Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

Research Paper 5

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Security Architect and Design: Individual Assignment

Length:   Minimum of 700 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Information Security Framework

 

  • the contents of the security framework, which should include at least 12 control identifiers (ID) with family notation of your choice and should include whether the control identifier is of low risk, moderate risk, or high risk impact;
  • a gap analysis including a minimum of three controls for ID
  •  Your security framework must be at least one page in length 

Discussion and Case study

Discussion 5.1

What are decision trees used for in a business setting? Why are they popular? Provide examples.

Case Study 5.1

  • Read the Case Study:  Case 6.2 West Houser Paper Company (page # 289) from text book
  • Write a summary analysis and determine if they used the correct tools to conduct the analysis. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Provide reference list and citations.
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment..

The assignment must be an APA formatted paper with embedded excel files

Data Analysis

https://lionbridge.ai/datasets/10-open-datasets-for-linear-regression/
– https://careerfoundry.com/en/blog/data-analytics/where-to-find-free-datasets/
OR ANY REPUTABLE SOURCE OF DATA.
Write a 2 page (minimum) paper.  In the paper, define the problem that you are analyzing.  What is the question that you want to be answered from the data?  What is your hypothesis?
25%:  Analysis of the dataset (explain the data and also perform a statistical analysis).  Speak to which features you kept and why. 
25%: Use the techniques learned in this class and discover at least 1 “AHA” in the data.  By that, I mean that I expect you to discover a relationship between two variables or an INSIGHT into the data.  Explain your findings.
25%: Define which visualization(s) you choose to use and why you chose them.  I expect the visualizations to be professional and readable by themselves without references to anything else.  (I am not going to be looking through your data to try to understand your visual).  Attach your visuals to the end of the document.  Create a Tableau Story that combines your visuals and provide the link to it in the document.
15%: Summarize your work from a social or business perspective.  Why is this important?  How could this insight be used to make a difference?
CITE YOUR SOURCES and add them to the end of your paper.  (I recommend citefast.com.  You can cite all of your sources there and export to word and just add it to the end of your paper.)
In summary – you will turn in:
A 2-page Analysis
A page (or 2) of Visualizations
A list of your sources/references

cloud computing Final Project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

Discussion post required on access control

Discussion post required on access control

Initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.