Articles

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What are the key issues with interacting and using a computer for people who are visually impaired?
  • What input and output devices are specifically created to help the visually impaired use a computer?
  • What would be the privacy concerns of visually impaired learners and how is their privacy managed?

Python,R

Write R code to load the following data.

To download the data.

Submit the screenshot and codes in MS word

Case Study Luxor Technologies

 Read the Case Study Luxor Technologies, Inc. beginning on page 462 of Case Studies.pdf download.  Answer the questions on page 465.  Use a Word or PDF document as submission.  Format should be 12 pt font, double spaced.  There is no word length requirement, but thorough responses are expected. 

cloud

Use only 50-words max per topic to discuss and present your answer.   

The discussion questions this week are from Chapter 11 (Jamsa, 2013).You are required to use at least two-peer reviewed sources (besides your textbook) to answer the questions.

  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Discuss what it means for a web service to be interoperable.

Dictionary Attacks

 

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

Discussioon 250 words

 Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it. 

system administrator duties

 

The system administrator duties including the monitoring the systems to ensure the secure, reliable, and authorized access.

Security methods can include:

  • Application hardware such as firewalls, proxy servers and DMZ
  • Protection methods such as intrusion detection and prevention systems
  • Honeypots and decoy-based intrusion-detection technology
  • Auditing, network monitoring, and packet analysis software such as Wireshark, SNMP
  • Account access control management

 Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that:

1. Give an example of an application hardware, describes the use for protection with the pros and cons. Outline the type of risks you would be addressing with this protection.

2. Select an example of an intrusion detection and prevention system. Give a description outlining the pros and cons. What risks would this provide protection?

3. Detail the use of auditing and network monitoring and what should be observed for securing the infrastructure.

4. Discuss account management and access control.

5. What role do security policies provide the organization?

6. What should be included in an incident response plan?

Cloud Cost Analysis

The analysis is for your client, a federal government agency, as part of its Microsoft Azure cloud pilot. The Cloud Cost Analysis is the second of a two-part assignment for your client’s CIO. Using the Azure Pricing Calculator, you will calculate the annual cost to establish a cloud system. 

The Cloud Cost Analysis will include three deliverables: 

Deliverable 1 will include a share link to calculations displaying the steps you took to calculate the annual cost using the free Azure pricing calculator tool. 

Deliverable 2 will be two spreadsheets showing the cost for a pay-as-you-go option and a one-year option payment. 

Deliverable 3 will be a two-paragraph memo which compares the two and provides your recommendation. 

Project 2: Cloud Cost Analysis Instructions

If you haven’t already done so last week, download the Project 2 Template and use it to record your work.  

IBM Databases (IBM DB2, Informix, Netezza etc)

Topic – IBM Databases (IBM DB2, Informix, Netezza etc)

QUESTIONS

  1. What are the key database products made by the vendor OR the key database platforms available under the database category? (Describe functionality and technical highlights)
  2. If a vendor, who are the competitors to the platform? If a database technology class, who is the clear leader and why?
  3. What are the key features for each of these database platforms that make them unique?
  4. Provide three (3) business uses for why a customer/client would want to use your vendors/class of database technology in their environment.
  5. What are key technical skills a data administrator or database administrator would require if they use this platform?

15-20 Page Paper!