EH Week9 DB

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Cybercriminals use many different types of malware to attack systems. Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it.   https://www.esecurityplanet.com/malware/malware-types.html#maliciousmobileapp

300 words

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Configuring a DSLAM and DCHP

 

In this graded practice you will add and configure a DSLAM (Digital  Subscriber Line Access Multiplexer) and configure a small network using  this DSLAM.  You will connect a router to the DSLAM and configure DCHP  via a router.  

A DSLAM (Digital Subscriber Line Access Multiplexer) is a network  device that receives signals from multiple customer Digital Subscriber  Line (DSL) connections and puts them onto a single Ethernet connection.

distributed systems

  

a) Briefly differentiate between lazy and (immediate) eager update propagation. How can they be compared to delayed-write and write-through policy in implementation? Which situations would they be good? 

main practical connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Intro to Data Mining (ITS-632-M26) )  have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study( Intro to Data Mining (ITS-632-M26)  ). Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories of this course have been  applied, or could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you  have or could observe these theories and knowledge could be applied to  an employment opportunity in your field of study.     

cloud computing to become multi-jurisdictional

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.   Stand-alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format, not in bulleted, numbered, or other list formats. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Discussion 66

 

Murder Case

Preamble

An organization system administrator was labeled as the key suspect in a homicide case. The accused claimed that he was at work at the time of the murder. 

Police Intervention

The police asked his employer to help them verify his alibi. Unpredictably, the same organization, occasionally trained law enforcement personnel to investigate computer crimes and was eager to help in the investigation. 

Collaborative Strength: 

The organization worked with police to assemble an investigative team, seized the suspect computers in his office and residence, and backup tapes on a file server managed by his employer. All of these evidence were stored in a room to where only members of the team had access. 

Harsh Situation

At the initial stages, the operation appeared reasonably well documented, but the reconstruction process was a disaster. The investigators made so many omissions and mistakes that one computer expert when reading the investigator’s logs, suggested that the fundamental mistake was that the investigators locked all of the smart people out of the room. The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up.

As a result of the investigators’ omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.

Lesson Learned

  • The case amplifies forensic investigators’ requirements to obtain fundamental knowledge of computers, compatible operating systems, and application software programs.
  • Forewarning forensic investigators to seek the assistance of the system administrator during the criminal investigation. 

Scenario 

  • You have been retained as a Deputy Technology officer at the University and charged with the responsibility of developing an Acceptable User Policy for the department of computer science based on this murder case.
  • Question 1
  • Use the AUP to amplify the advantages and disadvantages of investigators’ quarterly training on most currently used operating systems such as Microsoft Windows, Macintosh, UNIX, Linux, Sun System, and more. 

Scenario 2

  • The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up. As a result of such omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
  • Question 2 “Investigators allowed the Murderer to go free.”

2:1. Defend the impasse of the investigator’s unwillingness to admit the slip-up?

2:2 Use the Acceptable User Policy to amplify why the murderer was allowed to go free and penalties for violations.

USE The Following attached file, called Technology Acceptable User Plolycy

Information security

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. 

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Paper examine the influences and effects of computer networks on the world around us

In this assignment, you are to examine the influences and effects of computer networks on the world around us. You can pick almost any area: Social effects (how we talk or interact), Business (how we market, advertise, buy, and sell items), Criminal (how people try to break the law) or Legal (new laws which are needed because of computer networks), or another area. Please pick one area so that you can concentrate on it. If you can’t think of a topic – please let me know. 

Pick an article or topic that you can write 5-7 pages on (cover page or references pages DO NOT count). Summarize and describe what the situation before computer networks (you can go back as far as you’d like) and what it is like now (after or during the impact of computer networks). Describe any possible further effects that could still happen (or where you think the area will go or what would be really cool if it happened). THIS IS ABOUT YOUR OPINIONS, NOT JUST A LOT OF REFERENCES ABOUT WHAT OTHERS THINK. 

You are to hand in: the paper (of course) and any references that you use (URLs are preferred). If you cannot submit a URL, then a hard copy must be turned in. 

NOTE: Term paper rules apply. Quoted material must be footnoted. References are required, but there should only be a few – this is to be your own ideas. You will be graded on the level of detail that you get to in describing the background, the impact and future effects of networks on the subject that you pick. If you have any questions about what constitutes plagiarism, please contact me immediately. You don’t have to have any references, but you should have one or more which back up your history or current disposition of the area. Any questions, please ask! 

Week 4 – Web 2.0

Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.