Final project

 

Each student will prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

Additional details on project deliverables will be presented next week.

Each student will be asked to pick a unique topic of their own choosing. Topics might include processes related to secure web technologies or a review of a specific web related cyber attack.

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.Here is a list of your upcoming project deliverables:

  • Week 11. Submit final project.
  • Week 12. Submit a brief abstract describing your final project.

Week 13. Submit final project materials.

  • 500-700 word, double spaced, written in APA format, showing sources and a bibliography

System/Software Development Life Cycle (SDLC) model and methodology Review System/Software Development Life Cycle (SDLC) model and methodology then show how this model can be use in web design. Be sure to define the SDLC model and methodology and identif

 System/Software Development Life Cycle (SDLC) model and methodology

Review System/Software Development Life Cycle (SDLC) model and methodology then show how this model can be use in web design. Be sure to define the SDLC model and methodology and identify which SDLC step is associated with each project component.

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool.

2 review articles – High priority

2 Tasks:

Task details:

– 3 pages each document. [EXCLUDING reference page and title page]

– You will review both quantitative and qualitative research. 

– Please use APA formatting and include the following information:

– Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? 

– Were there weaknesses in prior research that led the author to the current hypothesis or research question?

– Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?

– Study Findings and Results: What were the major findings from the study? Were there any limitations?

– Conclusions: Evaluate the article in terms of significance, research methods, readability, and the implications of the results. Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large portion of weightage covered.)

– References -The sample journals attached (2) and any other as per the paper.

NOTE: Please find the two attachments for sample peer-reviewed journals. We will need to review the 2 papers one is qualitative and the other is quantitative.

Write a program that performs

Write a program that performs the brute-force attack to break the password. The following

table shows encrypted passwords using the crypt() function. Your mission is to break the

password ***** your CWID in the table. For example, the last digit of your CWID

is 1, then you should identify the password ***** indBOW06MoVz6.

Last digit of CWID Encrypted password

1 – indBOW06MoVz6

2 – in79RsnfG/VWo

3 – inbqJM0dLgWvo

4 – incT1ji3YqQ/Y

5 – in7haMV00ylgk

6 – in1U0tb9WpIcI

7 – inPlXS.yNKivQ

8 – inqidvfWapJp2

9 – injY7hdQJTeu2

0 – inQW.HgtuEe.M

Crypt() is a function to check UNIX/LINUX passwords, and the encrypted passwords

above are encoded by the standard crypt() function. Hence, you should use the crypt()

function to break the password. The crypt() function takes two input parameters and

returns the encrypted password, as follows:

Input parameters:

• Password (plaintext): string

• Salt: string

Output:

• Encrypted password: stringThe password ***** is six and the salt is set to ‘infosec’ (without using the quotation

mark). For the brute-force attack, you should try 6-character lower case letters of alphabet

from ‘aaaaaa’, ‘aaaaab’, ‘aaaaac’, …, to ‘zzzzzz’, with the salt. Report the original plaintext

password ***** breaking the encrypted password (one based on your CWID). Also report

how many words you tested to find the original password.

C-Programming

One question and Answer 

And Five C-programming coding questions

Follow the docs file attached below

vpython programming

I have the code already developed. Can anyone add the code for taking inputs from user 

for any values in the code . 

Also, Can you please describe about the code written in details (You can add comments )

This is using vpython and numpy only.

OS Process Managemnt

 

Based on the study materials in Module 2, write a report to address the following questions: 

  1. Define what a process is.
  2. Discuss the relationship between a process and a thread. 
  3. Explain the benefits of multithreading.
  4. Describe in detail the purpose of a process control block (PCB).
  5. Use examples to compare the advantages and disadvantages of multithreading and the single-threaded solution.

REFERENCES:

Please use 2-3 different references

Assignment Expectations

Using information from the modular background readings and any good  quality resource you can find, write a 3-page (excluding the title page  and reference pages), single-spaced report to address questions in this  assignment. 

The following items will be assessed in particular:

  1. Your ability to address all questions based on reading materials and your own research.
  2. Your ability to write a report clearly and succinctly.
  3. Effective and appropriate use of in-text citations to the assigned  readings and other source material to support your arguments. Refer to  the Trident Online Writing Lab at https://mytlc.trident.edu/files/Trident_APA_basics.pdf 

IT Project Management

Based on the case study discussed in class, write a short paragraph on which aspect of the case study & the corresponding IT Project Management practice you feel is the most important and why.

What is Public Const Epsilon

  

What is Public Const Epsilon = 0.0000000005 in constants.vb module?

 

(1) What is this function used for?

Public Function IsZero(x As Double) As Boolean

Return Math.Abs(x) < Zero

End Function

 

(2) Whis is this function used for?

Public Function ChainRule(ByVal f As Evaluable, ByVal g As Evaluable) As Evaluable

Return New Operation(Op.Times,f,g.Derivative).Simplify

End Function

 

(3) What does an underscore prefix mean?

What is public function compareto really do? (in DataPoint class)?

 

What does mustoverride stand for? What is different between override and mustoverride?

 

(4) What does enum stand for?

In statement “MyEvaluable = eva.Clone”, what does the clone attribute mean?

 

In statement “MyEvaluable.Simplify, what simplify stands for throughout the program?

 

What does the GraphingData routine do?

 

Is the entire Operation and ValueObject used by expressions specified in general expression screen?