Ethical Hacking week 4

 

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

Application virtualization

 

Application virtualization can make applications available to end user computers without having to install the applications directly on those computers.

Research application virtualization methods. Complete a 2-3-page paper with an abstract and conclusion in APA format (plus cover sheet and reference page) that discusses:

·           What is the difference between remote and streaming application virtualization?

·           What is the difference between a terminal services desktop and a VDI desktop? What about network connections?

·           What would you consider when determining the type of virtualization?

·           What are the benefits?

Specific questions or items to address:

·           What is the difference between remote and streaming application virtualization?

·           What is the difference between a terminal services desktop and a VDI desktop? What about network connections?

·           What would you consider when determining the type of virtualization?

·           What are the benefits?

Discussion (Principles, Policies and Plans) : ITS-834: Emerging Threats & Countermeasures

Discussion: Principles, Policies and Plans

Word count: 300+ words

Chapter 1 – Security Governance Through Principles and Policies

Chapter 2 – Personnel Security and Risk Management Concepts

Describe and discuss ways, if any, we can safely share security data. Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

  • Please cite properly in APA 7
  • At least one scholarly source should be used. 
  • Use proper citations and references in your post.

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10

Note: plagiarism check required, APA7 format, include References, within 8hrs

hash table

Write a c++ program to create a hash table (containing 1000 slots to store records) store the records using account_num as the key field. Use the method called chaining to handle collisions. sample data

Smith Joe 2344 12 10 1990 45000.00 a(###) ###-####JA: Is there anything else the Programmer should know before I connect you? Rest assured that they’ll be able to help you.

Sociogram

It is a user-friendly web application which helps users to explore the social world with just a single sign up. It is flexible enough for users to create/edit/manage their own individual accounts. User can find friends based on similar interests, which means that the user gets to update/edit their interests/hobbies in their profile information such that they can connect to other users with similar diversion. This helps users to widen their social circle and will help them explore people from different cultures as well.

Need to write a console program

  

Need to write a console program that accepts input from the user, removes spaces, numbers, and punctuation marks, then sorts the characters of the input in a reverse, case-insensitive manner, and finally prints the result. For example, user input of “I Love Java!” would output “vvoLJIeaa”

4.4 Outline Pptx

  1. This is Phase 3 of your final capstone project.
  2. You will submit an overview of the PowerPoint presentation that will summarize your project. Provide a one- to two-slide outline of the main points that cover the following:
    1. Introduction to the problem
    2. Steps that would provide a solution to the problem
    3. Conclusion statement
  3. Remember the specifics for the final PowerPoint presentation:
    1. Create a presentation that would be appropriate for senior management to understand your project.
    2. Provide an overview and introduction with appropriate level of detail of the problem, potential solutions that could be applied to the problem, and the most appropriate solution based on your judgment and expertise as developed throughout your studies. The presentation needs to provide sufficient information that would allow management to make informed decisions related to approving and funding the project. The presentation is to be associated directly with the project paper you are researching and writing.
    3. Use a minimum presentation of 10 PowerPoint slides or a length necessary to adequately inform management.

Enhancing Class Rectangle

  

(Enhancing Class Rectangle ) Create a more sophisticated Rectangle class than the one youcreated in Exercise 9.11. This class stores only the Cartesian coordinates of the four corners of therectangle. The constructor calls a set function that accepts four sets of coordinates and verifies thateach of these is in the first quadrant with no single x – or y -coordinate larger than 20.0. The set func-tion also verifies that the supplied coordinates do, in fact, specify a rectangle. Provide member func-tions that calculate the length , width , perimeter and area . The length is the larger of the twodimensions. Include a predicate function square that determines whether the rectangle is a square.
 

professor instructions;
 

Do exercise 9.12 on page 429 for 100 points.
This exercise makes a reference to Exercise 9.11. Here is the code for Exercise 9.11: Ex09_11.zip
DO NOT click drag the code into your new project. The code MUST be copied and pasted into new .h/.cpp files which you create. If you drag copy code into your project and then send it to me it probably will not contain that code!! This means you WILL have a rectangle class (Rectangle.h and Rectangle.cpp) and a file called Ex09_11.cpp that has your main function.
Before submitting your project check your archive and be sure it contains your .h and .cpp files.
I will be looking for the following in your program.
*Your program MUST use Cartesian coordinates (x and y coordinates for a total of eight coordinates per figure, each corner of your rectangle is an x,y coordinate). This is a major modification of the supplied code.
*You must follow my previous instructions regarding how to start your program. What you are doing is editing the supplied code so instead of the class Rectangle using width and length it will use cartesian coordinates as defined above.
*Do not have the user enter the coordinates. Hard code them into your program.
*You must include a default constructor for the rectangle class. The default constructor should have the following coordinates ( point 1:(0,0), point 2:(0,1), point 3:(1,1), point 4:(1,0). Be sure the constructor has the set function as described in the textbook assignment. I recommend you pass these points as eight integers (0,0,0,1,1,1,1,0).
*Your program must instantiate four objects of the Rectangle class.
• Your first object should form a rectangle but not a square using your supplied coordinates.
• Your second object should form a square using your supplied coordinates.
• Your third object should should not be instantiated with any points allowing your default constructor points to be used
Hint: Remember that your constructor header can contain default values. If you create an object without passing values those default values will be used. See example program in chapter.
• Your fourth object should not form a rectangle or a square and the default coordinates should replace your original coordinates.
Hint: Compare two sides to determine if they are unequal in length.
The textbook assignment asks for a set function that tests if any coordinates are over 20. You do not have to write that function.
 

Do include a function that gets called to check if your coordinates form a square or rectangle as mentioned in the textbook assignment.
Keep your code simple. To decide if the rectangle is a square compare its height verses width.
You choose which points and values to compare. If length = width is a square.
This is a programming project intended to show that you know how to program functions and understand constructors.
Review my supplied image of the program’s output as a guide.
If you submit the code that I am supplying you will receive zero points.
*AGAIN, do not have the user make the coordinate entries. Code it into the program.
Deadline: As posted
IMPORTANT: Any submitted exercise or project that fails to compile and run shall receive zero points.
*You must have a rectangle class (Rectangle.h and .Rectangle.cpp files) that stores those cartesian coordinates and tests those coordinates for rectangle, square or neither in your program. You do not have to test if the rectangle is skewed. Just if it is square or not square.
 

this is how it should output;