Paper Work

  

Final Project Options:

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

Discussion9

200 words+

Discuss what is Network capacity Planning and how do you measure/determine the capacity of your network? Are there any tools to assist you in network capacity planning?

                                             Please list your reference/s

Corporate IT Security Audit Compliance

 

  • Read the Article: (this article is located in the EBSCO Host of the University of the Potomac Library) Mont, J. (2014). The Foundation of Good Compliance & Governance. Compliance Week, 11(131), 46-49.
  • Write a summary analysis and discuss the element of risk and how Boeing sees the future in Compliance.

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 5.1

 Read the attached case study  “APPLE WATCH” and provide a short answer to each question.

Writing Requirements

  • 2 -3 pages in length  (excluding the cover page, abstract, and reference list)

OS program regarding shared memory

NEED TO Submit ‘producer.c’ and ‘consumer.c’ in the Linux machine.

Read the following document for programming assigment.

Download two programs ‘producer.c’ and ‘consumer.c’ and add your code there so that producer send a list of items to consumer. Producer read the item from a file ‘input.txt’.

In order to use shared memory library, compilation need to link a library ‘rt’. And since we will run two programs, we need to create two executables. See below.

Download ‘hw2.c’. It is a file that contains the definition of shared memory structure and a function to print current time. It is already included in ‘producer.c’ and ‘consumer.c’. You don’t need to change this file. You don’t need to compile it. ‘Producer.c’ and ‘consumer.c’ already include the file. Just keep ‘hw2.c’ in the same folder with other files.

‘read_example.c’ is an example file to show you how to read the input file and to show how to print with time stamps.

You need to copy ‘input.txt’ in the same folder and test as below.

Following is a sample run.

Run producer first. It need to read a number after another from the file and display while sending them to consumer. Since the consumer is not started, the buffer will become full soon and producer will wait.

Now run consumer as below. It need to display all items received. It keeps running until it gets end-of-item message ‘-1’

After consumer begins, the producer will also proceed to read all items from the file and end.

read_example.c:

#include

#include

#include “hw2.c”

int main()

{

        int     item;

        FILE    *fp;

        fp = fopen(“input.txt”,”r”);

        while(fscanf(fp, “%d”,&item)!= EOF){

                printf(“%s Read %d from the filen”,get_time(),item);

        }

        fclose(fp);

}

producer.c:

#include

#include

#include

#include

#include

#include

#include

#include “hw2.c”

int main()

{

        const int SIZE = sizeof(shm_structure);

        const char *name = “OS-ipark”; // ATTENTION: Change this using YOUR id to avoid conflicts with others

        int     item;

        FILE    *fp;

        int shm_fd;

        shm_structure *ptr;

        /* create the shared memory segment */

        shm_fd = shm_open(name, O_CREAT | O_RDWR, 0666);

        /* configure the size of the shared memory segment */

        ftruncate(shm_fd,SIZE);

        /* now map the shared memory segment in the address space of the process */

        ptr = mmap(0,SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, shm_fd, 0);

        if (ptr == MAP_FAILED) {

                printf(“Map failedn”);

                return -1;

        }

        /*****************************************************

        Add your code here.

        Read one item after another from the file ‘input.txt’.

        And write it to the shared memory so the consumer can read.

        Need to wait if the buffer is full

        *****************************************************/

        printf(“Successn”);

        return 0;

}

input.txt:

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

32

64

128

256

512

1024

2048

4096

11

22

33

44

55

66

77

88

-1

consumer.c:

#include

#include

#include

#include

#include

#include

#include “hw2.c”

int main()

{

        const char *name = “OS-ipark”; // ATTENTION: Change this to the same name you used in producer.c

        const int SIZE = sizeof(shm_structure);

        int shm_fd;

        shm_structure *ptr;

        int i;

        int item;

        /* open the shared memory segment */

        shm_fd = shm_open(name, O_RDWR, 0666);

        if (shm_fd == -1) {

                printf(“shared memory failedn”);

                exit(-1);

        }

        /* now map the shared memory segment in the address space of the process */

        ptr = mmap(0,SIZE, PROT_READ | PROT_WRITE, MAP_SHARED, shm_fd, 0);

        if (ptr == MAP_FAILED) {

                printf(“Map failedn”);

                exit(-1);

        }

        /***************************************************

        Add your code for consumer here.

        Read an item after another from the shared memory

        And display to screen using printf().

        Need to wait if the buffer is empty.

        Check if this displays all the items in ‘input.txt’ 

        except end-of-message signal ‘-1’

        ***************************************************/

        

        /* remove the shared memory segment */

        if (shm_unlink(name) == -1) {

                printf(“Error removing %sn”,name);

                exit(-1);

        }

        return 0;

}

hw2.c:

// Definitions for shared memory structure

#define BUFFER_SIZE 10

typedef struct{

        int buffer[BUFFER_SIZE];

        int in;

        int out;

} shm_structure;

#include

char time_str[100];

char *get_time()

{

        

        time_t t=time(NULL);    // get time info (month, day, hour, min)

        struct tm *tm1 = localtime(&t); // convert to easy format

        struct timeval tv;

        struct tm *tm;

        gettimeofday(&tv, NULL);    // get time info (month, day, hour, min)

        tm=localtime(&tv.tv_sec);   // convert to easy format

        sprintf(time_str,”(%02d/%02d %d:%d:%d %d)”, tm1->tm_mon+1,tm1->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec, tv.tv_usec);

        return time_str;

}

dq

1. Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

2. There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from either the UC library or Google Scholar. 

1 Race Horse -h Horse -length: int +Race () +Race (length : int) +printLane(horseNum : int) : voi +start() void -position: in

C++: Question: Overview Use the principles of Object Oriented Design (OOD) and Object Oriented Programming

 C++ 

Question: Overview Use the principles of Object Oriented Design (OOD) and Object Oriented Programming (OOP) to re-build the horseRace assignment using object-oriented programming. Each horse will be an object, and the race will be another object that contains a list of horses and manages the race. Along the way, you will experiment with UML, create classes,

This question hasn’t been solved yet

1 Race Horse -h Horse -length: int +Race () +Race (length : int) +printLane(horseNum : int) : voi +start() void -position: inOverview Use the principles of Object Oriented Design (OOD) and Object Oriented Programming (OOP) to re-build the horseRace assignment using object-oriented programming. Each horse will be an object, and the race will be another object that contains a list of horses and manages the race. Along the way, you will experiment with UML, create classes, review access modifiers, build member variables, add access methods, and create constructors. The Project Build a program that simulates a horse race. The race works just like the last assignment, and the user may not ever see the difference. But this time, the underlying design will use objects. You will have two objects in the game. There will be an array of five horse objects. The horse will ‘know’ how to advance according to a random flip, and to return its position. The other primary entity in this game is the race (or the track, if you prefer.) This object will contain a series of horses. It will also have the ability to start the race. When the race is running, the race class will ‘tell’ each horse to advance, and will print out a track diagram showing the relative positions of the horses. In this case we may do automated testing against your program. In order to accommodate this you will prompt (ask for input) for a random seed and use it to seed your random number generator. This will allow you to test your program against several seeds. And we may test your program with a series of these random seeds. While this will not be your entire grade, but your ability to pass these tests could be a consideration in your grade. This is a common industry practice and one we will try to introduce you. Note that you will not need the automation feature nor a GUI. This just gives you an idea of the race concept. Code Organization While you have already written this program in a procedural fashion, this program is a perfect candidate for the object-oriented paradigm

SECURE CLOUD ARCHITECTURE

As the  IT Manager, you were tasked to improve the performance of the local airport passenger processing system.  The new airport will have fewer employees and a faster passenger processing system. This is to make the Airport more efficient and more secure. The new system will replace the boarding pass and ID Control personnel with an IT System, which will use cloud-based services. 

Assume you already have fast and reliable network connections. Expectations from new IT system. 

  •  There will be Cloud-based Virtual Meetings within all departments 
  • Cloud-Based Storage for  more than a week old Passenger data 
  • Cloud-Based Storage  of more than week-old Flight data 

Answer the airport owners’ questions about the new IT system:

Question 1 What are the advantages of Cloud-based Virtual Meetings (cloud-based conferencing) for the given Airport case?

Question 2 What are the advantages of Cloud-Based Storage for all data collected at the airport?

Question 3 What are the disadvantages of Cloud-Based Storage for the given Airport case?