IT345 9B

 Summarize what you have learned over the last 9 weeks. Has it changed your opinion about technology? Do you believe technology will continue to evolve? What businesses should concerned about being “phased” out due to new technology? 

Course   

Impact of IT on Individuals, Organizations, and Society

250 words 

Security Architecture & design

Length:  Minimum of 600 words

Total points: 10 points

Due date: Sunday, 11/22/2020 by 4:00PM EST

Simple, Noplagarism

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Provide your thoughts and understanding of requirements:
1. Who consumes requirements?
2. Getting security requirements implemented.
3. Why do good requirements go bad?

Computer Science- Dictionary Attack with and without Password Salt program

 PowerPoint of the Slides is attached below.

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

 Explain your program appropriately using comments the source code. 

PLw2

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal.  Include at least one quote enclosed in quotation marks and cited in-line.

Risk Assessment

As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Risk Assessment.  The overall cybercrime risk assessment can be outlined with a minimum of two to three sentence descriptions of what the outline will cover under each section.

  • Ensure that you provide information for three specific risks for each section. For example, three High, three Medium, and three Low.
  • You will want to take into consideration that HU Financial Firm is a legal firm. 
  • Items to think about would be the possibility of a natural disaster occurring or a cybercrime attack. 
  • You will want to rank the possibility of an incident happening from high to low as identified in the sample template in this section, which has been provided for you.
  • Additional information can be reviewed under the course reference links and research on the internet.

PLEASE USE THIS INFORMATION TO FILL OUT ATTACHED DOCUMENT.

casestudy

Please add proper introduction and support the already existing content with a good example in the description.Also help to add proper citations and provide 7 APA references.

Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

Assume you are a network administrator in your organization, describe the most cost-effective ways to secure your organization’s connection to the outside world. Briefly discuss the risk assessment components necessary to secure the organization’s asset (in this case, data).

The post should include adequate citations and references that adhere strictly to the APA format.

Organization leader and Decision making – Research Paper

Note : Please write Research paper in APA 7 format 

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

EH FP

 

In 750 words

What is the Internet of Things (IoT) and how can we secure it? What are the Challenges?  

Address the below points
1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Constraint satisfaction problem

## Problem 2 – CSP

Consider the following constraint satisfaction problem. A linear graph has nodes of the following colors:

– Red

– Yellow

– Green

– Blue

– Violet

Each node has a domain of {1, 2, …, 9}.

Each node type has the following constraints on its value:

– Red – No contraints

– Yellow – equals the rightmost digit of of the product of all its neighbors

– Green – equals the rightmost digit of the sum of all its neighbors 

– Blue – equals the leftmost digit of the sum of all its neighbors

– Violet – equals the leftmost digit of the product of all of its neighbors

As a reminder here is the pseudo code for the Min-Conflicts search algorithm:

![minconflicts](https://images2017.cnblogs.com/blog/1126979/201712/1126979-20171224140802287-1871895433.png)

**Notes:**

– It’s possible that you won’t converge to a solution in a single run. Try a few runs to see if you get to a solution.

– The example is to show you what a problem looks like, we will test/grade your program on different examples

Complete the function *solve_csp* defined below. You may find some helper functions useful.