C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

week 9 assignment data mining

For this assignment, you need to research the following question and write at least 2 paragraphs with references. (you do not have to follow APA, but it is recommended)

-How do search engines (you can take google as case study), utilize clustering? 

-Why?

-Which type of clustering?

Please write your answers to word document and submit it here as a word document or PDF. 

Artificial Neural Network

Define and explain Artificial Neural Network. Explain how Artificial Neurons decide whether to activate synapses and how to evaluate the performance of the final model.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

json and ajax

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words.

Analyze Current Security Products and Services

Searching for Vendor Information (without getting a ton of sales calls)

It is often helpful to research a Vendor and their products before contacting the company, (when you contact the company, you often are inundated by sales calls). The assignment is to gather information on a provider of security/privacy products and write a short recommendation document. Include in your report:

  • types of services this vendor provides
  • facts about this company that would lead to their reliability as a provider
  • how they compare to other similar vendors (you will need to look at a few companies to gather this information).

One very useful publication is ICD Research Reports. This is found using the library technology databases. (PDF ATTACHED TO QUESTION)

Complete a three to four-page report with APA cited references to support your work.

bi-4

1. Define data mining. Why are there many names and definitions for data mining?

2. What are the main reasons for the recent popularity of data mining?

3. Discuss what an organization should consider before making a decision to purchase data mining software.

4. Distinguish data mining from other analytical tools and techniques.

5. Discuss the main data mining methods. What are the fundamental differences among them?

6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling

Emerging Information Tech

 

This week I would like you to write a 4-page reflective paper on what you have learned so far in this course and how you will be able to apply the lessons learned.

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?
Preview the document

Unit 5 Graded Exercise: Review

 

Instructions

Unit 5 Graded Exercise 1 Downloadable InstructionsPreview the document

In this lab you will be creating a network using three routers, three  switches, one server and three PCs.  You will configure routing using  the RIP protocol.  You will set up DHCP on your server to allow the PCs  to pull dynamic addresses through the network.  Finally, you will  connect to a corporate server through the multiuser link.

Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document.

week 5

week 5. needs to be added to the attached white paper in paragraph form. week 3 needs revision also included in the white paper.