Lab5

 

Assembly assignment

A valid password consists of up to 7 characters and must contain one lowercase letter, at one uppercase letter, and one digit from 0-9. You are a security consultant for company XYZ. Your job is to assess the security of their password protected network. To enter their network, the user must pass the password checker. This is accomplished by calling a function and passing into the function a password string:

int check_password(char *passwd);

check_password returns a 7-digit integer of 0s and 1s to indicate which character was correct (0 to indicate a character was incorrect, 1 to indicate it is correct, and 2 to indicate it was not used). If the password entered is “aB2” and the passwd is “a11”, then check_password returns the integer 2222100. If passwd entered is “ab2”, then check_password returns the integer 2222101.

Your assignment is to write an assembly function “hack_password” that will find the secret password stored in “check_password” by iterating through all possible combinations of a-z, A-Z, and 0-9 according to password rule given above and calling the function check_password to determine when the return value is all 1’s and 2’s (e.g., 2211111, 1111111, 2222111, etc…). Note that the correct password decoder returns indicator that a character was not used as well. hack_password will print out the correct password.

You may write the main driver in C as follow:

int main()

{

hack_password();

return 0;

}

discussion

 

To successfully complete this week’s discussion, you will need to refer to Chapter 6, “Culture,” in your Project Management Best Practices: Achieving Global Excellence textbook. 

Please respond to the following in a substantive post (3–4 paragraphs):

  • Explain the primary reasons project management causes a cultural change.
  • Describe the impact of that cultural change on integrative information technology.
  • Provide at least one example of a cultural change that project management can cause.

Network security

  1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently?
  2. What policies govern your behavior currently, in school, work, or in other    organizations? Are those policies enforced/followed? Why or why not?

U6

Researching current articles (published in the past twelve months), identify at least two emerging products, two security practices, and one emerging trend in the cybersecurity field. Look specifically for issues with implementation and compliance.

Evaluate – To judge or calculate the quality, importance, amount, or value of something.

Write a 2–3-page paper. Your purpose is to fully evaluate each of the items identified in your research. Contrast the items with others of like type in order to assess their relative importance and impact to the practice and application of cybersecurity efforts overall.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

tools and strategy

refer to the attached document 

 

Textbook(s)

  • Laudon, K. C., & Traver, C. G. (2021). e-Commerce 2021: Business, technology, and society (16th ed.). Pearson. ISBN-13: 9780136931805

Network Security Project Assignment 2

 Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software. Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff. You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. 

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Please complete part 2 from the document attached.

Assume a sport in which two players

  

Assume a sport in which two players (A and B) score points and the winner is a player who has at least 4 points and wins by at least 2 points.
The following diagram shows the structure of the program.
Function point() Prompts the user for the player who wins a point. The function: • Returns “A” if the user enters “A” or “a” to indicate that player A wins. • Returns “B” if the user enters “B” or “b” to indicate that player B wins. • Returns “Q” if the user enters “Q” or “q” to quit the program. • Returns “E” if user enters anything else.
Function game() uses indefinite (while) loop until the game is finished or the user quits. In each iteration of the loop: • Calls function point() to get input from the user. • Increments score of the player A if point() returns “A”. • Increments score of player B if point() returns “B”. • Quits the program if point() returns “Q”. • Prints error message if point() returns “E”. • If the game is over, prints the winner and returns to main(), which terminates the program. • Calls function display() to print the score of the game. Game is over and the winner is a player who has at least 4 points and wins by 2 points.
Write function point() that prompts the user for a player who wins a point and returns “A” if player A wins, “B” if player B wins, and ”Q” if the user quits the game. Write function game() that keeps the score in the game and prints the winner of the game. Write function display() that prints the current score in accordance with tennis rules for a game. Function main() just calls function game().
Function display(scoreA,scoreB) Input are scores (positive integers) of the player A and B. Mapping of the first 3 points to displayed values: 0 point displayed as 0 1 point displayed as 15 2 points displayed as 30 3 points displayed as 40 Deuce means that both players have at least 3 points and same number of points. Deuce is displayed as 40 for both players. After a deuce, the score for the player who has 1 more point is displayed as “Adv” and the score of the other players as “ “ (empty string).
Function main() just calls function game().
Sample printouts:
The program keeps a score and prints winner in a tennis game. Who wins a point, player A or player B? A Score of Player A: 15 Score of Player B: 0
Who wins a point, player A or player B? b Score of Player A: 15 Score of Player B: 15
Who wins a point, player A or player B? C Invalid input. Please enter A, B or Q (to quit).
Score of Player A: 15 Score of Player B: 15
Who wins a point, player A or player B? a Score of Player A: 30 Score of Player B: 15
Who wins a point, player A or player B? q You quit the game.
Deliverables • Write your programs in Python 3. • Make sure your code is properly formatted, structured and commented. • Write a separate program (Python script) for each question or subquestion. Each program has to have a ‘main()’ function from which you should call all other functions (if you have any). • Name program files ‘Question1.py’, ‘Question2.py’, etc. • A program should run the entire code for that particular question by directly executing it. • Submit a single zip file that includes all the question program files together. Name the zip file ‘IU-user-name_assignmentNumber.zip’. For example, if your IU username is ‘rakshah’, your zip file will have name ‘rakshah_assignment5.zip.’ • If you want to provide more instructions for executing your code, put a ‘readme.txt’ file inside of this zip file, where you may provide additional information.
Who wins a point, player A or player B? a Score of Player A: 15 Score of Player B: 0
Who wins a point, player A or player B? A Score of Player A: 30 Score of Player B: 0
Who wins a point, player A or player B? b Score of Player A: 30 Score of Player B: 15
Who wins a point, player A or player B? b Score of Player A: 30 Score of Player B: 30
Who wins a point, player A or player B? a Score of Player A: 40 Score of Player B: 30
Who wins a point, player A or player B? b Score of Player A: 40 Score of Player B: 40
Who wins a point, player A or player B? a Score of Player A: Adv Score of Player B:
Who wins a point, player A or player B? b Score of Player A: 40 Score of Player B: 40
Who wins a point, player A or player B? b Score of Player A: Score of Player B: Adv
Who wins a point, player A or player B? b
Player B wins the game