Lab 12 Flowcharting

 

  • Follow the instructions in the Word document
  • Download the “Flow Chart Assignment” file
  • Flowchart the processes using Word and its available shapes
  • You can view a tutorial for creating flowcharts here:https://www.youtube.com/watch?v=0VR7iBImDB4&feature=youtu.be
  • Refer to figure 11-4 in your book for help on this assignment
  • Use only the symbols listed on figure 11-4
  • Upload the finished flow charts to Canvas for grading

Previous
 

Owning a dominion name

  

Instructions

In order to complete assignment #5, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 8

Review Question #4 on page 261 and then answer the following question:

The new age of technology presents many opportunities for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.

The plaintiff, in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants, in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.

Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Weather Underground Inc. v. Navigation Catalyst Sys. Inc., No. 09–10756, 2009 WL 3818191 (E.D. Mich. Nov. 13, 2009).

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Chapter 9

Apple, Inc., and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to blackout restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement.

Rules of Engagement

   

Centralia Security Lab has been hired by Haverbrook Investment Group to perform penetration testing on its systems. As a pen tester, you have been assigned to write the plan for what Centralia will do in the testing.

Your proposal should include the “rules of engagement” (agreement outlining the framework for the penetration testing) and outline how you would go through the five phases of hacking.

  

  • How will      you identify Haverbrook Investment Group’s network characteristics,      expectations, constraints, critical systems, and other relevant      information?
  • What are      your preliminary engagement activities with regard to scheduling, scope,      and key stakeholders?
  • What will      you use to establish a binding agreement between Centralia Security Lab      and Haverbrook Investment Group?
  • How will      you determine the services, targets, expectations, and other logistics      that will be covered during the Rules of Engagement section?
  • How will      you explain to Haverbrook that the tools and techniques to be used in the      penetration test will not corrupt data, violate privacy, and are in      compliance with industry standards and any applicable laws and      regulations?

Format below

Rules of Engagement

Overview

Include a brief description of the penetration test project. 

Scope

Discuss the scope of the penetration test (pen test). 

Checklist

Provide a list of the testing requirements. 

Ethical Considerations 

Describe how you will apply appropriate ethical principles throughout the penetration testing process

References

Python cod

  

Write a Python program that reads IP addresses from an input file (ip_input.txt), checks its format and validity, and then checks its connectivity to each IP. Use the IP input file shown as below. Submit your code and the output screen shots after a run.

8.8.8.8

2.2.2.2.2

127.5.6.7

3.3.3.305

0.120.3.5

8.8.8.1

169.234.6.8

8.8.4.4

4.4.8.8

(you may add more to test your code)

Validity check (check the format and filter the addresses that are not publicly routable):

– IP should be four dotted format (x.x.x.x)

– octets having values between 0-255.

– IP should not belong to one of these blocks: 

o 0.0.0.0/8

o 127.0.0.0/8

o 169.254.0.0/8

o (you may add more if you like)

Connectivity check:

– Use ping for testing reachability to the IP address.

The output could look like:

Ip address: 8.8.8.8

Validity: yes

Reachability: yes

Ip address: 2.2.2.2.2

Validity: no – bad format

Reachability: no

Ip address: 127.5.6.7

Validity: no – in block 127.0.0.0/8

Reachability: no

…….

…….

Need someone good expert in scheme programming

 Domino Loops in Scheme Dominoes are small rectangular game tiles with dots embossed at both ends. They are used to play a variety of games involving patterns on a tabletop. A standard “doublesix” domino set has 28 tiles: one for each possible pair of values from (0 . 0) to (6 . 6). In general, a “double-N” domino set would consist of (???? + 1)(???? + 2)/2 tiles. One possible pattern to make with dominos is a loop, in which the tiles are laid in a circle, end-to-end, with identical numbers of spots on all adjacent ends. In a doubletwo domino set, with six tiles, ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0)) is a domino loop. You are to write a program in Scheme that prints all domino loops in a double-N domino set. Specifically, you are to flesh out the following program: (define domino-loops (lambda (n) (filter loop? (permutations (dominoes n))) ) ) (define filter (lambda (f L) ; return list of those elements in L which pass through filter f (if (null? L) L (let ((N (f (car L)))) (if (null? N) (filter f (cdr L)) (cons N (filter f (cdr L))) ) ) ) ) ) The expression (domino-loops 2) would evaluate to (((2 . 2) (2 . 1) (1 . 1) (1 . 0) (0 . 0) (0 . 2)) ((2 . 2) (2 . 0) (0 . 0) (0 . 1) (1 . 1) (1 . 2)) ((2 . 1) (1 . 1) (1 . 0) (0 . 0) (0 . 2) (2 . 2)) ((2 . 0) (0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2)) ((1 . 2) (2 . 2) (2 . 0) (0 . 0) (0 . 1) (1 . 1)) ((1 . 1) (1 . 2) (2 . 2) (2 . 0) (0 . 0) (0 . 1)) ((1 . 1) (1 . 0) (0 . 0) (0 . 2) (2 . 2) (2 . 1)) ((1 . 0) (0 . 0) (0 . 2) (2 . 2) (2 . 1) (1 . 1)) ((0 . 2) (2 . 2) (2 . 1) (1 . 1) (1 . 0) (0 . 0)) ((0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0) (0 . 0)) ((0 . 0) (0 . 2) (2 . 2) (2 . 1) (1 . 1) (1 . 0)) ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (2 . 0))) (NB: order in this list doesn’t matter. If your code prints the loops in a different order that’s fine.) For larger values of N, where N is even, the number of loops grows exponentially. Note, however, that there are no domino loops when N is odd. There are many possible ways to write your program. Perhaps the simplest (but not the fastest) is to generate all permutations of a list of the tiles in the domino set, and check to see which are loops. You are required to adopt this approach, as described in more detail below. You can implement a more efficient solution for extra credit. Note that the number of permutations of a double-N domino set is ((???? + 1)(???? + 2)/2)!. For N=6 (the standard number), this is about 3.05×1029 . Clearly you can’t afford to construct a data structure of that size. My own (slow) solution to the assignment generates the double-2 loops quite quickly. It takes a couple minutes to determine that there are no double-3 loops. When asked for double-4 loops it thrashes. Requirements You must begin with the code shown above. These three sub-functions will be tested individually, giving partial credit for the ones that work correctly: 1. (dominoes N) returns a list containing the (N+1)(N+2)/2 tiles in a double-N domino set, with each tile represented as a dotted pair (an improper list). Order doesn’t matter. (dominoes 2) ==> ((2 . 2) (2 . 1) (2 . 0) (1 . 1) (1 . 0) (0 . 0)) 2. (permutations L) given a list L as argument, generates all permutations of the elements of the list, and returns these as a list of lists. (permutations ‘(a b c)) ==> ((a b c) (b a c) (b c a) (a c b) (c a b) (c b a)) (Again, order doesn’t matter, though obviously all permutations must be present.) Hint: if you know all the permutations of a list of (N-1) items, you can create a permutation of N items by inserting the additional item somewhere into one of the shorter permutations: at the beginning, at the end, or in-between two other elements. 3. (loop? L) given a list L as argument, where the elements of L are dotted pairs, returns L if it is a domino loop; else returns the empty list. Note that the first and last dominoes in the list must match, just like the ones in the middle of the list. Also note that a straightforward implementation of your permutations function will give you lists that should be considered loops, but in which you need to “flip” certain dominoes in order to make all the ends match up. For example, in a double-2 domino set, ((0 . 0) (0 . 1) (1 . 1) (1 . 2) (2 . 2) (0 . 2)) should be considered a domino loop, even though the last tile needs to be flipped. Important: ⚫ You are required to use only the functional features of Scheme; functions with an exclamation point in their names (e.g. set!) and input/output mechanisms other than load and the regular read-eval-print loop are not allowed. ⚫ Output function may not be needed. Returning the result list is sufficient. ⚫ Defining any helper function(list) is allowed, but modifying the interface of three functions isn’t. ⚫ Make sure your scheme program is workable in different PC. (Test it on your friend’s PC) 10 points deducted for the inexecutable program. 

Penetration Testing

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Service Delivery Models

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Write in essay format, not in bulleted, numbered, or other list formats

Executive Program Practical Connection Assignment

Course Name : InfoTech Import in Strat Plan 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).