Module 01 Content

 

Module 01 Content

  1. For the first part of your project, you have been given a partial audit, performed by a NASA Blue Team. This audit was part of their Certification and Authorization (C&A) process to ensure Country Roads Space Systems (CRSS) has authorization to operate as a 3rd party entity to NASA and allowed to work with NASA assets. The C&A process includes a line-by-line review of all security controls identified within NIST 800-53b documentation, and their sub-sections. During the initial review process, NASA reviewed the existing security controls employed by CRSS and evaluated their compliance to the identified security controls. All items that were found to be non-compliant are documented for review, and a Plan of Action & Milestones (POAM) document was generated as a guideline to correct or evaluate any exemptions found in the initial C&A audit.

    CRSS_InitialPOAM.xlsx

    You will be responsible for reviewing the POAM and familiarizing yourself with the findings. However, you will only be responsible for auditing two security controls that are found to be non-compliant for the audit that you will perform during this course. Please be aware that once you choose your two specific security controls in this Module, you will continue to build on your analysis of these two controls throughout this course. Therefore, you should be take time to consider which controls you choose. In addition, for your two choices, you must choose:

    • One security control from the group of IA-2, IA-3 or IA-5. (NOTE: IA-5 is a common control that often requires remediation in actual security settings. Student who choose IA-5 will be presented with a challenge, but will also find greater documentation when researching remediation.)
    • One other security control from the group of AC-5, PE-13, RA-5.
    • For your Module One Project, start by taking the time to familiarize yourself with the POAM and understand how various systems are evaluated against a common set of compliance frameworks. Study the controls in the POAM and review them against NIST and COBIT frameworks for similar type of controls. In addition, review these security controls against the standards in ISO 27000.Take note on how security controls can be met in diverse ways and still meet overall compliance. With your review of these controls and standards complete, you should feel confident in picking two security control identified in the POAM listed as being compliant. As part you audit, you should also review the company’s network. Please review the CRSS Network Diagram.

      CRSS Network Diagram.pptx

      NOTE: The various frameworks are usually very similar, though differences exist relevant to their industry focus. ISO 27000 and COBIT are meant to focus on private sector compliance, while NIST is focused on public sector.

      You can review each framework at:
      NIST
      COBIT
      ISO 2700

      For this week, you will use the IA security control you chose and in a brief report address the following:

    • Explain the significance of this control and, in your own words, how it protects CRSS and NASA assets. Do you agree with the assessment of the vulnerability described in Column E “Weakness Description”?
    • Next, look up your IA security control in NIST and summarize the NIST standard for one of your controls.
    • Now find the similar standards in ISO27000 and COBIT. Once you find references to security controls that that are closest to the security controls you chose in ISO27000 and COBIT, write a brief explaining the similarities and/or differences between the three standards with regard to one of your security controls.
    • Highlight if you think NIST is the most appropriate set of regulations for CRSS, when compared to the other standards. Which do you this is the most appropriate standard?
    • Do you agree with how the control is remediated in Column K “Overall Remediation Plan”? If so, explain why. If not, please provide an alternative to the Overall Remediation Plan.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Thread 1: The player thread

  

Can be implemented in C or C++

Thread 1: The player thread

While playing, the player thread reads one word from the file, prints it, then sleeps until the next word should be displayed, and so on. Each word should be displayed on a separate line of output. (Words are white-space-separated runs of characters.) At a rate of 1.0, the player should print one word per second. At a rate of -1.0, the player prints one word per second, but proceeding backwards through the file.

For this assignment, the player plays back text files, displaying one word per second at normal rate (1.0). 

The player accepts the following commands:

  • LoadFile(const      char *filename) — Prepares the player to playback the file whose name is      passed in. Stops the player if currently playing.
  • Stop() —      Stops the player if currently playing.
  • Start() —      Starts the player if currently stopped.
  • Rewind() —      Sets the position of the player to time 0.
  • SeekTo(int      byteoffset) — Sets the position of the player to the closest word      boundary past the given byte offset from the start of the file.
  • SetRate(float      rate) — Sets the playback rate: 1.0 is forward at normal speed, –
  • 1.0 is      reverse, 0.5 is forward at 1/2 speed, etc.

The control threads

The control threads generate commands for the player thread. You can think of each control thread as corresponding to a separate remote control. There are two kinds of control threads. The first kind waits for keypresses, and issues commands to the player thread based on the key pressed:

  • ‘ ‘ (blank)      — toggles the player’s mode between ‘playing’ and ‘stopped’
  • ‘r’ —      rewinds the player
  • ‘s’ —      prompts the user for a time, then seeks the player to that time
  • ‘l’ —      prompts the user for a file, then loads the file into the player
  • ‘t’ —      prompts the user for a rate, then uses it to set the player’s rate

Two other control thread are “autonomous” controllers, simulating another user issuing commands. One of the autonomous controllers periodically issues a Stop() command to the player, while the other autonomous controller thread issues a Start() command every so often. Each of these autonomous threads should sleep for a random time interval of between 5 and 30 seconds before issuing each command.

Your program should implement a function for each command (Start(), Stop(), etc.). These functions will be called by the control threads to control the player. Shared, global variables for the state, rate, position, etc. of the player thread are accessed by these routines, as well as the player thread routine. 

Week 7

 

Details of the Project:

  1. Research and prepare a report on your selected (selection made in Week 2) current trend in the area of IT Security.
  2. Prepare a 4-6 page paper in Microsoft Word using approved APA format. (1,000 word minimum)
  3. The minimum page count cannot not include your Title page and Reference list.
  4. Include a Title page, Reference list, introduction and concluding statement.
  5. Include a detailed description of the topic.
  6. Include information on technologies involved in your selected area of research.
  7. Include information on future trends indicated in your selected area of research.
  8. References (minimum 5 peer reviewed sources)
  9. 1″ Margins (top/bottom/sides).
  10. Times New Roman or Arial font, in size 12.
  11. Correct spelling and grammar.
  12. APA formatting: Title page, in paragraph citations, and the Reference list.

At a minimum include the following:

– Detailed description of the topic
– Technologies involved
– Future trends
– References (minimum of 5)

Final Paper on Securing Social Network Data from Privacy Threats

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template

My final research question : What have researchers learned about how best to secure social network data from privacy threats?

1 Objective summary for the article below 

Reference

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2021). Secure military social networking andrapid sensemaking in domain specific concept systems: Research issues and future solutions. Future Internet, 4(1), 253-264. https://doi.og/10.3390/fi4010253

2.Literature Review 

Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 

Compare and contrast articles – Form to fill out

  Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)

Put them in an order that makes sense given how you compared and contrasted them.

Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)

compare and contrast words.

Submit BOTH assignments here.

3. Complete Literature review 

Assignment Content

Put it all together in 1, 2, 3 order! Write your Literature review!

Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

Submit the marked-up checklist and your literature review here, with a title and references page.

4. Discussion 3 paragraphs 

Your hard work has paid off (!!!), You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

The attached file

  

1) The attached file (attendance.txt) is a list of email addresses you collected for a conference your company hosted. Create a program that will parse each email address by its name and company. (Note: email parser object is attached). The company should be sorted in the first column and the person’s name associated with the company should be sorted in the second column; separated with tab character. (first sort is by company; secondary sort is by firstname.lastname). Sample output is listed below:

amzn bob.freed

amzn caitlin.thomas

amzn edward.flak

amzn jill.bennet

amzn mike.reade

fb chris.booker

fb fred.smith

fb jane.bland

fb megan.hill

goog gary.teafer

goog john.kohl

goog larry.page

goog phil.heal

goog zara.war

msft alan.gret

msft darlene.neddle

msft don.shaffer

msft ken.smith

msft sue.flemming

orcl  heidi.opal

orcl  john.voy

orcl  larry.lee

orcl  mark.lite

2) Create a histogram on the number of attendees per company for the conference. (can be in same program as #1)

3) Check if bill.gates attended the conference.Output that Bill Gates attended conference. (can be in same program as #1)

4) Create an output text file for the output above so that it can be imported in Excel for further analysis. One method of code to write text to an output file: (can be in same program as #1)

String text = “my textrn”;

BufferedWriter output = null;

try {

File file = new File(“example.txt”);

output = new BufferedWriter(new FileWriter(file));

output.write(text);

} catch ( IOException e ) {

e.printStackTrace();

} finally {

if ( output != null ) {

output.close(); // need to close file to write to a file

}

}

  

Assignment #4:

1)  Write a program(main() method) that reads an arbitrary number of integers that are in the range of 0 to 50 inclusive and counts how many occurrences of each are entered.  After all inputs have been processed, print only the values that have an occurrence of greater than zero.  Also, print the number of occurrences next to the value. [use arrays and indexing ]
        e.g.
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 3
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: -1
        Output:
        The value of 2 has 2 occurrences.
        The value of 3 has 1 occurrences.
        The value of 10 has 3 occurrences.
        The value of 30 has 2 occurrences.
2)  Write a program (main() method) that reads, from the terminal (screen), sequence of names and postal (ZIP) codes for individuals.  Store the data in an object designed to store a first name (String), last name (String), and postal code (int).  Assume each line of input will contain two strings followed by an integer value, each separated by a tab character.  Users will type “quit” when they have completed input entry.  Print the output of the input values by the user to the screen.
[use ArrayList to store object]
[Note:
1)  create an object that will store the first name (String), last name (String), postal code (int)
2)  use ArrayList to store object]
C:Enter Input {first_namelast_namezip_code}:
Bill     Smith   10002
Enter Input {first_namelast_namezip_code}:
Jane     Dome    11354
Enter Input {first_namelast_namezip_code}:
3)  Revise #2 problem to read a list of inputs from a file.  The input file will contain two strings followed by an integer.
Input file:
Bill     Smith   10002
Jill     Ryan    11120
Robert   Johnson 11122
.
.

The purpose of this project is to provide

The purpose of this project is to provide you with practice using conditional statements, loops, and functions. Your task is to write a program that allows a user to display a simple graphic shape using text symbols. Five basic shapes are allowed: V-shape, Hat-shape, X-shape, Right-Arrow-shape, and the Left-Arrow-shape. The shapes are defined as follows:

Type Parameters Limitations Sample Input Sample

Output

V-shape Number of rows

(n)

0 < n < 30 V 4 * *

* *

* *

*

Hat-shape Number of rows

(n)

0 < n < 30 H 4 *

* *

* *

* *

X-shape Number of rows

(n)

0 < n < 30

and

n is odd

X 5 * *

* *

*

* *

* *

Rightarrowshape

Number of rows

(n)

0 < n < 30

and

n is odd

R 5 *

**

***

**

*

Left-arrowshape

Number of rows

(n)

0 < n < 30

and

n is odd

L 5 *

**

***

**

*

Your project should provide an interactive menu system that allows a user to select the type of object to display.

The following menu items must be provided: V, H, X, R, L, and Q. The meanings of these items are:

V – V shape

H – Hat shape

X – X shape

R – Right arrow shape

L – left arrow shape

Q — quit.

The letter indicates which shape to display and will always be followed by a space and an integer value

representing size of the shape. Valid input can be uppercase as well as lowercase characters. All other letters

entered as command inputs are considered invalid. Provide a mechanism to allow a user to recover from an error.

For example, if the user enters a Z, do not terminate the program. Inform the user that an error has occurred,

display an error message, and discard the erroneous information i.e. if an incorrect command is detected, make

sure to flush the input buffer using cin.ignore(80,’n’).

A valid shape command code will always be followed by an integer valued size. The value provided may not be

acceptable based on the limitations outlined in the table. If you detect an invalid size, display a meaningful error

message, reject the command, and allow the user to enter a new command.

Program Design:

To solve this program, you need to decompose the problem into manageable pieces. Fortunately, the program

naturally breaks into functional units based on the different shapes. Design your solution so that your main

program calls functions to complete the various tasks. For example there should be functions to display each

shape, and there should one or more functions to get a valid command code.