short answer

 

Please respond to the following:

  • A web service is a software component that resides on a web server. Give at least two examples of when to use a web service. Explain why you think using a web service is required in those situations.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. 

Using JCA in Java- 5pgs due in 5hrs

Estimation of time required for brute-force search attack on the password-based encryption

(To use the attached program, do not use your own program,please)

This assignment asks you to estimate the time required for successful brute-force search attack on password-based encryption using JCA in Java. It assumes that you have done Lab 1, Lab2, Lab3 (see attachment).

Make a list of passwords, mentioned in item 3 of Section 1.2 of Lab 1 instructions (page 2)

For password-based DES encryption implementation in JCA (Lab 2 and Lab 3) fix some salt and iteration count and record an average time required for encryption/decryption (done in Lab 3);

For each of the passwords above estimate the time required for successful brute-force search attack, assuming that an attacker knows:

• the predefined plaintext;

• the ciphertext produced;

• the salt;

• the iteration count;

• but no password.

Investigate how the time required for the attack depends on the iteration count;

Consider a variant of the attack, in which an attacker knows everything as above, except the iteration count, and estimate the time required to recover the passwords;

Compare your estimated time with the estimated time returned for the same passwords by online services (Lab 1, page 2) and propose plausible explanation of any observed differences.

Write a report on the above, providing an evidence for your arguments (e.g. snippets of code used to estimate time required for one encryption).

Access control discussion 6

Discuss the importance of Disaster recovery and how a business can benefit from having a plan. .

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.

Discussion 9

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 9  (Jamsa, 2013).

Chapter 9 topics:

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

Health Informatics & Inform System – a-7

Questions:

1.       Why does evidence-based medical practice need IT support?

2.       Should only randomized clinical trial results be used to make treatment decisions? Why?

3.       List at least 3 reasons clinical practice guidelines are not used consistently in the US.

 

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.

Assignment

 

  • Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
    • When should the architect begin the analysis?
    • What are the activities the architect must execute?
    • What is the set of knowledge domains applied to the analysis?
    • What are the tips and tricks that make security architecture risk assessment easier

Use of medical information online and barriers facing telehealth

Week 5 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission. You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that examines the use of medical information found online and current barriers facing telehealth or telemedicine.

Discussion for Decision support

To help you understand the major differences between blind searching (uniformed search) and heuristic searching (informed search).

Topic of Discussion

  • Compare the problem-solving search techniques: blind searching (uniformed search) and heuristic searching (informed search).
  • Which one do you believe is more efficient and effective?

Submission Instructions

  • Post your responses, examples, ideas, and discussions on this topic on the blackboard. 
  • You should write at least 120-word response on the topic of discussion.