Final PPT

 The presentation is not an exact replica of all writing in your paper but rather a high level overview of important key points when moving an organization into more of an agile/devops environment. A good practice would be to use the various sections in your paper as slide headers. 

 

Here are some good tips to follow and some things to avoid when putting together MS Power Point presentations:

https://www.ncsl.org/legislators-staff/legislative-staff/legislative-staff-coordinating-committee/tips-for-making-effective-powerpoint-presentations.aspx

The presentation should:

  • Include AT LEAST 12 slides; a cover slide, an agenda slide, a closing slide, and a references slide as the slide slide in the deck are included in this number.
  • Include speaker’s notes below each slide (think of these as notecards you would look at when presenting your slides – discussing in more detail each of the points you’ve made on the slides
  • Follow the power point rule of 5 to 7 (no more than 5-7 bullet points per slide and no more than 5-7 words per bullet point). This is a guideline but gets to the point that slides should NOT have every word that you’re going to say on them. They should be concise and high level – you will talk about each point in more detail when you present your slide deck.

Week 10 Research Paper

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

IT348 week 1

350 words 

1. Research and explain, compare and contrast between an RFID tag and a GPS tag.  [Write it in your own words.]
2. Give two examples of each. 
3. Think about a practical application using one instead of the other.

Cracking an RC4 encryption

Cracking an RC4 encrypted file

I. Download and install CrypTool Version 1 (A zipped file with the installer is included with this lab or find download it from the Cryptool site.

II. Download the hex file Cry-RC4-test.hex from this lab. This is a message I encrypted using RC4 encryption – the same encryption algorithm used for WEP security in WiFi systems.

III. You will use Cryptool to crack the security and retrieve the encrypted text

A. Open Cryptool (version 1.4)

B. Click File > Open

C. In the file type drop-down at the bottom of the window, click the down arrow and change the selection from text file (*.txt) to Binary file (*.hex)

D. Navigate to the Cry-RC4-text.hex file you downloaded and click Open.

E. In the menu at the top of Cryptool, click Analysis

F. Click Symmetric Encryption (Modern) > RC4

G. Since you do not know how many bits I used for the key length, leave it at 8, and click Start

H. Look through the Decryption column in the results. 

I. If any of them look like plain English text, highlight it and click Accept Selection.

J. If none of the results look like plain English, repeat the analysis using the next higher number of bits for the key.

K. Continue using higher and higher key lengths until you find the solution

L. What is the secret phrase in the message you eventually found????

 

Discussion

 

When someone says to you, “How is your internship going?” what is the first thing that enters your mind.  Post a brief statement about that thought.