Cryptography

Section 1 

Using the Internet and/or the Library, research and complete the following: 

In 1,000 words or more words, respond to the following: 

Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security. 

Section 2 

In 200 or more words for each answer, respond to the following: 

  • Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
  • How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? 

Exp19_Excel_Ch02_HOEAssessment_Gateway_Vacations

Exp19_Excel_Ch02_HOEAssessment_Gateway_Vacations

  

Project Description:

You have been hired as a loan officer for Gateway Vacation properties, a timeshare company in Southern Florida. As part of your responsibilities, you calculate loan information for customers who purchase timeshares. You will use Excel to calculate down payment, interest rate, and total payment information.

     

Download   and open the file named Exp19_Ch02_Assessment_TimeShare.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

 

Click cell B2, click the   Formulas tab, click Date & Time in the Functions Library group. Select NOW, and then click OK to enter   today’s date in the cell.

 

Click cell D9. On the Formulas   tab, click Logical in the Function Library group, and select IF. Type C9<$B$6 in the Logical_test box, type B9*$B$4 in the Value_if_true box, and   type B9*$B$5 in the Value_if_false box.   Click OK, and use the fill handle to copy the contents of cell D9 down the   column. Click Auto Fill Options, and click Fill Without Formatting.

 

Click cell E9, type =(B9-D9)/B9, and use the fill handle to   copy the contents of cell E9 down the column. Click Auto Fill Options, and   click Fill Without Formatting.

 

Click cell F9, type =B9-D9, and and press CTRL+ENTER. Use   the fill handle to copy the contents of cell F9 down the column. Click Auto   Fill Options, and click Fill Without Formatting.

 

Click cell G9, click Lookup   & Reference in the Function Library group and select VLOOKUP. Type C9 in the Lookup_value box, type $D$4:$E$6 in the Table_array box, and   type 2 in the Col_index_num box. Click   OK.

 

With cell G9 selected, use the   fill handle to copy the contents of cell G9 down the column, stopping at row   28. Click Auto Fill Options, and click Fill Without Formatting. With the   range G9:G28 selected, on the Home tab, in the Number group, click Increase   Decimal twice.

 

Click cell H9, type =G9/12, and press CTRL+ENTER Use the   fill handle to copy the contents of cell H9 down the column, stopping at row   28. Click Auto Fill Options, and click Fill Without Formatting. With the   range H9:H28 selected, on the Home tab, in the Number group, click Increase   Decimal twice.

 

Click cell J9, type =I9*12, and press CTRL+ENTER. Use the   fill handle to copy the contents of cell J9 down the column. Click Auto Fill   Options, and click Fill Without Formatting.

 

Click cell K9. Click the   Formulas tab, click Financial, and then click PMT. Type H9 in the rate box, J9 in the NPER box, and type -F9 in the Pv box. Click OK. 

 

Use the fill handle to copy the   contents of cell K9 down the column. Click Auto Fill Options, and click Fill   Without Formatting.

 

Click cell K29, press ALT+=, and   press ENTER.

 

Click cell B32, type  =COUNT(A9:A28), and press CTRL+ENTER to calculate   the total # of loans.

 

Click cell B33, type =MIN(K9:K28), and press CTRL+ENTER to   calculate the lowest monthly payment.

 

Click cell B34, type =MAX(K9:K28), and press CTRL+ENTER to   calculate the highest monthly payment.

 

Click cell B35, type =AVERAGE(K9:K28), and press CTRL+ENTER to   calculate the average monthly payment.

 

Click cell B36, type =MEDIAN(K9:K28), and press CTRL+ENTER to   calculate the median monthly payment.

 

Create a footer with your name   on the left side, the sheet name code in the center, and the file name on the   right side.

 

Save and close Exp19_Excel_CH02_Assessment_Timeshare.xlsx.   Exit Excel and submit as directed.

Exp19_PowerPoint_Ch02_CapAssessment_Food

  

Project Description:

Your school’s Culinary Club is raising money for the local food bank. You volunteer to create a slide show that will be shown at a potluck fundraiser put on by the club. In this activity, you will create a presentation that meets slide show design principles, and has shapes, animation, video, and audio.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch02_CapAssessment_Food.pptx.   Grader has automatically added your last name to the beginning of the   filename

 

Replace Student Name in the subtitle placeholder on Slide 1 with Carl   Patterson Change   the title font size to 54.

 

Click Slide 2. Change the title font size to 48. Change the subtitle font   size to 32.

 

Click Slide 3. Change the title   to sentence case. Change the title font size to 54. Change the bulleted text   to 32.

 

Click Slide 4. Change the title   font size to 48. Change the bulleted text to 32.

 

Click Slide 5. Change the title   font size to 48. Change the subtitle font to 27.

 

Click Slide 4 and insert a heart   shape. Size it to a height of 2.5” and a width of 2.75” . Apply Colored Fill – Red, Accent 1, Darker   25%. Apply a shape outline in Black, Text 1. Apply Preset 2 as a shape   effect. Position the shape horizontally at 10.35” from the Top Left Corner.   Position the shape vertically at 4.9” from the Top Left Corner.

 

Click Slide 2. Select the   subtitle text and add the Zoom Entrance animation. Click After Previous in the Start box.   Adjust the Duration to 01.75 and the Delay to 00.50.

 

Click Slide 3. Select the first   text bullet and apply the Fade Entrance effect. Set the animation to start   After Previous with a Duration of 02.00 and a Delay of 01.75. Click the   Animation Pane, and then click the arrow for the first bullet. Select Effect Options   to access the Fade dialog box. Set the After Animation to Orange (sixth from   the left) on the Effect tab.

 

Select the second text bullet   and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a   Delay of 01.75. Click the arrow for the second bullet in the Animation Pane.   Select Effect Options to access the Fade dialog box. Set the After Animation   to Orange (sixth from the left) on the Effect tab.

 

Select the third text bullet and apply the   Fade Entrance effect. Set the animation to start After Previous with a   Duration of 02.00 and a Delay of 01.75. Click the arrow for the last bullet   in the Animation Pane. Select Effect Options to access the Fade dialog box.   Set the After Animation to Orange (sixth from the left) on the Effect tab.

 

Click Slide 4 and select the   heart shape. On the Animations tab, in the Animations group, click More and   add the Pulse Emphasis effect. Set the animation to start After Previous with   a Duration of 02.00 and a Delay of 0.25. Click the arrow for the shape in the   Animation Pane. Select Timing and set Repeat to Until End of Slide and click   OK.

 

Click Slide 1 and add the Fade   transition. Set the Duration at 01.00. Set the slides to advance   automatically after 00:07.00. Set it to apply to all.

 

Click Slide 5. Insert the   downloaded video file Veggies.mp4

 

Apply the Rounded Diagonal   Corner, White moderate video style.

 

Set the video to start Automatically. Change the Video   Options to Hide While Not Playing and to Rewind after Playing. Compress the media in the   presentation using the Standard setting. Mac users, compress all pictures in   the presentation using the On-screen setting.

 

Save and close Exp19_PPT_Ch02_CapAssessment_Food.pptx.   Exit PowerPoint. Submit the file as directed.

As you work through this assignment

  

As you work through this assignment, indicate the step number and copy and paste the code or write an answer, wherever indicated, in the Word document and the screenshots
 

Perform the following tasks:

1. Open the Buyers project in Eclipse.

 
 

2.  

Add a new method called payForItem to the Buyer interface and the BuyerImpl class. The method in BuyerImpl should write to a message to the standard output that the Buyer is paying for an item.

 
 

3.  

Create a new class called CashBuyer that inherits from the BuyerImpl class. The CashBuyer class will override thepayForItem method.

 
 

4.  

Code the payForItem method to write to a message to the standard output that the CashBuyer object is paying for an item with cash.

 
 

5.  

Add a new class called CreditCardBuyer that will also override thepayForItem method.

 
 

6.  

Code the payForItem method in the class to write to standard output that the CreditCardBuyer object is paying for an object with a credit card.

 
 

7.  

In the BuyerTestDriver class, create and test a CashBuyer object and a CreditBuyer object.

 
 

8.  

Write a brief description of the core object-oriented principles used in this part of the project and describe a justification for their use.

NETWORKING case study

Your instructor will assign you to a group. Within your group you can set up a group WebEx, chat, skype, or other communication tool to determine how best to complete this case study. Each person will contribute to the collaboration portion to complete this case study. Include the Names of each member on your team and a brief description as to how they participated.

Active participation is expected, but the quality, not the quantity, is the key to creating a successful collaborative learning environment for everyone. Instructional approaches for this course are highly interactive and experiential.

Scenario/Summary

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a description of what they are, and include your assessment of whether the activities are something to worry about or not.

You will submit your answers as a single paper from the team. Include the Names of each member on your team and a brief description as to how they participated.

Questions

 1) What is the purpose of a database and what benefits are there to using them?
2) What is normalization and how does it affect database design? 

AWS project

 

AWS Account Creation – 100 points

1.  Create an AWS Educate account.  Take a screen shot of Your Classroom Account Status.  Get started at this link: https://www.awseducate.com/registration#APP_TYPE
2.  Follow the instructions in AWS for how to launch an Amazon EC2 Instance, and launch an instance of: Microsoft Windows Server 2016 Base.  Connect to the instance using an RDP client (i.e. Microsoft Remote Desktop), create a file on the instance desktop with your name, and take a screen shot.
Launch a Linux Virtual Machine with LightsailLaunch a Linux virtual machine with Amazon Lightsail.Amazon Web Services, Inc.

3.  Follow the instructions in AWS for how to launch an Amazon EC2 Instance, and launch an instance of: Ubuntu Server 16.04 LTS (HVM), SSD Volume Type.   You may also use: Ubuntu Server 18.04 LTS (HVM), SSD Volume Type.
How To Launch An AWS EC2 Server And Set Up Ubuntu 16.04 On ItIn this tutorial, We will Learn How to Setup an AWS EC2 Instance from Scratch. We will Configure the Ubuntu 16.04 OS on The Server and Some Essential Configuration Too.Mobisoft Infotech
4. SSH in to your Ubuntu instance and take a screen shot of your SSH session. 
Click on the “AWS Account Creation” link above to submit your MS Word document containing the three screen shots. 

Securing Networks (Cybersecurity)

  

1) Research and explain the latest IEEE standard for Wi-Fi and the level of security it provides. Include at least one reference for more information. 

2) Provide at least three security measures for a Wide Area Network (WAN). 

      –  How do they increase protection for the network? Include an explanation on how an Intrusion Detection System / Intrusion Protection System (IDS/IPS) works on a network. – What security benefits does network segmentation, VLANs or virtual networking provide? In your answer, include at least 2 references outside of the textbook. 

400 words

bswa week12 p12

Hello,

i need this paper by 4/7 afternoon 12am.

Strictly No plagiarism please use your own words.

Do some research on Threat Response software. Find one particular software package to investigate.

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else. Write 300 of your own words and submit in a WORD document here.

https://www.youtube.com/watch?v=4PAcfTzw1ZE

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.