Cryptography 9 Discussion

Question:  describe a cryptographic hash function and how it is used as a security application.  

 -You must use at least one scholarly resource. 

 -Every discussion posting must be properly APA formatted. 

-400 words

-References

-No Plagiarism. 

in Python

 

in this assignment, you need to animate covid-19 numbers in 4 state in dynamic bar graph settings. You need to read data from a url, https://raw.githubusercontent.com/nytimes/covid-19-data/master/us-states.csv .

In the bar graph, randomly choose 4 states and show total number of cases in these state daily in an animated way. It means a frame should  show total number of cases on a given day. The next frame should show next day’s numbers. The animation should update twice a second (interval = 500), i.e., two days of data will be shown in one second. The title of graph should show current date, such as Jun 15, 2020. Both axes should have appropriate title. The animation should start the most earliest date and should stop once all data is consumed. 

Linux bash shell script

 

Write a Linux bash shell script that should take an IP address as an argument from the command line and ping to that address. The script should output the result of the ping as either reachable or unreachable depending on the result of the ping. Two example outputs of the script may look like as below. Take the screen shot of the script itself and the outputs of the running script for 8.8.8.8 and 23.23.23.21 to submit.

 

————1——

$ ./yourname_script.sh 8.8.8.8

The IP address 8.8.8.8 is reachable

—————2————-

$ ./yourname_script.sh 23.23.23.21

The IP address 23.23.23.21 is not reachable

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

Legal Reg, Compliance, Invest

For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Discussion

 

For this assignment, you will identify a computer system you have recently had experience with and prepare and attach a PowerPoint presentation (8-10 slides) describing a potential computer security problem related to that system. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential security issues.

Suggestions:

  • Begin with an description of the organization and the computer system you have chosen.
  • Where necessary, you may make assumptions about any specifics–please note these as such in your presentation notes.
  • Draw from the assigned readings (and independent research) to identify what topics should be included.
  • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.

case study

 

Please read the Scotiabank case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the success factors in the Scotiabank-Kabbage partnership?2. Under what conditions is the same model applicable?When will the Scotiabank-Kabbage model not work?3. Under what circumstances should Scotiabank seek fintech partnerships?4. Identify a sector (e.g., international payments, blockchain, lending or wealth management) and a geographic market where a fintech partnership would create value for Scotiabank, and explain why.5.Based on your answer to question 4, what recommendations would you make to Scotiabank’s executives for a three-year plan, choice of partner, reason for the partnership, and suggested procedure (i.e.,what partnership model to follow)?6. What challengers is Scotiabank facing in the blockchain sector? What are the implications for the bank’s blockchain partnership strategy?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

Deployment and Maintenance: Test script Word document and test execution report

 

ASSIGNMENT DESCRIPTION

You are working as the software tester for a large travel company. Your company is planning to launch a new Web site that allows users to book their travel online. Please follow the steps below to set up the application on your computer:

  • Step 1: Click here to download the WebTours 1.0 .zip file.
  • Step 2: Go to the C: drive, and unzip the file.
  • Step 3: Click here to download the strawberry-perl-5.10.1.0 MSI file, and install it on your computer.
  • Step 4: Click on the Web Tours folder, and click StartServer file (near the bottom of the folder). Please do not close this file while the test is running.
  • Step 5: Click here and follow the steps.

You need to perform the following tasks as part of your assignment:

  • Click here to open the Tutorial Scripts.zip file.
  • Create at least 4 test specifications.
  • Each test specification section should have at least 3 test cases.
  • Each test case should contain the following:
    • Description
    • Test Steps
    • Expected Results
    • Actual Results
      • Execute each of the test cases, and update the Actual Results column
  • Create a test script execution report for your leadership team. Click here for a sample report.

Please submit your assignment.

References

Helping Testers. (n.d.). Test scenario case status.

Requirements: MAXIMUM