Exercise : Write a program in C

  

Exercise : Write a program in C or C++ or Java to display the following information.
1. Time information.
In this section you will print out how long the system has been up and how busy it has been. Once you have some baseline numbers printed, you will run a short program that places a load on the system. You will then take a second set of numbers and calculate the load that your program placed on the system.
a. Duration of uptime # get these information from /proc/uptime
b. Duration of idletime
Calculating load average.
Write a function that does some work (to put some load on the system) and make a note of the uptime and idletime before and after the call of the function. The following can be used as sample code for the work function. This program simple runs a math calculation a large number of times, just trying to keep the CPU busy. You can include it as a function in your overall program. Note that because you are using a math function (pow) you will need to explicitly include the math library when you compile your program, i.e., “gcc –o test test.c –lm”. (the –lm option for program compiling in C or C++.)
void work()
{
double y;
double x = 3.0;
double e = 2.0;
int i,j;
for (i = 0; i < 5; i++)
{
for (j = 0; j < 400000; j++)
{
y = pow(x, e);
}
printf(“Loop %d of work cyclen”, i );
// pause for one second between loops so that the work cycle takes a little time.
sleep (1); // in C or C++ you will need to include the unistd.h library for this function
}
}
 

The skeleton of the program
(1) read file “/proc/uptime” to obtain beginTotaltime and beginIdletime
(2) call work( ) to put some work into the system
(7) read file “/proc/uptime” to obtain endTotaltime and endIdletime
(8) Calculate the percentage of the time that CPU was busy during this program:
programTotalTime = endTotalTime – beginTotalTime;
programIdleTime = endIdleTime – beginIdleTime;
programWorkTime = programTotalTime – programIdleTime;
percentage = (programWorkTime / programTotalTime)* 100;
 

Items to turn in to Week 7 dropbox:
1. Source code with filename (linuxtime.c or linuxtime.cpp or linuxtime.java)
2. Sample output from your program
NOTE: (IMPORTANT !!!)
1. All the source file should be with enough documentation either embedded in the code or in a separate file. Insufficient documentation leads to minus points.
2. Be sure to write your name, date, assignment name and a brief description of the project on the top of the file in comments.(All of this counts towards the documentation)
3. Use the same file name as mentioned above (linuxtime.c or linuxtime.cpp or linuxtime.java) and submit it to Week 7 dropbox.
Percentage Distribution
Total : 100%
• Execution of the program with required output : 70%
• Enough Documentation : 20%
• Submitting the sample output : 5%
• Using the same file name as mentioned above : 5%

 Save it as uptime.c
Compilation, as stated before: gcc -lm -o uptime uptime.c
Running: ./uptime
 

Here are my results:
Loop 0 of work cycle
Loop 1 of work cycle
Loop 2 of work cycle
Loop 3 of work cycle
Loop 4 of work cycle
Total time: 8.78 seconds
CPU idle time : 5.09 seconds
CPU busy time : 3.69 seconds
CPU % of time busy/total : 42%
 

INTL440 Cyber Warfare full course (submissions and discussions)

Sep 06, 2021 – Oct 31, 2021
Beth Subero : Instructor

Course Details

INTL440 Cyber Warfare 3 Semester Hours

This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies

Course Materials: What will I need on day one?

Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare – e-book available in the APUS Online Library

Assignment #1

This assignment will be submitted to Turnitin®.

InstructionsInstructions: This assignment designed to assess your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Your essay should be 4-6 pages in length, not counting the cover page and bibliography.

Essay Question: We are a highly technical society.  Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals.  To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet.  In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings.  Discuss the major networking building blocks and their functions.  Secondly, discuss software applications’ vulnerabilities, such as those found in web browsers.
 

Assignment #2

This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives.  You are to pick ONE and answer it in 6-8 page essay.  Grading will be based on the rubric.  Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc).  YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY. You must also have a strong introduction, thesis statement and conclusion.

Essay Question #1: Select one of the studies presented in weeks 6 or 7 of this class or another case of your choosing with instructor approval. You might have to look ahead. Write an analysis paper providing more details of the attack, to include the following:

a.   Victim, attacker, and probable motivation for the attack.

b.   Nature and sophistication of the attack.

c.   What was the desired outcome of the attack?

d.   How successful was it?

e.   How effective were the attackers in covering their tracks?

f.    How did the victim respond?

OR  

Essay Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:

a.   How future wars will be fought.

b.   How ethical is cyber warfare?

c.   How the United States is preparing defensively to counter cyber-attacks?

d.   What is next?

mark the problems

 The answers of the problems already there 

 slide 6-10 have problems COLOR/PUT A MARK LIKE THE FIRST 5 SLIDES FOR  THESE PROBLEMS IN EACH YOU WILL FIND THE ANSWERS IN THE LAST SLIDE , 

USE THE SAME FILE TO DO IT 

AT FIRST YOU WILL SEE EXAMPLES THAT HELPS 1-5

Short paper

Please view the following video and answer the following questions:

Cyber-Protecting Critical Infrastructure

https://m.youtube.com/watch?v=yCkip3GRAwM

1) What insights did you get from the presentation?

2) What did you learn about ICS/SCADA systems?

3) What is the US approach to protecting Critical Infrastructure?

Questions

 

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Complete your answers on a WORD Document, 

Reference List

Review the “Reference List Example” in the topic study materials.    

This assignment will help you prepare for the Topic 3 “Annotated Bibliography” and the Topic 4 “Three Pillars and Future Impact” assignments. Review the directions in Topic 3 and Topic 4 assignments for details.

Pick an industry (health care, marketing, retail, technology, etc.) with which you are familiar. Using Google Scholar, the GCU Library, or another reputable site, identify industry-relevant scholarly sources that support the three pillars concepts: servant leadership, ethics, and entrepreneurism. Refer to the topic study materials to determine what is considered a scholarly resource. Create a title page and a references list that cites nine references from the past five years. Include at the following types of references:

Five journal articles (include at least one article for each of the three pillars: servant leadership, ethics, and entrepreneurism)

One book

One website

One dissertation/thesis from a database

One book chapter

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.

5 different papers —- Easy Own Words, APA format and citations. Please take care of Plegerism

 

1)    Wireless Topology Paper: Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint;  and (3) multi-point to point.  In this paper, (a) define each topology,  (b) provide a scenario for using each topology, and (c) identify at  least one disadvantage of using each topology.

Support your information and make sure all information sources are appropriately cited.

The paper must use APA  7th ed. formatting and contain a title page, 3 to 5 pages of content,  and a minimum of three peer-reviewed references

2)     WAN Technologies Paper: Research Point-to-Point (dedicated), Packet  Switched, and Circuit Switched WAN protocols/circuits/types. Define each  protocol and describe at least two data transmission technologies  associated with the protocol.  Include the bandwidth limitations of each  technology and protocol.

Support your information and make sure all information sources are appropriately cited.

The paper must use APA 7th ed. formatting and contain a title page, 3  to 5 pages of content, and a minimum of three peer-reviewed  references. 

Assignment Resources:

3)    Network Security Paper:  In this paper, you will define the security strategies of Defense in  Depth and Layered Security along with comparing and contrasting the  strategies by explaining, at least, two advantages and disadvantages of  implementing each security strategy. Support your information and make  sure all information sources are appropriately cited.

The paper must use APA 7th ed. formatting and contain a title page, 3  to 5 pages of content, and a minimum of 3 peer-reviewed references.

Assignment Resource(s):

4)   

Network Management Paper: In this paper, you will research and report  on network management tools associated with (1) policy compliance, (2)  bandwidth management, and (3) asset management. Compare and contrast, at  least, one tool for each of the three network management areas. What is  the best tool for each area? Can one tool be used for managing more  than one area? Why or why not? Support your information and make sure  all information sources are appropriately cited.

The paper must use APA 7th ed. formatting and contain a title page, 3  to 5 pages of content, and a minimum of three peer-reviewed  references. 

5)     Networking Trends  Paper:  In this paper, you will research and report on network design  and management trends over the last three years (present year minus 2)  in the areas of virtualization, security, hardware, network management  tools, software defined networking, and wireless. Choose, at least,  three areas and explain the general trend and trends within two subsets  of the area (i.e., security has subsets of physical, perimeter,  monitoring) over the last three years. Use at least one figure from  Google Trends showing a trend discussed in your paper. Support your  information and make sure all information sources are appropriately  cited.

The paper must use APA 6th ed., 7th printing formatting and contain a  title page, 5 to 7 pages of content,and a minimum of 4 peer-reviewed  references.  

Assignment Resource(s):

****While submitting includes question numbers in given file name, it should five different files****