i have attached 4 files.
Are you pressed for time and haven’t started working on your assignment yet? Would you like to buy an assignment? Use our custom writing services for better grades. Even if your deadline is approaching fast, our writers can handle your task right when you need it.
Order a Similar Paper Order a Different Paper
i have attached 4 files.
i have attached 4 files.
Two assignments which both related to the same topic Assignment 1 Instructions: Visit the website Google Hacking Database (https://www.exploit-db.com/google-hacking-database). You will write a 2-3 page paper. Task: Identify 15 dork strings: 1. What syntax will be necessary to gain the information? 2. What information do you expect to gain from the dorks? 3. When you ran the dorks, what was returned? Did you receive any errors? If so, what were they? What actions did you take to correct the errors? Were you able to recover from the errors? Don’t forget title and reference page Assignment2 Instructions: You will write a 2-3 page paper. Task: Describe how OSINT can be used to supplement your organizational collection plan. Describe how Google Dorks can play a part in your collection plan as well. Which dorks would you use? *Please refer to the APA template for assignment submission. Don’t forget tiltle and reference Pleas I have attached a sample of the annotation the professor looking for. A document of my organizational collection in pdf And an OSINT cheat shit. MY organization plan will be useful in the Assignment 2
i have attached 4 files.
STUDENT USE ONLY Copyright 2020, Ervin Frenzel Student: (LastName)_____________________(FirstName)_______________ Class______________________Section______________Semester:_______________ ____ Week:________________Project: ___________________________________ Copyright 2020, Ervin Frenzel Instructions: For identifying SIEM/Security pr oducts: Identify and rank 10 components (data sets or logs) that can be imported to a SIEM – rank them upon, do this with 2 separate SIEM products (LogRythm, Splunk, QRadar, ArcSight, AlienVault, NuSiem, Dell SecureWorks, Rapid 7) Rank according to Application Programming Interface (API): API rating “0” – Data integration is not possible with non – proprietary data sets API rating “1” – manual retrieval of information API rating “2” – We can produce API API rating “3” – Community will produce API API rating “4” – Organization will produce and deploy API API rating “5” – Existing API produced and backed by Vendor For Cost Associations (Highest cost to Lowest cost): 1 – ________________ to _________________ (example over $50,000) 2 – ________________ to _________________ (example $40,000 to $49,999) 3 – ________________ to _________________ (example $25,000 to $39,999) 4 – ________________ to _________________ (example $10,000 to $24,999) 5 – ________________ to __________ _______ (example under $9,999) For Identifying Indicators of Compromise (IoC): Rank according to : 1 – N o association (validated or confirmed ) 2 – S uspected not association 3 – A ssociation unknown (status unknown) 4 – S uspected association 5 – Association confirmed (validated or confirmed)

Most students find it hard to finish papers at some point in their studies. If it ever happens to you, don’t get desperate—we have a service for every writing emergency! Whether you’re stuck with a problem, equation, or a piece of creative writing, we will definitely come to your rescue. Fill in the order form with the details of your paper. Write your personal instructions so we can meet your expectations.
Order a Similar Paper Order a Different Paper