Sum-Wk-3

Assignment 1

After reading chapter 4 (attached) – 

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 2 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Sources: Use a minimum of three scholarly articles to complete the assignment.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Incident Response Plan

 

Review and analysis the provided Incident Response Plan in comparison to what you have read in the Incident Response Planning section of this week’s reading.

Prepare a 350- to 1,050-word paper that fully discusses the topic questions

Format your paper consistent with APA guidelines. Format your paper consistent with APA guidelines.

Exp19_Access_Ch02_ML1 – Game Collection 1.2

 

Exp19_Access_Ch02_ML1 – Game Collection 1.2

 

Project Description:

You have cataloged your vintage video games in an Access database. In  this project, you add two tables to a database you have started? One to  identify the game system that runs your game and the other to identify  the category or genre of the game. Then you will join each table in a  relationship so that you can query the database.

Start Access. Open the downloaded   Access file named Exp19_Access_Ch02_ML1_Games.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Open   the Games table and review the fields containing the game information. Close   the table.
 

  Create a new table in Design view. Add the field name SystemID and select AutoNumber as the Data Type. Add the caption System ID. Set the SystemID field as the primary   key for the table.

Add   a second field named SystemName   with the Short Text Data Type.   Change the SystemName field size property to 15.   Add the caption System Name.   Save the table as System.

Switch   to Datasheet view and enter the following system names, letting Access assign   the System ID:
 

XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
 

  Double-click the border to the   right of the System Name column to set the column width to Best Fit. Save and   close the table.

Create   a new table in Design view. Add the field name CategoryID   and select AutoNumber as the Data   Type. Add the caption Category ID.   Set the CategoryID field as the   Primary Key for the table.

Add   a second field named CategoryDescription   and accept Short Text as the Data   Type. Change the field size property to 25.   Add the caption Category Description.   Save the table as Category.

Switch   to Datasheet view, and enter the following Category Description, letting   Access assign the Category ID:
 

Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
 

  Close the table.

Establish   relationships in the database by adding the Category, Games and System  tables to the Relationships   window. Close the Show Table dialog box.  Create a one-to-many relationship   between the SystemID field in the  System table and the SystemID field in the   Games table, enforcing  Referential Integrity. Select the option to cascade   update the related  fields.

Create   a one-to-many relationship between the CategoryID field in  the Category table   and the CategoryID field in the Games table,  enforcing Referential Integrity.   Select the option to cascade update  the related fields. Save and close the   Relationships window.

Create   a simple query using the Query Wizard. From the Games table, add the GameName and Rating fields (in that order). Save the query using the title Ratings. Switch to Design view. Sort the   Rating field in ascending order.

Click   the gray column selector at the   top of the Rating field, then click and drag the column to move it to the first position of the query design grid.   Add a Total row, click in the Totalrow   of the GameName column, click the arrow,   and then select Count.  The records   will be grouped by rating, and the number of games will  be counted for each   group. Run, save, and close the query.

Create   a new query in Design view. Add the Category,   Games, and System tables to the query design window. Add the following   fields to the query (in this order).
 

GameName

CategoryDescription
   Rating
   SystemName
   DateAcquired

Sort   the query in ascending order by GameName and run the query. Save the query as   Game List and close the query.

Copy   the Game List query in the   Navigation pane and paste it with the name PS3 Games.   Modify the query in Design view by using PS3    as the criteria for SystemName. Remove the sort by GameName and sort  in   ascending order by CategoryDescription. Save and run the query.  Close the query.

Create   a new query in Design view. Add the Category,   Games, and System  tables to   the query design window. Add fields (in this order) to  display the name of   the game, its rating, the category description of  the game, and the system   name. You only want to display Wii games with  a rating of Everyone or Teen.    Because the system name is the same for the games you plan to pack and  share,   hide this value from the results. Save the query as Thanksgiving Games and run the query. Close the query.

SECURE INTERNET OF THINGS TOPIC Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03 Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the

  •                                                 References
  • Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03
  • Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the secure use of dynamic identity for the internet of things—Using the secure remote update protocol (SRUP). Future Internet, 12(8), 138. https://doi.org/10.3390/fi12080138
  • Prasad, G. S., Lal Chhagan, Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., & Kose, U. (2020). Reliable and secure data transfer in IoT networks. Wireless Networks, 26(8), 5689-5702.https://doi.org/10.1007/s11276-019-02036-0 

git, GitHub and version control

  

Version Control Using Git and GitHub

Discuss using appropriate commands for the following 

1. Getting started on GitHub 

2. Configuring Git 

3.  Creating a Git repository 

4. Creating and editing files 

5.  Adding files to your Git repository 

6. Finding out what’s happening 

7.  Making changes and tracking them 

8.  Synchronizing your local Git repository with GitHub 

9.  Deleting and renaming files

10.  Undoing changes 

11. Before you commit

12. After you commit

13. Being more selective 

14.  Retrieving an old version 

15.  Branching 13

16.  Checking differences between branches 

17.  Merging branches 

18.  Deleting branches 

19. Managing multiple copies of a repository 

20.  Dealing with simple conflicts (give examples)

21.  Dealing with more complex conflicts (give examples)

Instructions:

Commands should be formatted as a picture that is, include your own picture codes/command.

Please use attached documents or link as guide and do not plagiarize

LINKS:

http://www.bioinf.org.uk/teaching/splats/git.pdf

https://www.cdslab.org/MAPCP2019U/homework/1-version-control-using-git-github

Impact analysis- Prevention and Response strategies

  

Impact Analysis Part 3: Prevention and Response Strategies

Prior to or when security measures fail, it is essential to have in place several response strategies. In 1,250-1,500 words:

1. Explain how negotiations with accreditors on compliance should be dealt with. Provide an example.

2. Present appropriate response strategies that can be put into action (i.e., breach notification policies).

3. Present employee training recommendations for creating awareness of the organization’s security measurements.

4. Explain how to obtain feedback on the effectiveness of security policies from stakeholders. Provide an example.

5. Explain how to identify new threats, vulnerabilities, or any countermeasures that may not have been present/available when the initial security measures were first implemented. What mechanisms could be in place to catch any oversights? Explain how this would be reported/communicated. Example, an IT professional explains why a specific device is configured, why if it is compliant it will NOT work, or why if it is NOT compliant it does work.

6. Explain how operational managers, stakeholders, and/or individuals affected will be notified. Provide examples for each.

7. Identify organization management techniques to respond quickly to new challenges. Explain with supporting details.

Testing Framework and Basic Security Controls

THE DETAILS OF THIS ASSIGNMENT ARE IN THE ATTACHED FILE.

Develop a testing framework with these phases as guidelines for your organization or an organization you would like to work for in the future. 

• Before development begins 

• During definition and design 

• During development 

• During deployment 

• Maintenance and operations

You will need to fill in the details for each phase by 

1) describing what each phase encompasses and 

2) 3 or more activities you will engage in for each phase. 

In addition, you will apply part of this framework in the phase “During development” by engaging in three tests/security controls.

 1. Fingerprint Web Server (OTG-INFO-002)

 2. Review webpage comments and metadata for information leakage (OTG-INFO-005). Manually review the sample HTML/PHP application provided in the zip file attached in this project.  

 3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the sample website. 

Deliverables: You should submit your source testing framework document along with the results testing the three security controls listed above. Your document should be well-organized, well-written using paragraph style that includes page numbers, includes all references used and contains minimal spelling and grammar errors. 

Computer Science – use of social media

 

  • Analyze how social media provides a competitive advantage for an organization’s Web strategy, given that many companies have started hiring personnel to handle Facebook and Twitter posts. Explain why a robust Web presence matters to company executives.
  • Imagine that you are the CIO of a well-established company. State three compelling reasons why your company should utilize social media to attain a competitive advantage and explain your answer.

Exp19_Access_Ch05_CapAssessment – Paterson Credit Union 1.1

Exp19_Access_Ch05_CapAssessment – Paterson Credit Union 1.1

Exp19 Access Ch05 CapAssessment Paterson Credit Union 1.1

Access Chapter 5 Capstone Assessment – Paterson Credit Union

  

Project Description:

You work as a database administrator at the Paterson Credit Union. You are modifying a database to add validation, lookup fields, and an input mask. You will also modify queries to take advantage of advanced functions and features.

     

Start   Access. Open the file named Exp19_Access_Ch05_CapAssessment_Paterson_Credit_Union.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

You   want to make sure that the customer account types are documented and stored   correctly. To do this you will create a table that will list each account   type.
 

  Use Design view to create a new table. Add AccountType   as the first field name, with data type Short Text and field size 10. Ensure AccountType is set as the   primary key. Save the table and name it AccountTypes.   Add three records: Platinum,   Silver, and Gold.   Save and close the table.

 

Now,   you wish to ensure that, when customers are added to your database, the phone   number and account type must be entered. To do this you will set the   PhoneNumber and AccountType fields as required fields.
 

  Open the Customers table in Design view. Set the PhoneNumber and AccountType   fields to Required. Save and close the table.

 

Paterson   Credit Union only offers loans with interest rates between 2.0% and 10.25%.   To ensure that no loans are offered outside of those constraints you will add   a validation rule that will not allow loans outside of that range to the   InterestRate field in the Loans table.
 

  Open the Loans table in Design view. Establish a validation rule for the   InterestRate field that requires the value to be greater than or equal to 2.0 but less than or equal to 10.25. Create validation text for the   InterestRate: Value must be between 2   and 10.25   (no period). Save the table and switch to Datasheet view. Change the   InterestRate in the first record to 1.9.   The validation text appears. Press ESC to restore the original value. Close   the Loans table.

 

You’ve   made the PhoneNumber field required in the Customers table, but now you want   to ensure that phone numbers are entered in a specific format. To do this you   will add an input mask to the PhoneNumber field in the Customers table.
 

  Open the Customers table in Design view. Add a phone number input mask for   the PhoneNumber field, storing the symbols with the data.

 

You   would like to easily add the account type for each customer without typing   anything on your keyboard. To do this you will turn the AccountType field   into a Lookup Wizard using the AccountTypes table, that you recently created,   as the source.
 

  Change the Data Type of the AccountType field to Lookup Wizard. Use the   AccountTypes table for the values in the lookup field, select the AccountType   field from the table, accept the default sort, accept default column widths,   and then accept the default name AccountType.   Save the table. Switch to Datasheet view.

 

Change   the account type to Platinum in the   first record. Close the table.

 

For   ease of use, you would like for users to be able to indicate the minimum loan   amount on which they would like to pull loan information. You will do this by   adding a parameter criterion to the LoanAmount field in the Customer Loans   Parameter query.
 

  Open the Customer Loans Parameter query in Design view. Add criteria for the   Amount field. The user should be prompted to Enter Minimum   Loan Amount (no period). The query should display   all records that have a loan Amount that is greater than or equal to the   value entered as the parameter. Run the query. Enter 250000 when prompted to Enter Minimum Loan   Amount. You should have five results. Ensure that the query results display a   total at the bottom of the Date column, and an average at the bottom of the   Amount column. Save and close the query.

 

You   have noticed that a few of your customers are missing address information. You   would like to address this by creating a query that returns only the   customers that are missing addresses so that you can update that information.   You will complete this by adding a field that indicates whether an address is   missing then adding criteria to that field so that only customers with   missing addresses are returned.
 

  Open the Missing Addresses query in Design view. Add a new column to   determine if a customer does not have an address on file. If the customer’s   Address is null, it should display Missing.   If not, it should display nothing. Name the column AddressPresent. Add criteria of Missing to the column you just created, so   only the customers missing an address display. Move the AddressPresent field   so it appears between PhoneNumber and Address. Run the query. Ensure only   customers with null Address fields display. Save and close the query.

 

For   simplicity, you are now interested in rounding the interest rates for each   loan to the nearest whole number. To do so, you will utilize the Round   function in the Loans by Interest Rate query.
 

  Open the Loans By Interest Rate query in Design view. Create a new column to   round the InterestRate of each Loan to the nearest whole number. Name the   field RoundedRate. Run the query and verify the RoundedRate   column displays whole numbers. Save and close the query.

 

Seeing   what the total and average payments month over month are is important to your   operation. To display this information, you will use the DatePart function to   extract the month from the PaymentDate field then ensure that the query is   grouped by month.
 

  Open the Payment By Month query in Design view. Change the first column so   that instead of grouping by the payment date, you group by the month. Use the   DatePart function to extract the month from the date. Name the column MonthNumber. Group by the MonthNumber field and   display the Sum of the first Total field and the Average of the Average   field. Run the query. The first line should read 2 (as the month,   representing February), with a total of $5,246.51 as the total payments   received and $1,311.63 as the average payment amount. Ensure that the query   results display a total at the bottom of the Total column, and an average at   the bottom of the Average column. Save and close the query.

 

Finally,   you would like to classify the various loans as either high or low priority   for the Credit Union. To do this you will add a column that determines   whether the interest rate for a loan is greater than or equal to 7.9%, as   that is what is considered high priority.
 

  Open the Refinance Candidates query in Design view. This query displays all   adjustable loans in the database. Create a new column to display High Priority for all loans that have an   InterestRate of 7.9% or more, and Low Priority   otherwise. Name the field Priority.   Run the query. Notice customers with the highest interest rate values show a   higher priority. Save and close the query.

 

Save   the database. Close the database, and then exit Access. Submit the database   as directed.