Discussion

Write at least 500 words analyzing a subject you find in this  article (https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf) related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

ETCM-Research-5

Need this research paper by Thursday USA time. (5 days from now).

5 pages without references and Title page. Follow APA 7 format and citations.

Topic:

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

week 9 assignment data mining

For this assignment, you need to research the following question and write at least 2 paragraphs with references. (you do not have to follow APA, but it is recommended)

-How do search engines (you can take google as case study), utilize clustering? 

-Why?

-Which type of clustering?

Please write your answers to word document and submit it here as a word document or PDF. 

Artificial Neural Network

Define and explain Artificial Neural Network. Explain how Artificial Neurons decide whether to activate synapses and how to evaluate the performance of the final model.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

json and ajax

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words.

Analyze Current Security Products and Services

Searching for Vendor Information (without getting a ton of sales calls)

It is often helpful to research a Vendor and their products before contacting the company, (when you contact the company, you often are inundated by sales calls). The assignment is to gather information on a provider of security/privacy products and write a short recommendation document. Include in your report:

  • types of services this vendor provides
  • facts about this company that would lead to their reliability as a provider
  • how they compare to other similar vendors (you will need to look at a few companies to gather this information).

One very useful publication is ICD Research Reports. This is found using the library technology databases. (PDF ATTACHED TO QUESTION)

Complete a three to four-page report with APA cited references to support your work.

bi-4

1. Define data mining. Why are there many names and definitions for data mining?

2. What are the main reasons for the recent popularity of data mining?

3. Discuss what an organization should consider before making a decision to purchase data mining software.

4. Distinguish data mining from other analytical tools and techniques.

5. Discuss the main data mining methods. What are the fundamental differences among them?

6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling

Emerging Information Tech

 

This week I would like you to write a 4-page reflective paper on what you have learned so far in this course and how you will be able to apply the lessons learned.

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?