Dictionary Attacks

 

  1. Write a Python script to perform a dictionary attack on a Linux password file.
    1. Copy /etc/shadow file to your local directory. Study the format of this file.
    2. Add the following 3 lines to the /etc/shadow file. For speed purposes remove all other lines.

tommy:$6$HFQQdE2g$g0eyz6UN.c4Pg1tiQgdPPPXdQ1fEOwttCwzSah/Jo4RE9Eac4H7pgksaNLI/WSIyN8tNtCX4NaAq6Uwz.o.4W1:17400:0:99999:7:::

mathis:$6$niptplk1$.mMMVx4T375WhFkDN5RWEaD93HcmDCx3aBQrn2ZalbiRpl4FB2Rww/BeCPEfSYbegjPvoHM2llQmk/VBbSxWj.:17400:0:99999:7:::

tristan:$6$MWwusFJx$KCoO1wiWKtE.7j/7UiwD.1jXmOckMb5X4GGt1DotLS0laXdFga5n3wGfu43FC/Opxki7mY6Yf9XT.cBGN.pkp0:17400:0:99999:7:::    

  1. Use the “crypt” library crypt function to create your hash.
  2. Use the “hmac” library compare_hash function to compare hashes from the /etc/shadow file to the hashes produced from your guesses.
  3. Use the string split() function to separate the separate the password lines from the shadow file by the ‘:’ delimiter to isolate the userid and the hash from an entry in the shadow file.
  4. Calculate the appropriate hash (using the method specified for the entry from the shadow file) for each word in this wordlist (http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)), compare the hash, and stop comparing when you find a match.
  5. Attempt the dictionary attack for each entry in the shadow file.
  6. Remember you need to provide the word from the dictionary, the method, and the salt to the crypt() function.
  7. Print the userid and password when a match is found:
    “Match found for userid [userid]. Password = [password]”
  8. Print the “No match was found for [userid]” when there no match in the dictionary.

UPDATE: Your program should run with the following command line:

>> python3 dictionary.py [shadow filename] [dictionary filename]

Write a method to print

    

1. Write a method to print a (singly) linked list of integers in reverse order using a stack. (Pseudocode, assuming that a stack class is already defined for you) .

2. Assume that a queue is implemented with a circular array. Write a method in Pseudocode to calculate the sum of all elements in the queue.

3. A palindrome is a string that reads the same forward and backward. For example, “Able was I ere I saw Elba “. Write a program to determine whether a string is palindrome.

4. Write a program to add two large integers with up to 300 digits. One approach is to treat each number as a list, each of whose elements is a block of digits of that number, then add two integers (lists), element by element, carrying from one element to the next when necessary.

Activity to do

 

Locate at least 2 websites (NOT WIKIPEDIA because it is not considered reliable; anyone could post false or inaccurate data) that contains one or more articles that present a side-by-side comparison of two iPhone 12 products (4 have just come out or are about to be released). 

Evaluate the effectiveness of the product comparison by considering the questions listed below and then write a summary of your findings in 4 paragraphs (at least 5 sentences each).

1. Which CRITERIA are used to compare the products?

2. What additional criteria could have been used?

3. Did the method(s) produce an objective or subjective result?

4. Do you agree with the results? Why or Why not?

INCLUDE (at bottom of paper) the websites and articles you referenced (list citations/where you could information from a valid website).

Social engineering attacks

 

  • Explain how social engineering attacks work
  • Describe virtual private networks
  • Identify different access control models

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

Exp19_Access_Ch04_ML2 – Benefit Auction 1.0

Access Chapter 4 Mid-Level 2 – Benefit Auction

Exp19 Access Ch04 ML2 Benefit Auction 1.0

Project Description:

You are helping to organize a benefit auction to raise money for families who lost their homes in a natural disaster. The information for the auction is currently stored in an Excel spreadsheet, but you have volunteered to import it to Access. You will create a database that will store the data from Excel in an Access database. You will create a form to manage the data-entry process. You also create two reports: one that lists the items collected in each category and one for labels so you can send the donors a thank-you letter after the auction.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_ML2_Auction.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Items table in Design view.   Change the ID Field Name to ItemID.   Add a second field named Description.   Accept Short Text as the data type   for the Description field and change the field size to 50.

 

Enter   the remaining field names in the table (in this order): DateOfDonation, Category,   Price,   DonorName,   DonorAddress1,   and then DonorAddress2.   Change the data type of the DateOfDonation field to Date/Time and the Price field to Currency. Accept Short   Text as the data type for the remaining fields.

 

Open   Excel, and then open the file Items.xlsx.   Examine the length of the Category, DonorAddress1, and DonorAddress2 columns.   Return to Access. Change the field size for the Category to 15,   DonorAddress1 to 25, and DonorAddress2 to 30.   Save the table, and switch to Datasheet view.

 

Copy   and paste the 26 rows from the Excel spreadsheet into the Items table.   AutoFit all of the column widths so all data is visible. Save and close the   table.

 

Verify   that the Items table is selected in the Navigation Pane. Create a new form   using the Form tool.

 

Select   all of the fields and labels in the Detail section of the form. Change the   layout of the form to a Tabular Layout. With all of the fields selected,   switch to Design view and use the Property Sheet to set their widths to 1.3″. Change the width of the ItemID,   Category, and Price columns to 0.75″.

 

Add   conditional formatting so that each Price that is greater than 90   has a font color of Green (in the   first row, under Standard Colors). (Hint:   Search Conditional Formatting   in the Tell me box). Save the form   as Auction Items Form.

 

Switch   to Form view and create a new record. Enter iPad   as the Description; 12/31/2018   as the DateOfDonation; House   as the Category; $400   as the Price; Staples   as the DonorName; 500 Market St   as the DonorAddress1; and Brick, NJ 08723   as the DonorAddress2.

 

Add   a sort to the form, so the lowest priced items display first. Save and close   the form.

 

Select   the Items table in the Navigation Pane and create a report using the Report   Wizard. Include all fields except the two donor address fields, group by   Category, include the Sum of Price as a Summary Option, accept the default   layout, and then save the report Auction Items by   Category.

 

Switch   to Layout view. Resize the DateOfDonation   control so that the left edge of the control aligns with the left edge of   the column label. Select the Price   and Sum of Price controls and   increase the width to 0.75″.   Select any value in the DonorName   column and drag the left edge of the controls to the right to decrease   the width of the column. Preview the report to verify the column widths are   correct.

 

Switch   to Layout view, and then sort the report so the least expensive item is displayed   first in each group. Save and close the report.

 

Select   the Items table in the Navigation   Pane. Create mailing labels based on the Avery 5660 template. (Hint: Search Labels in the Tell me box and then click the Labels tool in the results.) Place DonorName on the first line, DonorAddress1   on the second line, and DonorAddress2   on the third line. Sort the labels by DonorName.   Name the report Donor Labels.   After you create the labels, display them in Print Preview mode to verify   that all values will fit onto the label template. Close the label report.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Problem 1: Create A List That Contains The Months Of The Year. Problem 2: Create A Loop To Print The Month Number And Name

 

Problem 1: Create A List That Contains The Months Of The Year. Problem 2: Create A Loop To Print The Month Number And Name

 

Problem 1: Create A List That Contains The Months Of The Year. Problem 2: Create A Loop To Print The Month Number And Name 

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Topic: Organizational IT security management Strategy

    

Topic: Organizational IT security management Strategy 

  1. Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.
     
  2. Research Questions: In your identified problem area that you are discussing, what were the research questions that were asked?
     
  3. Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen.
     
  4. Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported?
     
  5. Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?
     
  6. Discussion: Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy planning. What do you see as long-term impacts and what further research could be done in the field
     

Need help in Homework

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

 Be approximately four pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)

Week 6 – Executive Practical Connection Assignment

 

Week 6 – Executive Practical Connection Assignment

Course:  

  1. Organ Leader & Decision Making (ITS-630-B01)

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  Don’t forget that the grade also includes the quality of writing.