Information Systems

WRITTEN INTERVIEW QUESTIONS
PhD candidates should provide an authentic personal statements to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for clarity of the reviewer. Documents should be submitted in Microsoft Word format.

PhD IT

What are your research interests in the area of Information Technology? Why do you think it is important to research in this area?
Why did you select to pursue a program at University of the Cumberlands instead of other institutions?
As an individual, what are your strengths and weaknesses? How will these impact you as a doctoral information technology student?
Where do you see the future of Information Technology heading?
How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

 

SQL injection is a code injection technique that exploits the vulnerabilities in the interface between a web applications and a database server.  The SQL Injection Attack Lab document with instructions can be found below (attached document)

Tools used: Virtual Box, Ubuntu OS.

Guidelines on how to complete SQL Injection Lab (also see attachment below):

  1. Install updates: sudo apt-get update (press enter and provide password: dees)
  2. Install curl: sudo apt-get install curl
  3. Turn-off countermeasures
  4. Using ifconfig command, you need to include sudo ifconfig because it requires root privileges.

The first document includes step by step guidelines on how to complete each task from the lab and the second document includes the safe_credential.phd file is used for Task 4.

1. sqlinjection.txt (1&2 see attached documents)

2. safe_credential.php (see atached below)

Submission guidelines: Create a separate Word doc that includes a detailed lab report describing what you have done and what you have observed.  Please provide details using screen shots and code snippets.  You also need to provide explanations for the observations that are most interesting or surprising.

Here is an example i found online done by someone else:

https://github.com/aasthayadav/CompSecAttackLabs

you might a lot more online depending on how you do your research. if you have any questions, please send me a message.

Order now and get 10% discount on all orders above $50 now!!The professional are ready and willing handle your assignment.

ORDER NOW »»