Do Not plagiarize or copy info/ source from any student paper. I need 100 origin

Do Not plagiarize or copy info/ source from any student paper. I need 100 original works because my school uses an advance plagiarize checker!!
THIS IS NOT A ESSAY! EACH CLASS IS DIFFERENT and Please use the temple!
I Need an Individual response for each class!
CIS 542: Web Application Security
Please respond to the following in a post of at least 200 words:
Week 4 Discussion:
Overview
The Open Web Application Security Project (OWASP) came into existence on December 1, 2001, and it is still used for the development of Web applications.
Instructions
Go to the OWASP website at Who Is the OWASP Foundation? and read their OWASP Top 10: 2021.
What are the most significant changes since 2017?
Choose one of the top ten items and fully discuss it and make recommendations on preventing this risk.
Knowing the importance of identifying threats, how should developers be responsible for log files and monitoring? Justify your answers.
Share your findings with your classmates and provide links to any useful resources you find.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.
Classmate recommendation below please rewrite a respond: When looking at the most significant changes between the 2017 OWASP list and the 2021 list is that 2021 introduced two completely new threats Insecure Design and Server-Side Request Forgery. (SSRF) These two types of attack stem from a web vulnerability that is produced from a network that is badly programmed. Although both these are new to the list, they both pose significant threats and belong on the list.
When looking at identification and authentication failures it is a problem that plagues companies and networks daily. There are different strategies that can be taken to prevent this from happening. The first is to implement multi factor authentication which can be used with applications on other devices. Apps such as Duo Mobile can verify if a user is trying to log into a server or database and you can either approve or deny the request from the device. The second and simpler step is to make the criteria for passwords more complex. For example, instead of making password requirements 8 digits with one number and special character make it 12 digits with a number, capital letter, and special character.
Logging files and monitoring are essential to any network’s success you can’t have one without the other. Developers know the web application in and out. This knowledge of the application shouldn’t go to waste therefore they should be responsible for logging files and monitoring the application. The developers can be the front line of identifying risk by using risk assessments and in turn take that knowledge that was gained from the assessment to update the web application to make it less vulnerable to attack. Vulnerability assessment (VA) can be defined as the methodical evaluation of an organization’s IT weaknesses of infrastructure components and assets and how those weaknesses can be mitigated through proper security controls and recommendations to remediate exposure to risks, threats, and vulnerabilities. VA is a process where an individual or a group of individuals run several tests to assess the number and type of vulnerabilities that exist in the Web application. (1)
1.Abhay Bhargav, & B. V. Kumar. (2011). Secure Java : For Web Application Development. CRC Press.
Thank You
CIS 552: Cybercrime Techniques and Response
– Please respond to the following in a post of at least 200 words:
Week 4 Discussion:
Go to the press releases maintained by the Computer Crime and Intellectual Property Section (CCIPS) of the United States Department of Justice. Start by clicking on the press releases from the last few years and select a press release that interests you relating to white collar crime or cybercrime. Read the press release and identify the theory that best describes what cybercrime is being described. Summarize the press release and include the details that support your choice of theory.
Be sure to respond to at least one of your classmates’ posts. Responses should be substantive, provide additional context, challenge classmates, add to the narrative, and provide evidence to support ideas. Dialogue should be meaningful, constructive, and respectful.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.
Classmate recommendation below please rewrite a respond:
Read the press release and identify the theory that best describes what cybercrime is being described. Summarize the press release and include the details that support your choice of theory.
In this case, the store owner reproduced original media and sold the copies to unwitting customers, who believed they were purchasing “original media.” Before he was caught, he was able to distribute over 48,000 counterfeit copies and amassed almost $700k in sales ($638,000). The video store owner was found guilty of committing mail fraud and copyright infringement and sentenced to five years in prison and two years of supervised release.
The article “Video Store Owner Sentenced…” falls into the category of software piracy. What is software piracy? Software piracy is the unauthorized downloading, copying, use, or distribution of software. This includes the distribution or redistribution of software on multiple devices with a single purchased license. Software includes the following categories (movies, songs, or software. Free of cost).
Risks: Job and revenue ($8.2 billion estimated) losses. Security issues: Almost 20% of system security issues stem from software downloaded by employees on their work computers. Statistics show that consumers have spent an estimated $25 billion between labor and external costs of security issues created by malware from pirated software since 2014. Protect and Educate: Read end user license agreements carefully and confirm that the software can be shared and/or if sharing is allowed at all. Use tools like Autodesk. Autodesk works with authorized resellers in multiple countries to ensure that the purchased product is officially licensed.
Sources
USDOJ. 2020. Former Video Store Owner Sentenced to Five Years for Selling Counterfeit DVDs.
Former Video Store Owner Sentenced to Five Years for Selling Counterfeit DVDs.
https://asean.autodesk.com/solutions/software-piracy?AID=10282382&PID=100357191&SID=oc5A05L8E%2FcFrofF6SHThDCWzRfErf1CB%2BlxCdGOTXf2IMs5gjIkVCo0LYQID%2F65&mktvar002=afc_us_deeplink&cjevent=eefeb7490ab711ed80ef564c0a82b839&affname=100357191_10282382
CIS 524: Computer Interaction and Design
– Please respond to the following in a post of at least 200 words:
Week 4 Discussion:
Respond to the following:
Describe the considerations you would take into account when selecting the menu style for an application—and why. Support your response with examples.
Imagine you have been asked to help a novice designer effectively organize his menu content in an application. Provide the novice designer with the advice you feel would be most helpful when organizing content for menus. Support your response.
respond to at least one other post. Choose to respond to those who have few or no responses.
Classmate recommendation below please rewrite a respond:
Coherent and consistent styling of an interface allows the end user to find, recognize and easily use menus quickly. Important styling techniques include things like: appearance, color scale, size of the menu components, how the components function, the location of the components across the application, and universal usability (pertaining to Section 508 standards). Most menus use icons to make the application easier to use and easier to identify whatever that function does. Icons are also great at conveying information if for example someone did not speak English. Along with these images, there should always be a text alternative, and are great for someone who cannot see the icons and needs the application to read it to them. I would tell this to a novice designer to keep in mind when designing an application.
I would also tell the novice designer to keep these three words in mind and also explain the definitions of them as follows: identification, readability, and size. Menu items should be identifiable, and the color scheme should effectively communicate the presence of the menu and the items visually. For example, many companies have a color scheme that they follow, and use these colors in their applications. When people then see these colors, they think of that application. Where they aren’t using those specific colors, they use other colors that fit together in a color palette. A good website wouldn’t put yellow text on a white background for example. A great example would be any Google applications. The official Google colors are blue, red, yellow and green. If you have any Google applications on your phone, you’ll see that most of their applications stick to that color palette throughout.
Readability ensures the appropriate sizing of menus items, and that these and menu items fit all text. All menus should be able to adapt to things like different text sizes, different languages, and people using the application on different devices. Have you ever seen a website that displays correctly on a desktop, but is barely readable on your phone? That is an example of bad readability.
Finally, there is size. Size includes, for example, something called white space. This will support people with lessened dexterity and small touch screens. Menus should not be overlapping itself and the content should adjust when increasing the zoom on a page. White space can be used to balance elements, and create a natural flow for the user to navigate through all of the content, making the information easier to digest. Sometimes less is more. This is an example of bad white space: https://www.lingscars.com/trustpirate (Menu Styling).
Menu styling. Web Accessibility Initiative (WAI). (n.d.). Retrieved July 25, 2022, from https://www.w3.org/WAI/tutorials/menus/styling/


Posted

in

by

Tags: