Intro to CyberSecurity homework

 

1. (a)  In an environment in which several users share access to a single  database, can one user ever block another’s access for an unlimited  period of time? (This situation is called indefinite postponement.) (b)  Describe a scenario in which two users could cause the indefinite  postponement of each other. (c) Describe a scenario in which a single  user could cause the indefinite postponement of all users.

2. Using  the two-step commit presented in the beginning of this chapter,  describe how to avoid assigning one seat to two people, as in the  airline example. That is, list precisely which steps the database  manager should follow in assigning passengers to seats.

3. Suppose  a database manager were to allow nesting of one transaction inside  another. That is, after having updated part of one record, the DBMS  would allow you to select another record, update it, and then perform  further updates on the first record. What effect would nesting have on  the integrity of a database? Suggest a mechanism by which nesting could  be allowed.

4. Can a database contain two identical records without a negative effect on the integrity of the database? Why or why not?

5. Some  operating systems perform buffered I/O. In this scheme, an output  request is accepted from a user and the user is informed of the normal  I/O completion. However, the actual physical write operation is  performed later, at a time convenient to the operating system. Discuss  the effect of buffered I/O on integrity in a DBMS.

6. A  database transaction implements the command “set STATUS to ‘CURRENT’ in  all records where BALANCE-OWED = 0.” (a) Describe how that transaction  would be performed with the two-step commit described in this chapter.  (b) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS)  and (CUSTOMER-ID,BALANCE-OWED). How would the transaction be performed?  (c) Suppose the relations from which that command was formed are  (CUSTOMER-ID,STATUS), (CREDIT-ID,CUSTOMER-ID), (CREDIT-ID,  BALANCE-OWED). How would the transaction be performed?

7. Show  that if longitudinal parity is used as an error detection code, values  in a database can still be modified without detection. (Longitudinal  parity is computed for the nth  bit of each byte; that is, one parity bit is computed and retained for  all bits in the 0th position, another parity bit for all bits in the 1st  position, etc.)

8. Suppose query Q1 obtains the median ml of a set S1 of values, and query Q2 obtains the median m2 of a subset S2 of S1. If m1 < m2, what can be inferred about S1, S2, and the elements of S1 not in S2?

9. One  approach suggested to ensure privacy is the small result rejection, in  which the system rejects (returns no result from) any query, the result  of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records.

10. Cite a situation in which the sensitivity of an aggregate is greater than that of its constituent values. Cite a situation in which the sensitivity of an aggregate is less than that of its constituent values. 

WK 5 Rough Draft

 

Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as a business field that would benefit from technical writing.

1) 10 pages (double-spaced).

2) Choose any technical topic to write your report about.

3) Identify the purpose and audience of your report.

4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).

5) In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!

6) Use your approved topic.

7) Use your approved outline.

8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

9) Arial 11 or 12-point font or Times New Roman styles.

10) Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations

11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!

I attached an outline of what to write about.

forming effective searching

Directions

As outlined in the lecture, there are various types of strategies and tools that students can use to develop search phrases to find exactly what they need without mining through hundreds of results.

In this assignment, you will develop a search phrase to best locate the information posed in the prompt. Then, using at least 50 words for each search scenario, explain why you picked this approach. Finally, perform the search in question and evaluate the results. In at least 50 words, explain if your search results were what you expected and why or why not this was the case.

Example: You want to find information on the President Teddy Roosevelt.

Search Phrase developed: “Teddy Roosevelt” president

Strategy: I chose this strategy because using quotation marks around the name Teddy Roosevelt will ensure that both pieces of the name are searched for together. When quotation marks aren’t used, results showing the first name and the second name will all show up, which will populate many results unrelated to Teddy Roosevelt such as Franklin D. Roosevelt.

Search Results:

Wikipedia:https://en.wikipedia.org/wiki/Theodore_Roosevelt#:~:text=Theodore%20Roosevelt%20Jr.%20(%2F%CB%88,States%20from%201901%20to%201909.

History: https://www.history.com/topics/us-presidents/theodore-roosevelt

History: https://www.history.com/news/teddy-roosevelt-legacies

Analysis: Yes, these search results were what I expected to see based on my search. The results reflected my usage of the quotation marks as sites that discussed Teddy Roosevelt’s role as president were returned first. All of the sites included both Teddy Roosevelt’s name as well as the word president.

1, You want to find information on Buffalo, NY but not anything related to the Buffalo Bills football team.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

2, You want to find information on recipes for stuffed peppers that do not include rice.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

3, You want to find videos about astronomy only on YouTube.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

4, You want to combine the search for both woodworking and welding.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 25 words.

5. You want to find information related only to gestational diabetes.

⦁ Develop and document a search phrase that you would use in a search engine to find this information.

⦁ Explain why you chose this strategy using at least 50 words.

⦁ After performing the search yourself, document the first 2-3 result entries that were returned. Analyze if the search results were what you expected using at least 50 words.

Analysis of Algorithms

 1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).

 b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course). 

2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for

 a. lists represented as arrays.

 b. lists represented as linked lists.

 3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop

 b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue 

Termpaper on Rockwell Automation – Factory Talk (SCADA)

 

Term Paper Requirements

REQUIREMENTS AND GRADING

Each student will be required to write their own research paper – no teaming, partnering, or study group papers are permitted. This is an individual assignment and copying or plagiarizing will not be tolerated and will be subject to University disciplinary action up to and including a failing grade for this course. 

The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. 

The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

A template has been provided meeting these requirements.

A list of 11 different vendors and systems have been offered. Selection begins on October 6, 2020 (Week 7) and is expected to be completed by November 17, 2020 (Week 13). You are free to change your selection until the cut-off date. No more than three (3) students can choose the same vendor and system topic, so all selections may not be available at any given time. Failure to complete the selection process early could reduce the number of choices available and not provide sufficient time to complete the term paper and associated presentation.

You will also be required to prepare a short PowerPoint presentation summarizing your paper suitable for presentation. This presentation is expected to have no more than one (1) slide summarizing each of the subject areas aligning with the paper and should be limited to 15 minutes. A PowerPoint template has been prepared and is available for download.

Your paper must be submitted by 7:00pm (end of class) on Tuesday, November 24, 2020 (Week 14), and your presentation must be submitted by 8:00am on Tuesday, December 1, 2020 (Week 15). Eight (8) students will be randomly selected to present their presentation via Zoom Meeting during class time on Tuesday, December 1, 2020. Drawing will occur on December 1, and students will be notified by 10:00am.

The term research paper and associated presentation comprise 20% of your overall course grade and will be assigned a numerical percentage grade based on the following scale:

     A = 90% – 100%
     B = 80% – 89%
     C = 70% – 79%
     D = 60% – 69%
     F = 59% or less

Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis
     20% = Organization
     20% = Development and Support
     10% = Style
     20% = Mechanics
     10% = Presentation

Spelling and grammatical correctness will be used as marking against Mechanics. Use of current review editors such as those included with Microsoft Word are strongly encouraged.

 

CONTENTS AND STRUCTURE

The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the following areas. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure. The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Homework

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project-new

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Cyber security Research paper

  

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

Discussion question CIS

Want to know what movies are showing? Need to find a new place to eat? Kids need help with a school project? Have to fix that leaky faucet yourself? With the internet, the answer is just one click away…ok, maybe two or three clicks (or swipes), but it’s there. The internet has made it far easier to solve problems of all types, big and small.

What types of problems has the internet helped YOU solve? Choose one of the topics below. Then, identify a problem you faced and explain how you were able to solve it using resources available on the internet.

  1. Personal Development and Improvement
  2. Do-It-Yourself
  3. Entertainment or Travel
  4. Workplace or Job Hunting

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.