CPT assignment

Instruction for the CPT Paper – Working as Java Developer- Current Course: BUS ETHICS & SOCIAL RESPONSIBILITY

The CPT paper is a minimum of 750 words in length, written in APA format including references and citations.  Select a concept or theory covered in one of your current courses.  Apply this concept/theory in your current work environment. Evaluate this concept/theory based on the application to your current work environment.  Does your experience in your current work environment support this concept/theory or refute this concept/theory? Your reference list should include at least two (2) scholarly journals (use library database such as EBSCO).  Be sure to include proper citation and/or quotation according to the APA format. 

You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab).

Description:

You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab). In this assignment, a large (simulation) job can be divided into a number of small jobs, each of which can be assigned to one machine from the server group for execution. The execution results of the small jobs can be merged once all of them successfully terminate.
System Architecture:
client server1 server2 server3 …
| | | |
| | | |

LAN

The client and servers are running Network File System (NFS) so that user files are visible at $HOME directory. You may want to set up the following environment:
$HOME/replicate.hosts: a list of (server) hostnames which participate in the simulation. There is no reason why your implementation cannot support up to 10 servers.
$HOME/replicate_out: the directory that stores the small job execution result.
The simulation program ” hyper_link ” (binary) is provided. In this assignment, you don’t need to know or care what “hyper_link” does, and actually it is a computing intensive (CPU demanding) simulator. The command line arguments of “hyper_link” are job# 1000000 999 1 2 2 100, where the job number determines the number of small jobs in your simulation. To allow the client to run a large job, the job# should be given in a tuple: start, end, and step. For example, the command (from the client) “hyper_link 1 100 1 1000000 999 1 2 2 100” yields 100 small jobs with the job# starting from 1 to 100. Each small job produces a screen output (see example below) at the end (if finished successfully). Your code needs to redirect the output to a file and save it in $HOME/replicate_out. For example (on the server side),
./hyper_link 1 1000000 999 1 2 2 100
will produce a screen output looks like (it takes approximately 2 minutes on spirit):
1:1000000:999:2:0.5:1.125193e+00:2.454346e-04:6.251640e-01:2.205078e-04:0.000000e+00:0.000000e+00

You can only use C programming lanuage to complete this project. Your implementation should not rely on any extra library (to compile your code). Your code must compile by using gcc install on the Linux workstations

Articles

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What are the key issues with interacting and using a computer for people who are visually impaired?
  • What input and output devices are specifically created to help the visually impaired use a computer?
  • What would be the privacy concerns of visually impaired learners and how is their privacy managed?

Python,R

Write R code to load the following data.

To download the data.

Submit the screenshot and codes in MS word

Case Study Luxor Technologies

 Read the Case Study Luxor Technologies, Inc. beginning on page 462 of Case Studies.pdf download.  Answer the questions on page 465.  Use a Word or PDF document as submission.  Format should be 12 pt font, double spaced.  There is no word length requirement, but thorough responses are expected. 

cloud

Use only 50-words max per topic to discuss and present your answer.   

The discussion questions this week are from Chapter 11 (Jamsa, 2013).You are required to use at least two-peer reviewed sources (besides your textbook) to answer the questions.

  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Discuss what it means for a web service to be interoperable.

Dictionary Attacks

 

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

Discussioon 250 words

 Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it. 

system administrator duties

 

The system administrator duties including the monitoring the systems to ensure the secure, reliable, and authorized access.

Security methods can include:

  • Application hardware such as firewalls, proxy servers and DMZ
  • Protection methods such as intrusion detection and prevention systems
  • Honeypots and decoy-based intrusion-detection technology
  • Auditing, network monitoring, and packet analysis software such as Wireshark, SNMP
  • Account access control management

 Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:

1. Give an example of an application hardware, describes the use for protection with the pros and cons. Outline the type of risks you would be addressing with this protection.

2. Select an example of an intrusion detection and prevention system. Give a description outlining the pros and cons. What risks would this provide protection?

3. Detail the use of auditing and network monitoring and what should be observed for securing the infrastructure.

4. Discuss account management and access control.

5. What role do security policies provide the organization?

6. What should be included in an incident response plan?