2-1 Discussion: Intellectual Property and Copyright

 After reading about intellectual property this week, create an original post in which you discuss the following: Why do we care about intellectual property? How successful have our attempts to protect intellectual property been? Have all countries defined and protected intellectual property the same way?

Finally, in responding to your peers’ posts, reflect on the impact that copyright infringement has had on information technology by referencing a recent story in the news that is an example of this impact. 

Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

Physical Security: Door and Window Lock Assessment

 Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

PHP,HTML,CSS,SQL

 Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages or however you want to handle it that will allow you to do various queries of your database. You should be able to retrieve and insert data. For extra credit, include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project.
Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database.
The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.
If you have not yet created a home page, create a home page that contains links to each of the web pages you create to access your database. On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database. Some appropriate picture or image should be on the home page that relates to you project. Make your project look as professional as possible. You may want to show it during a interview. 

Assignment

 Discussion #1: What is Big Data? Why is it important? Where does Big Data come from? 

Discussion #3: What is Big Data analytics? How does it differ from regular analytics? 

Buffer overflow assignment

Exploit the vulnerable program (vulnerable.c) to obtain a shell. The vulnerable program and sample exploit (you need to edit the exploit to make it work) are in the Assignments folder which in turn is in the Documents folder in the TritonApps lab environment. Provide commands and the screenshots of the outputs to illustrate your exploit. [10 pts]

Answer the following questions related to the exploit:

a. Which function and statement in the program is the major cause of the vulnerability? Why? [10 pts]

b. What address are you using to overwrite the return address? How did you obtain this address? [10 pts]

c. Draw a figure of the overflow string that leads to a successful buffer overflow attack and a shell. The figure should highlight the important addresses and contents. [10 pts]

d. What offset worked for your exploit? How did you find the offset? [10 pts]

agile Wk3

 In your opinion, what might be some team responsibilities that are not covered in any of these roles? Could you see yourself becoming a scrum master? Why or why not? 

250-300 words