no plagiarism, should be your own work
Network Security
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
in python | c++ any please
Here is the assignment 2 which has checkSum function ….
#include
using namespace std;
//checksum function to add all the characters of the string in ASCII codes
long checksum(string input)
{
//here we change the string value to ASCII value
long value = 0;
for (char a : input)
value+= (int)a;
return value;
}
// function for the message modification by the attacker.
string modification(string input)
{
string total = “”;
for (char a : input)
{
total += min(126, a + 1);
}
return total;
}
int main()
{
//here we accept the message from the user
string message;
//asking user input
cout << "Pease enter the message: ";
//storing the user input
cin >> message;
//here we accept secret key from the user
string secretKey;
//asking the secret key
cout << "Please enter the sender secret key: ";
//storing the secret key
cin >> secretKey;
string finalMessage= secretKey + message;
//here calling the function checksum
long sender_checksum = checksum(finalMessage);
// here we accept attack secret from user
string attackKey;
cout << "Please enter the attacker secret key: ";
cin >> attackKey;
// here we modify original message from calling above function
string modifiedMessage = modification(message);
// here is the final attacker msg
string finalattackMessage = attackKey + modifiedMessage;
//here we compute the checksum
long attackerChecksum = checksum(finalattackMessage);
// here concatenate secret of sender and modified msg
string finalsenderModified = secretKey + modifiedMessage;
// here compute the checksum
long sendermodifiedChecksum = checksum(finalsenderModified);
cout << "The sender original checksum is: " << sender_checksum << "n";
cout << "The attacker checksum is: " << attackerChecksum<< "n";
cout << "The sender modified checksum is: " << sendermodifiedChecksum << "nn";
//compare chekcsum from steps 7 and 6
if (attackerChecksum == sendermodifiedChecksum)
cout << "The attacker checksum and sender modified checksum are equal";
else
cout << "The attacker checksum and sender modified checksum are not equal";
cout << "nn";
//compare checksums from steps 3 and 6
if (sender_checksum == attackerChecksum)
cout << "The original sender checksum and attacker checksum are equal";
else
cout << "The original sender checksum and attacker checksum are not equal"<<"n";
//returns nothing
return 0;
}
********** Design an app on swift language. ***********
Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc.
Refelction
Please write 300 words on interhship reflection. Etchical hacking and information assurance.
microsoft excel graders
I have two graders that I have to get done by midnight. They have to be done correctly and in the correct format .xsls The last guy did not do them right and I did not pass them.,
discussion with two replies
I’m working on a Computer Science discussion question and need guidance to help me study.
300 words discussion post with citations and references in APA format
150 words each two replies
no plagiarism
need turn it in report
APA format
Enterprise risk management – Research paper
The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.
For your week 3 research paper, please address the following in a properly formatted research paper:
- Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
- Are there other frameworks mentioned has been discussed in the article that might be more effective?
- Has any other research you uncover suggest there are better frameworks to use for addressing risks?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
1 Discussion 300 words + 4 responses 300 words for each response
1 Discussion 300 words + 4 responses 300 words for each response
Data Security Assignment
Write an essay of at least 450 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
cloud-com-week-6
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.
