The encryption and decryption algorithms within a chain of blocks according the specifications of CBC (64 bit block size

In this assignment you are to modify the algorithm presented in figure 11.9 (TEA) to use Cypher Block Chaining as described in figure 11.5.  Your algorithm will use the encryption and decryption algorithms within a chain of blocks according the specifications of CBC (64 bit block size). Your output is supposed to be able to show the entire message or even portions of the message both encrypted and then later decrypted. 

Basically, read a string from input, simulate CBC encryption on it. Output the encrypted results and then decrypt it and produce the decrypted result. 

How you build that user interface to show how the algorithm works is entirely up to you as long as you show the required results. 

identity theft and credential theft

 

 Research areas in cybersecurity that you foresee in the near future as becoming an area of concern in network security. You may include areas of connectivity that are not readily available at the current moment but leading to that will need enhanced protection. Provide background information, explain why enhanced security would be required, propose a detailed solution to increase security and future research areas.

Must be in APA format, minimum 3-4 pages

Topic:Identity Theft and credential theft

*2-3 slides PPT

Title Page

Abstract

Body 

  • Background
  • Problem Statement
  • Proposed Solution
  • Conclusion
  • Future Research Areas

References

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 Exp19 Excel Ch02 CapAssessment Inland Jewelers 

Project Description:

You are an account manager for Inland Jewelers, a regional company  that makes custom class rings for graduating seniors. Your supervisor  requested a workbook to report on new accounts created on payment plans.  The report should provide details on total costs to the student as well  as payment information. Each ring financed has a base price that can  fluctuate based on ring personalization.

Start   Excel. Download and open the file named Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx. Grader has automatically added   your last name to the beginning of the filename.

Insert a function in cell B2 to   display the current date from your system.

With cell B2 selected, set the   width of column B to AutoFit.

Insert a VLOOKUP function in   cell C5 to display the ring cost for  the first student. The cost of the ring   type should be an exact match.  Use appropriate relative and absolute cell   references.

Copy the formula from cell C5 to   the range C6:C11.

Apply Accounting number format   to the range C5:C11.

Insert an IF function in cell E5 to calculate the total   due. If the  student has chosen to personalize the ring, there is an   additional  charge of 5% located in cell B21 that must be added to the cost of   the  ring; if not, the student only pays the base price. Use appropriate    relative and absolute cell references.

Copy the formula from cell E5 to   the range E6:E11.

Apply Accounting number format   to the range E5:E11.

Insert a function in cell G5 to   calculate the first student’s  monthly payment, using appropriate relative and   absolute cell  references. Ensure the result is a positive number.

Copy the formula from cell G5 to   the range G6:G11.

Apply Accounting number format   to the range G5:G11.

Calculate totals in cells C12,   E12, and G12.

Apply Accounting number format   to the cells C12, E12, and G12.

Set 0.3″ left and right   margins and ensure the page prints on only one page.

Insert a footer with your name   on the left side, the sheet name in the center, and the file name on the   right side.

Save and close Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx.   Exit Excel. Submit the file as directed

Project Management Presentation

 

  1. Project Management Presentation
    Overview
    For this assignment, you will demonstrate your knowledge of the role of project management in information systems and why it is such an important component.
    Imagine you are currently working in an information systems field at a small company in which projects have been typically managed by the senior employee working on them without any real plan or specific direction, and each employee has a very different style of management (or lack thereof). The company has recently considered improving in this area and might even consider hiring a project manager or adopting some kind of software or process for managing the project it takes on. There is obviously a need for change, but not everyone is on board. 
    In an effort to help everyone see the value of project management improvements, you have been asked to create a presentation on why the company might need a more formalized process for project management. You will need to explain what project management really and why it is such a significant part of information systems work. You will also need to make some recommendations on what types of project management strategies the company might want to adopt. 
    Instructions
    Your presentation should include:

    • 10–12 slides. 
    • A title slide (not included in the required number of slides).
    • A reference slide (not included in the required number of slides).
    • Three examples of some of the pitfalls that occur in projects when there is no project management.
    • Three examples of how project management can prevent pitfalls when there is no project management.
    • Three examples of how using project management can benefit the creation of an information system.
    • A detailed list of at least three recommendations for project management tools or strategies the company should adopt and an explanation of why those were chosen.
    • Use the Basic Search: Strayer University Online Library to find at least three academic resources. Note: Wikipedia and similar Websites are not considered quality references.
    • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Explain how project management is used to enhance productivity and optimize an organization’s resources.

Digital Forensics – 10

Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator?

 

Post between 350 and 400 words.

Use your own words

Example video: https://www.youtube.com/watch?v=GlBiuV90Djk

computer architecture jan 14

  1. Question 1 How does parallel processing work in computer architecture? 
  2. Question 2 What does Amdahl’s law state? What is Amdahl’s law and why it is used? 
  3. Question 3 What are the applications of parallel processing in computer architecture? 
  4. Question 4 What are the challenges in parallel processing in computer architecture? 
  5. Question 5 Identify reasons for and consequences of the recent switch from sequential processing to parallel processing among hardware manufacturers. 

IT348 week 8

APA FORMAT & citation & header page number 400 words 

Read chapters 8 & 9 and respond to the following questions:

1) The security of connected devices is paramount to the success of the Internet of Things (IoT). Please discuss the security standards and share some examples? 

2) How does the Platform Security Architecture (PSA) build trust while reducing security costs and time-to-market?

Question

  

(TCO 2) A use case include relationship represents _____. (Points : 2)
how a use can optionally include another use case
an extra functional modeling of the use that is optional
a mandatory inclusion of another use case
how a use case inherits from another use case
None of the above

 

2. (TCO 2) In the “Make Appointment” use case description, it says in the Relationship section: Include: Make Payment Arrangements. What that means is _____.
 

(Points : 2)
“Make Payment Arrangements” is logic in a separate use case that is executed by the “Make Appointment” use case
“Make Payment Arrangements” is logic in the SubFlow section that is executed
“Make Payment Arrangements” is an object of data that is embedded in the “Make Appointment” use case
None of the above

 

3. (TCO 2) The primary actor in a use case description is _____. (Points : 2)
the trigger of the use case, and the trigger type is internal
the trigger of the use case, and the trigger type is external
triggered by the use case, and the trigger type is internal
triggered by the use case, and the trigger type is external

 

4. (TCO 2) If the pseudocode in a use case description says “Execute ABC,” then we can assume that _____. (Points : 2)
“ABC” is another use case being executed
“ABC” is internal logic in the Normal Flow section of the use case description
“ABC” is a heading in the SubFlow section of the use case description
“ABC” is an actor

 

 5. (TCO 2) A use case extend relationship represents _____. (Points : 2)
how the use case extends an actor
an extra functional modeling of the use that is optional
a mandatory functionality of the use case
how a use case inherits from another use case
None of the above
 

Let’s first focus on the Activity Diagram. Discuss the concept of swimlanes, decisions, actions, etc.please send accept button

 

During the Analysis phase, we will create different types models: Functional, Structural and Behavioral.
Why do we create Functional models? How will they help us with design? What diagrams are included in functional modeling? What is the purpose of creating these models? It’s important to be able to create them but it is equally important to know why and how they will help us in the other phases.

 

unit 8 db#1 +2 responses

 

The natural helpful nature of human beings can be used to leverage and attack organizations. The best defense for the insider threat and social engineering attacks are informed employees.

Topic 1: Insider Compromise or Social Engineering

What are some examples of insider compromise or social engineering attacks you have seen on TV or read about in the news? Please use outside research to back up what you say and be sure to cite your sources.

Configuring

 Case Project 9-2: Configuring Preferences page 369
Users in the Engineering Department need a higher level of access on their local computers than other users do. In addition, you want to set power options on mobile computers that Engineering users use. All Engineering Department user and computer accounts are in the Engineering OU.

1.What should you configure to meet the following criteria? 

 

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition,