Research the group members identified in the video “Hackers: Operation Get Rich or Die Tryin’

Research the group members identified in the video “Hackers: Operation Get Rich or Die Tryin’”—Albert Gonzalez, Stephen Watt, Damon Patrick Toey, Humza Zaman, and Christopher Scott. Pick a member of the gang and describe his motivation when he started with this hacking operation. Describe how that motivation evolved until the operation was finally shut down.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

IT 647 Responsive Design Tutorial Responsive design gives web-based graphical user interfaces the flexibility to display content with fluidity between devices otherwise constrained by varying resolutions.

IT 647 Responsive Design Tutorial Responsive design gives web-based graphical user interfaces the flexibility to display content with fluidity between devices otherwise constrained by varying resolutions. Ultimately, responsive helps with ease of content readability and content navigation. Resolution is defined as the number of distinct pixels that may be displayed, and is displayed as height x width (e.g., 1024 x 768, which indicates 1024 pixels in horizontal width by 768 pixels in vertical height for total display size). An example of resolution constraints is as follows: Desktop resolution is typically 1024×768 iPad resolution is 1024×768 iPad mini resolution is 768×1024 iPhone 6 resolution is 1334×750 iPhone 4/4s resolution is 640×960 Not all sites are developed with responsive design tactics applied. However, there is an easy way to tell if a site is device-agnostic. Open the website in your browser window, then drag the size of your browser window to a much smaller horizontal width. If responsive design tactics are applied, then you should see content automatically resize to fit the new height and width. Further, depending on the techniques applied, you may see the header, logo, footer, and navigation switch out at varying resolutions to accommodate finger swiping versus mouse cursor engagement. In this example, notice how the logo resizes, and navigation adjusts to accommodate the various width constraints: Another way to identify websites that apply responsive design tactics is to view the source code of the page. There are a number of scripted methods to create fluid content. For instance, you might create an inline style with a float and max-width parameter, which enables text to resize dynamically. Many scripted tactics require meta viewport as follows: The viewport relates to the relative size of the browser or device through the use of length units such as viewport width (vw), viewport height (vh), minimum of viewport height and width (vmin), and maximum of viewports height and width (vmax). Because resolutions must be defined in relativistic sizes, another way to identify responsive design in an implementation is to look for @media tags with a minimum width of 120 pixels and a maximum width of 420 pixels, or variations of these minimum- and maximum-width dimensions. Typically, designs allow for one type of header at higher widths and another type with larger icons for finger swiping at lower widths. This requires that certain styles, images, and layouts only be triggered within a specified relative range. As a result, you may see one style sheet invoked at a max-width of 420 pixels (with included minimum boundary defined) but an entirely different style sheet invoked up to a max-width of 768 pixels (with minimum boundary defined). Here is what a full responsive design implementation looks like with relativistic resolution ranges: It is important to note that many developers do not create responsive design scripts from scratch. Instead, they download and inject a boilerplate such as Gridiculous, stuffandnonsense.co.uk, Skeleton, Less Framework, Gumby Framework, and many more.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

can i get help with this? I dont know what I might be missing or how to do it Write an if-else statement for the following: If userTickets is less than 5, execute numTickets = 1. Else, execute numTickets = userTickets. Ex: if userTickets is 3, then numTickets = 1.

can i get help with this? I dont know what I might be missing or how to do it

Write an if-else statement for the following: 
If userTickets is less than 5, execute numTickets = 1. Else, execute numTickets = userTickets. 
Ex: if userTickets is 3, then numTickets = 1. 

public class TicketCounter {
public static void main (String [] args) {
int numTickets = 0;
int userTickets = 3;


if (numTickets System.out.println(“numTickets”);
}
else {
System.out.println(“numTickets = userTickets”);
}

numTickets= userTickets;

System.out.println(numTickets);

return;
}
}


✖  Checking numTickets when userTickets = 3

Expected value:

1
Your value:3

Tests aborted.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Warm up: Parsing strings (Java) import java.Scanner; public class ParseStrings { public static void main(String args) { /* Type your code here.

import java.util.Scanner;

public class ParseStrings {
public static void main(String[] args) {
/* Type your code here. */

return;
}
}

(1) Prompt the user for a string that contains two strings separated by a comma. (1 pt)

  • Examples of strings that can be accepted:
    • Jill, Allen
    • Jill , Allen
    • Jill,Allen

Ex:

Enter input string: Jill, Allen


(2) Report an error if the input string does not contain a comma. Continue to prompt until a valid string is entered. Note: If the input contains a comma, then assume that the input also contains two strings. (2 pts) 

Ex:

Enter input string: Jill Allen
Error: No comma in string
Enter input string: Jill, Allen


(3) Extract the two words from the input string and remove any spaces. Store the strings in two separate variables and output the strings. (2 pts) 

Ex:

Enter input string: Jill, Allen
First word: Jill
Second word: Allen


(4) Using a loop, extend the program to handle multiple lines of input. Continue until the user enters q to quit. (2 pts) 

Ex:

Enter input string: Jill, Allen
First word: Jill
Second word: Allen
Enter input string: Golden , Monkey
First word: Golden
Second word: Monkey
Enter input string: Washington,DC
First word: Washington
Second word: DC
Enter input string: q

Given code:

import java.util.Scanner;

public class ParseStrings {
public static void main(String[] args) {
/* Type your code here. */

return;
}
}

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

IT 241: Milestone Two Guidelines and Rubric Prompt: Submit a presentation summary that provides a narrative outline of the security awareness program.

I need help with this paper:

For this milestone, you will submit a  presentation summary that provides a narrative outline of the security  awareness program pitch you will create for your final 

project.  Also post a copy of your submission to the 5-2 Discussion to prepare for the peer review that will take place in Module Five.   For additional details, please refer to the Final Project Document and  the Milestone Two Guidelines and Rubric document in the Assignment  Guidelines and Rubrics section of the course.

I have attached the Rubrics for this assignment. Please follow it. Thanks

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

IT 241: Milestone Two Guidelines and Rubric Prompt: Submit a presentation summary that provides a narrative outline of the security awareness program pitch you will create for your final project.

IT 241: Milestone Two Guidelines and Rubric Prompt: Submit a presentation summary that provides a narrative outline of the security awareness program pitch you will create for your final project. Your outline should summarize how you will address the elements listed below and should adhere to the order shown. For further details, see the Final Project Document in the Assignment Guidelines and Rubrics section of the course. I. Introduction II. Unintentional Human Error III. Malicious Human Behavior IV. Organizational Factors V. Conclusion Guidelines for Submission: Your submission should be no longer than two pages and should use double spacing, 12-point Times New Roman font, and one-inch margins. Use at least two sources, and follow APA citation style. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value Introduction Summarizes the introduction Summary of the introduction is lacking in detail or is missing key components Does not summarize the introduction 10 Unintentional Human Error Summarizes how unintentional human error will be addressed Summary of how unintentional human error will be addressed is lacking in detail or is missing key components Does not summarize how unintentional human error will be addressed 20 Malicious Human Behavior Summarizes how malicious human behavior will be addressed Summary of how malicious human behavior will be addressed is lacking in detail or is missing key components Does not summarize how malicious human behavior will be addressed 20 Organizational Factors Summarizes how organizational factors will be addressed Summary of how organizational factors will be addressed is lacking in detail or is missing key components Does not summarize how organizational factors will be addressed 20 Conclusion Summarizes the conclusion Summary of the conclusion is lacking in detail or is missing key components Does not summarize the conclusion 20 Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10 Earned Total 100%

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

use this when responding to the two questions . In responding to other students, identify any potential weaknesses in one of the examples provided.

I need help with answering these responses.

use this when responding to the two questions . In responding to other students, identify any potential weaknesses in one of the examples provided.

1)Proactive security is implementing security so that breaches never happen. It is also known as offensive security. An example of proactive security is Cisco Web Security. It monitors and analyze automatically. When any type of compromise occurs, it quickly determines the scope of the damage, remediate it, and get things back running like normal. You can run this security on a cisco appliance or on a branch router so that it doesn’t create extra traffic to the corporate gateway. It allows you to add security easily as the company grows. You can see all traffic as it is happening and even scan in real time for new and known malware.

Reactive security is fixing the threats and dangers of the past and present. It is also known as defensive security. Disaster recovery is imminent to organizations. EiQ Continuous Security intelligence uses both reactive and proactive security monitoring. The longer an attack goes undetected, the greater the damage and the higher the data loss.

Cisco Web Security Appliance. (n.d.). Retrieved January 28, 2017, from http://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html

Reactive IT Security Monitoring Solutions | EiQ Networks. (n.d.). Retrieved January 28, 2017, from https://www.eiqnetworks.com/how-we-help/reactive-security-monitoring

2)Proactive Technology:A true proactive service would consist of locating and remediating any problems before they even start which involves procedures like , having a precluded consistent onsite visit that are not going to be dictated by a emergency , performing server health checks regularly to ID any warning signs before they become a problem, interacting with every employee to see how they are doing and to see if  they could get help making tasks easier to perform or if there’s something nagging them that they maybe keep to themselves.


Periodically going over help desk issues the see if there maybe indication of a large scale problem and lastly systematically analyze the true health of a clients relationship to see if there maybe any trouble or deficiencies among them.

Reactive Technology:
Reactive technology is often regarded as extinguishing fires and living in chaos employees wait to tell the managers there is a problem, they wait until the problem is to big or they wait until they bring in tech support on-site sitting in a conference room and they all come in one by one instead of calling tech support when the problem first arrives and get it taken care of right away.  Timing is a key difference between proactive and reactive 


Resource:
Proactive Technology:http://www.bizjournals.com/boston/how-to/technology/2016/03/what-proactive-technology-service-actually-means.html

Reactive Technology:
http://smallbusiness.chron.com/similarities-differences-proactive-reactive-hr-14395.html

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

There are three parts. 1)Research the group members identified in the video “Hackers:

I need some help with this assignment. There are three parts.

1)Research the group members identified in the video “Hackers: Operation Get Rich or Die Tryin’”—Albert Gonzalez, Stephen Watt, Damon Patrick Toey, Humza Zaman, and Christopher Scott. Pick a member of the gang and describe his motivation when he started with this hacking operation. Describe how that motivation evolved until the operation was finally shut down. (This has to only be a paragraph at max long)

In responding to classmates, comment on why you think the gang member with so much talent in computers would choose the criminal path of this operation rather than other lucrative high-tech paths. (Again only a paragraph in length long, please use references if needed)

2)Hello class,

Stephen Watt, AKA Jim Jones, AKA UNIX Terrorist (Zetter, 2009), seemed like a motivated young man with big dreams. He graduated high school at the age of 16 with a 4.37 GPA, and from college at the age of 19. While attending high school Watt worked at a software firm and worked at a computer security firm during the summer months as an intern. At the age of 15, Watt met Albert Gonzalez on an (IRC) Internet Relay Chat channel while both were living in Florida, and so a friendship was formed. At the age of 20, Watt worked for Morgan Stanley earning $90K and 3 years later with Imagine Software earning $130K (Zetter, 2009). Money did not seem to be a motivation for illegal activities for a young man with a bright future as a software engineer. In 2007 Stephen Watt, Albert Gonzalez, and Damon Patrick Toey met in Miami for a weekend where Watt was persuaded to write code that would sniff packets which was given to Gonzalez (Erdely, 2010). During that year Watt had moved to New York, where he found himself experimenting with drugs, a big lifestyle change (Zetter, 2009). Ultimately, I believe it was his friendship and loyalty to Gonzalez and the rest of the crew that led him to choose the decision to aide his friends. Watt was sentenced to serve 2 years in prison and restitution of 100 Million (Zetter, 2013).

Erdely, S. (2010, November 11). Sex, Drugs, And The Biggest Cybercrime Of All Time. RollingStone. Retrieved from http://www.rollingstone.com/culture/news/sex-drugs-and-the-biggest-cybercrime-of-all-time-20101111

Zetter, K. (2009, June 18). TJX Hacker Was Awash In Cash; His Penniless Coder Faces Prison. Wired.com. Retrieved from https://www.wired.com/2009/06/watt/

Zetter, K. (2013, April 4). Caught In The System, Ex-Hacker Is Stalked By His Past. Wired.com. Retrieved from https://www.wired.com/2013/04/stephen-watt-stalked-by-past

3)Humza Zaman was convicted in March of 2010 of being the “bag man” for the notorious hacking group spotlighted in the video “American Greed: S0540 Hackers Operation Get Rich or Die Tryin’” (American Greed, 2016), meaning that he laundered the money by moving it between Eastern European accounts and accounts based back in the United States.  He was convicted of 46 years in prison, followed by three years of supervised release and a fine of $75,000 (Zetter, 2010). 

At the time of his activity with the Gonzalez organization Zaman was employed at Barclays Bank, progressing in his career with increasing responsibilities and salary, ending at over $130,000 per year.  Despite a seemingly advantaged childhood and his career success, he enjoyed using recreational drugs and “partying”, required more money than his legal salary from Barclays Bank provided(US v. Zaman, 2010).

Zaman’s initial involvement with the Gonzalez organization began in 2005, where he used manufactured ATM cards to withdraw US currency from created fictitious accounts and to forward the money to Gonzalez himself, minus a percentage cut.  Later he traveled to meet with “a person of Eastern European descent” and accepted large deliveries of cash, which he then mailed to Gonzalez, minus his percentage cut.  At some point Zaman stole ATM system logs from Barclays Bank, where he was working (US v. Zaman, 2010).  Zaman clearly escalated both the risks he was willing to take and the depth of participation he was willing to perpetrate.  I can only assume that the money seemed easy and as the years passed without getting caught he must have assumed that he was not going to get caught.  

References:

American Greed. (2017, December 20). S0540 Hackers Operation Get Rich or Die Tryin’. Retrieved January 31, 2017, from https://vimeo.com/196426503

United States of America V. Humza Zaman, 6 (United States District Court – District of Massachusetts January 31, 2010).  Retrieved January 31, 2017 from https://www.wired.com/images_blogs/threatlevel/2010/03/humza-zaman-sentencing-memo.pdf

Zetter, K. (2010, March 10). TJX Hacking Conspirator Gets 4 Years. Retrieved January 31, 2017, from https://www.wired.com/2010/03/tjx-conspirator-sentenced-to-46-month/

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

There are three parts. 1)Research the group members identified in the video "Hackers:

I need some help with this assignment. There are three parts.

1)Research the group members identified in the video “Hackers: Operation Get Rich or Die Tryin’”—Albert Gonzalez, Stephen Watt, Damon Patrick Toey, Humza Zaman, and Christopher Scott. Pick a member of the gang and describe his motivation when he started with this hacking operation. Describe how that motivation evolved until the operation was finally shut down. (This has to only be a paragraph at max long)

In responding to classmates, comment on why you think the gang member with so much talent in computers would choose the criminal path of this operation rather than other lucrative high-tech paths. (Again only a paragraph in length long, please use references if needed)

2)Hello class,

Stephen Watt, AKA Jim Jones, AKA UNIX Terrorist (Zetter, 2009), seemed like a motivated young man with big dreams. He graduated high school at the age of 16 with a 4.37 GPA, and from college at the age of 19. While attending high school Watt worked at a software firm and worked at a computer security firm during the summer months as an intern. At the age of 15, Watt met Albert Gonzalez on an (IRC) Internet Relay Chat channel while both were living in Florida, and so a friendship was formed. At the age of 20, Watt worked for Morgan Stanley earning $90K and 3 years later with Imagine Software earning $130K (Zetter, 2009). Money did not seem to be a motivation for illegal activities for a young man with a bright future as a software engineer. In 2007 Stephen Watt, Albert Gonzalez, and Damon Patrick Toey met in Miami for a weekend where Watt was persuaded to write code that would sniff packets which was given to Gonzalez (Erdely, 2010). During that year Watt had moved to New York, where he found himself experimenting with drugs, a big lifestyle change (Zetter, 2009). Ultimately, I believe it was his friendship and loyalty to Gonzalez and the rest of the crew that led him to choose the decision to aide his friends. Watt was sentenced to serve 2 years in prison and restitution of 100 Million (Zetter, 2013).

Erdely, S. (2010, November 11). Sex, Drugs, And The Biggest Cybercrime Of All Time. RollingStone. Retrieved from http://www.rollingstone.com/culture/news/sex-drugs-and-the-biggest-cybercrime-of-all-time-20101111

Zetter, K. (2009, June 18). TJX Hacker Was Awash In Cash; His Penniless Coder Faces Prison. Wired.com. Retrieved from https://www.wired.com/2009/06/watt/

Zetter, K. (2013, April 4). Caught In The System, Ex-Hacker Is Stalked By His Past. Wired.com. Retrieved from https://www.wired.com/2013/04/stephen-watt-stalked-by-past

3)Humza Zaman was convicted in March of 2010 of being the “bag man” for the notorious hacking group spotlighted in the video “American Greed: S0540 Hackers Operation Get Rich or Die Tryin’” (American Greed, 2016), meaning that he laundered the money by moving it between Eastern European accounts and accounts based back in the United States.  He was convicted of 46 years in prison, followed by three years of supervised release and a fine of $75,000 (Zetter, 2010). 

At the time of his activity with the Gonzalez organization Zaman was employed at Barclays Bank, progressing in his career with increasing responsibilities and salary, ending at over $130,000 per year.  Despite a seemingly advantaged childhood and his career success, he enjoyed using recreational drugs and “partying”, required more money than his legal salary from Barclays Bank provided(US v. Zaman, 2010).

Zaman’s initial involvement with the Gonzalez organization began in 2005, where he used manufactured ATM cards to withdraw US currency from created fictitious accounts and to forward the money to Gonzalez himself, minus a percentage cut.  Later he traveled to meet with “a person of Eastern European descent” and accepted large deliveries of cash, which he then mailed to Gonzalez, minus his percentage cut.  At some point Zaman stole ATM system logs from Barclays Bank, where he was working (US v. Zaman, 2010).  Zaman clearly escalated both the risks he was willing to take and the depth of participation he was willing to perpetrate.  I can only assume that the money seemed easy and as the years passed without getting caught he must have assumed that he was not going to get caught.  

References:

American Greed. (2017, December 20). S0540 Hackers Operation Get Rich or Die Tryin’. Retrieved January 31, 2017, from https://vimeo.com/196426503

United States of America V. Humza Zaman, 6 (United States District Court – District of Massachusetts January 31, 2010).  Retrieved January 31, 2017 from https://www.wired.com/images_blogs/threatlevel/2010/03/humza-zaman-sentencing-memo.pdf

Zetter, K. (2010, March 10). TJX Hacking Conspirator Gets 4 Years. Retrieved January 31, 2017, from https://www.wired.com/2010/03/tjx-conspirator-sentenced-to-46-month/

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Details on lions Details on tigers Details on bears Details on giraffes Animal – Lion Name: Leo Age: 5

package zoomonitoring;

import java.io.FileReader;
import java.io.IOException;
import java.util.Scanner;

/**
*

  • @author Sarah
    */
    public class ZooMonitoring { public static void main(String[] args) throws IOException {
    //scanner reads input from user
    Scanner sc=new Scanner (System.in);
    //Buffered reader to read from animals file
    BufferedReader brA=new BufferedReader(new FileReader(“Files/animals.txt”));//organized to call from one file named Files
    //Buffered reader to read from habitats file
    BufferedReader brH=new BufferedReader (new FileReader(“Files/habitats.txt”)); int userInput = 0; //loop until user inputs option 3 to exit
    while (userInput !=3){
    //reading from animals and habitats files
    brA=new BufferedReader(new FileReader(“animals.txt”));
    brH=new BufferedReader(new FileReader(“habitats.txt”)); //prompting user System.out.println("What would you like to monitor? "); System.out.println("Enter 1 to monitor Animals "); System.out.println("Enter 2 to monitor Habitats "); System.out.println("Enter 3 to Exit"); userInput=sc.nextInt(); String[] details=null; if(userInput==1){ String line;System.out.println("List of Animals "); int op=0; int blankLine=0; int separateSection=0; int index=-1; while((line=brA.readLine())!=null) { separateSection=0; if(line.equals("")) { blankLine++; if(blankLine==1) { details=new String[op]; } separateSection=1; index++; } } }} } }

}

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"