- 11.1 List and briefly define three classes of intruders.
- 11.2 What are two common techniques used to protect a password file?
- 11.3 What are three benefits that can be provided by an intrusion detection system?
- 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
- 11.5 What metrics are useful for profile-based intrusion detection?
- 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
- 11.7 What is a honeypot?
- 11.8 What is a salt in the context of UNIX password management?
- 11.9 List and briefly define four techniques used to avoid guessable passwords
Digital Forensics
- To what extent are there significant differences between Computer Intrusion attack and Social Engineering attack on individuals, private and public organizations?
Social engineering attacks are underhanded, labeled as non-technical threats to any organization but require well-structured protective measures to decrease ongoing large-scale confrontation by criminals. As you may be aware, perpetrators often adopt self-assurance tricks, exploiting naivety, lethargy, and good nature of authorized users to launch social engineering attacks on organizations’ main file servers.
Journal Article Review
Critical review of the Journal Article: “Ontologies describing concepts and relations in a specific domain are necessary for knowledge representation and knowledge exchange. Waterson and Preece define ontology as “he Specification of Shared Knowledge”. Ontologies (semantic data) facilitate the usability of e-technology and realize its full power. here are several Languages, Tools and Formalisms that accompany the term ontology. Among those languages, we enumerate XML (Extensible Markup Language), RDF (Resource Description Framework), RDFS (RDF Schema), DAML+OIL and OWL that are used in several contexts (compatibility with other concepts, expressiveness, etc.). Moreover, there exist several ontology formalisms with a definite advantages and drawbacks, which support particular features. Ontologies should be created for a specific function in the most appropriate formalism satisfying needs of a fine target community.” (Slimani 2015)
(PDF) Ontology Development: A Comparing Study on Tools, Languages and Formalisms (researchgate.net)
Critically review various toolsets used in the design and development of ontology for various scenarios. Document your review in maximum 800 words. You may also refer to any other research articles for more information. Proper citations and referencing must be provided in CU Harvard style. Key findings may include (but not limited to): Introduction to ontology Application areas Explanation with one example
Apply the knowledge gained from the previous section and discuss the role of ontology in Web Development. Further discuss various Semantic Heterogeneity issues on Web
14 IT / Networking discussions
I have 14 discussions that need to be completed.
EVERY WEEK HAS 2 DISCUSSIONS.
EVERY DISCUSSION HAS 2 BE 200 WORDS OR MORE.
SUBJECT RELATED
GOOD GRAMMAR.
Ethical Hacking
Review the required reading material and summarize one of the scholarly articles listed on the selected websites. Using your own 250-300 words, explain why ethical hacking is necessary in today’s complex business environment.
https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/
Numerical computation Project
Project Description
– Learn one state of the art multivariate analysis method
• NMF, PCA, ICA, NN, CNN, etc.
– Apply matrix analysis and numerical computation on real world data sets
• image, video, audio, social media, sensory signals, etc.
Project Topics
– Given topics
• Numerical computing in econometrics • Applications of the SVD
• Multi-level non-negative matrix factorization • Multi-view non-negative matrix factorization
• Advanced principal component analysis • Binary independent component analysis
• 1D convolutional neural networks • Survey of automatic rank determination in non- negative matrix factorization
– Free optional topics
• You can also search and select a topic other than above given topics as your final project. But your topic should be related to matrix, multivariate analysis and numerical computation. Please send me your topic for approval in advance if you choose a free optional topic.
Project Deliveries
– Project proposal (template will be given)
• Topic, method, application, novelty
• Novelty (new investigation, new trials, new idea, new design, technology improvement)
– Presentation (10m presentation)
– Project report
•Experiment and discussions
• Findings and conclusions
• In paper format (template will be given)
• Good quality project reports will be refined and polished by Dr. Sun and submitted for publication • https://cscsu-conference.github.io/
PS. Paper types file is the guide line for this project.
Proposal template have to be used for the project proposal.
Lab report template has to be used for the lab report.
There are explanations for .zip files in the Paper types file.
Ps. LATEX compiler and Editor Link
MiKTex :: https://miktex.org/download
Texmaker :: https://www.xm1math.net/texmaker/download.html
Computer Forensics
Assignment: Denial of Service ToolsLearning Objectives and Outcomes
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:
- Tribe Flood Network
- TFN2K
- Trin00
For this assignment:
- Search the Internet for information about these three tools.
- Provide a description of each of the three tools.
- Describe the damage or impact of denial of service attacks.
- Summarize the efforts used and solutions found to combat these attacks.
Required Resources
- Course textbook
- Internet
Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist
- I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
- I described each of the three tools.
- I described the damage or impact of denial of service attacks.
- I summarized the efforts and solutions found to combat these attacks.
Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING
This assignment consists of two parts:
Part 1: SLP Assignment Overview
When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.
Part 1 SLP Assignment Expectations
The Prototype should address the following requirements:
- The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
- A basic visual interface to support navigation of the program and identify the future functionality of the application.
- No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
- All code should be well-documented with comments.
- The program should run without significant errors.
- Include a document called operation.docxthat describes how to operate the application.
- This document should provide sufficient information to allow the instructor to set up and operate the application.
- Identify any external system requirements
- Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
- This document should also provide a summary of how the prototype shows proof-of-concept for the project.
- Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.
Part 2: SLP Assignment Overview
For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.
Part 2 SLP Assignment Expectations
The Alpha version should address the following requirements:
- The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
- All major functionality should be operational at least at a minimal level.
- Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
- The visual interface should provide access to all major functions of the application.
- There should be a demonstrable, functional connection to the required database for the project.
- All code should be well-documented with comments.
- The program should run without significant errors.
- Include a document called operation.docx that describes how to operate the application.
- This document should provide sufficient information to allow the instructor to set up and operate the application.
- Identify any external system requirements
- Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
- Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.
Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment
Internet security policy
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:
- Computer and email acceptable use policy
- Internet acceptable use policy
- Password protection policy
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.
Include at least 3 scholarly references in addition to the course textbook.
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.
User Interface Design Document.
Assignment:
create a User Interface Design Document for this desktop part of the vehicle of interest application.
The project background and requirements information are attached. Take the template User Interface Design Template and complete it for your design.
You are to use Pencil GUI Designer for screen mockups.
This design must conform to good design standards.