
Submit to Canvas
To submit your URL in Canvas:
Click Submit Assignment at the top.
Using only lowercase letters:
Add your URL in the provided text box, following the format https://durhamj.github.io/
make sure to replace my username with yours
Click Submit Assignment
Backup your file in Canvas:
Click Submission Details at the top-right of the assignment window in Canvas.
Attach both the index.html and style.css files to the Comments.
Under Add a Comment, click Attach File
Click Choose File and select the file you want to attach.
Click Save to finish.
Reminder
The content for this course is presented in an online, module format. Students should:
review and complete items sequentially
access course material through the Home link in the course menu
follow all instructions, including submission and formatting requirements
contact the instructor via CWU Outlook email with any questions or concerns
Note: Re-submissions, late submissions, and make-up work are only considered in extreme circumstances.
Rubric
Skills Check 5 Rubric
Skills Check 5 Rubric
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeApplication of CSS Code
The submission successfully demonstrates the comprehension and application of basic CSS theory, syntax, and mechanics.
15 to >13.0 pts
Above Average
13 to >11.0 pts
Average
11 to >0.0 pts
Needs Work
0 pts
Assignment Not Submitted by Deadline
15 pts
Total Points: 15 -
“Rewriting Cybersecurity and Digital Forensics Pages with Human Expertise”
I am looking for a professional in the field of cybersecurity and digital forensics. I require assistance in rewriting some pages accurately, without relying on artificial intelligence or online tools. The task needs to be completed within three hours from now.
-
Title: Exploring the Benefits of Security-as-a-Service: A Focus on SIEM Solutions for Enterprise Cybersecurity
The lecture this week describes how Security-as-a-Service has been
developed and is gaining popularity as a business model. This is
especially true for larger enterprises. The lecture focuses primarily
upon the forensic opportunities that SECaaS provides. This week, your
assignment is to research one of the other SECaaS opportunities
available (i.e., SIEM, SOAR, IDS, IPS, authentication, etc.) and prepare
a paper covering the aspects of this opportunity. Provide details
regarding how this Cloud-based solution can improve the overall cyber
security position of the enterprise. This may be cost or resource
savings, improved counterthreat position, reporting, management, etc.
Include the fundamentals of how the framework / model for your selected
solution would work and how it might integrate into the existing
enterprise overall cybersecurity position. What are some of the vendors
currently providing this service? -
Title: Mitigating Threats and Ensuring Business Continuity in Cloud Deployment Models Prompt 1: Introduction: Cloud deployment models have become increasingly popular in today’s digital landscape, providing organizations with flexibility, scalability, and cost-effectiveness.
There are two prompts. Each prompt should be one page and have one source.
These prompts are building on the same cloud deployment modles from order numbers 7591800 and 7591845.
Prompt 1:
Write a 1 page paper that identifies five potential threats and potential solutions to best mitigate loss.
Prompt 2:
In a 1 page paper describe how a cloud deployment would affect an organization’s Business Continuity and Disaster Recovery plan. -
“Exploring the Potential of Quantum Cryptography: Next Generation Cryptographic Algorithms and Information Privacy”
Quantum Cryptography is the future of cryptography. Quantum Cryptography is still being developed and as with every new technology, the Internet is booming with information about Quantum Cryptography. In this paper, you are going to synthesize what you think Quantum cryptography is and explain its applicability is next generation cryptographic algorithms and information privacy.
-
Title: Mitigating Employee Loss in Small Companies: Strategies for Retention and Contingency Planning The Negative Effects of Key Employee Departures on Company Operations
Please answewr the questions in bold!!
Please seperate each response.
1. When a major U.S. city recognized that more than 70 percent of its IT staff was eligible to retire within a three-year period, it immediately implemented a plan to start bringing in new IT staff and pairing them with experienced veterans. Because the city’s IT systems were almost exclusively developed in-house over 20 years, organizational IT knowledge was critical, and some required skills could not be obtained on the open market. Does this issue suggest another area that should be addressed in crisis management and contingency planning? In which plan or document should this issue have been addressed already?
2. Agree or Disagree? Why or Why Not?
Small companies are perhaps more vulnerable than large organizations to the loss of key employees and the resulting loss of company knowledge. What steps can a small company take to mitigate this potential loss?
There are several steps that small companies can use to mitigate potential loss, and this can include a continuous investment in developing employees, since many employees always look to grow in their career and move on to the next phase in their career path, so it makes sense if small companies encourage employee’s professional growth and development. Doing so will enable employees to remain loyal to the company since they are getting the value of enriching their knowledge and shaping their career progression.
Also, small companies need to attract employees with better competitive benefits, like good retirement plan, 401k matching, flexible remote work schedule, tuition reimbursement benefit, great health care benefits, as this reduces the loss of employees, if they are convinced, they are getting the best deal and benefit from their current employer, there won’t be any reason for an employee to hop around jobs.
Also, many companies put more emphasis only on the base salary and don’t really bother to improve on benefits, while forgetting the facts that majority of their employees have families to cater for and they are not relying solely on just the base pay, so a good benefit program will go a long way in retaining talents. Employees can sign up for good medical or dental care with the company which covers their family’s medical expenses including their kids etc.
Employers should also promote a work culture where they get to become familiar with their employees on a personal level and not just all about work, sometimes, employees like to feel appreciated for their had work and knowing that the company cares about their wellbeing, says a lot about the company’s culture, so managers should be trained to ensure they check in with employees and assist in any way possible, even though some issues are very personal and employees might not be willing to disclose personal issues with their managers, but having a manager who is passionate to care enough about his direct reports and extending support anytime possible goes a long way with retaining talents and reducing the risk of loosing potential employees. Employees are humans and if you treat humans with compassion and care, they never forget the good deeds. Sometimes, it is not really about the money or how well paid you are at a current company, if that same company has a toxic work environment, you are still going to leave that organization someday, to a different company with better work environment that treats employees with respect and dignity that maintains high moral standards and work culture even though it means taking a pay cut for a new role. (I have seen and withnessed this happen in reality/real life scenario).
In addition to key executives, some positions in a company can be considered critical to its continuing success. What will happen if a network administrator leaves? What customers or contacts would the company lose if a key sales representative leaves? What other positions can you name where a loss would have a potentially significant negative effect on the company?
In addition to guaranteeing network security, resolving problems, and overseeing system upgrades, a network administrator is essential to the upkeep of the organization’s IT infrastructure. The departure of a network administrator may result in interruptions to network services, heightened susceptibility to cyberattacks, and protracted troubleshooting of technical problems, all of which could compromise data security and overall productivity.
“Cross-training is an essential duty because it allows others to temporarily take over essential responsibilities in the case of an emergency that forces employees to leave their positions. While cross-training can be accomplished through many of the formal training methods, it typically takes place through one-on-one coaching and on-the-job training” – (Whitman & Mattord, 2020).
Small organizations should practice the act of implementing cross training in their environment for roles that are critical to the organization operations, like Security Architecture, Network engineering., system administration, etc. so incase of any emergency, there will be backup for already trained employees to step into those roles and pick up from the pieces. They can also implement job rotation as well which involves, “the movement of employees from one position to another so they can develop additional skills and abilities”. – (Whitman & Mattord, 2020).
Also, when key sales representatives leaves a company, there will be loss of high value customer or contacts from the sales representative, as sometimes, this sales representative are really good at their job with developing personal rapport and business relationship with their clients/customers, so even if a company is able to get a replacement to fill in the same role, it might be difficult to recover that lost relationship that was already built up by the previous key sales representative, and the new sales representative as to start from the ground up in building trust and a new working relationship with the customer which isn’t possible but might take time and commitment to win a trust of a customer.
A vital role where a loss would have a potentially significant negative effect on the company is the role as a Chief Financial Officer (CFO) since it involves budgeting, assessing risk management, working on financial reporting, etc. so a loss of a Chief Financial Officer can cause issues as the company might face financial reporting errors, disruption of financial processes, and an influence on strategic financial decision-making could result from this. Failure to comply with regulations, monetary losses, and a decline in investor trust could all arise from these issues.
References:
Whitman, M. E., & Mattord, H. J. (2020). Principles of Incident Response & Disaster Recovery (3rd ed.). Cengage. -
Creating a Professional Presence in the Cybersecurity Industry: Building a LinkedIn Profile
The cybersecurity market is anticipated to exceed $300 billion by 2024 as a result of government and corporate concerns about the rising financial losses attributed to cyberattacks, according to the 2019 Market Study Report on the cybersecurity industry 2018–2024.
The cybersecurity industry remains in a state of growth and continues to be a lucrative field for professionals who are trained in security solutions (MarketWatch, 2019). You have chosen a cybersecurity graduate program and your education and skills will help you to be marketable if you choose to work in this field.
In this project, you will create a professional presence on LinkedIn, a professional social media network that is widely used by professionals and employers in most industries. If your profession or personal beliefs prevent you from establishing a LinkedIn profile, you may submit a Word document with the same sections as a live LinkedIn profile. As part of this project, you will conduct research into your present or desired industry, create a branding statement, and create or revise a LinkedIn profile using what you have learned about the industry and yourself.
There are four steps in this project that will lead you through each deliverable. Most steps should take no more than two hours to complete. Begin by watching the video above, which introduces the fictional scenario that provides the framework for the project. Then continue with Step 1: Engage in Analysis and Reflection.
References
MarketWatch. (2019). At 12% CAGR, cybersecurity market size will reach 300 billion USD by 2024. Retrieved from https://www.marketwatch.com/press-release/at-12-cagr-cybersecurity-market-size-will-reach-300-billion-usd-by-2024-2019-02-13 -
“Unmasking the Dark Side of Social Media: Exploring Cybercrime and its Impact on Society”
This essay is about cybercrime and social media. K wrote 4 pages already I just want you to finish the essay. So speak about phishing, ransomware, cyber stalking, fraud, and I wanted to talk about cyberware too pertaining social media
-
Title: A Comparison of Cloud Service and On-Premise Deployment Models: Advantages and Disadvantages
In Part 2 of your Project, you will expand on what you learned in Part 1. Follow the instructions below to complete this assignment:
Write a 1-page paper to compare and contrast the advantages and disadvantages of your Cloud Service model with a similar On-Premise deployment.
Remember to use proper APA formatting, including citations and references for all resources used.
Save your file and submit it using the instructions below.
The paper includes a thorough discussion of the advantages and disadvantages of the proposed cloud service model in comparison and contrast to a similar on-premise service model suitable for an audience of decision-makers who may not all have technical backgrounds.
The paper uses correct APA formatting and correctly documents all sources as needed.
Written communication exhibits clarity and uses grammatically correct, professional language appropriate to the field.