Cryptography (Please See Attached Rubric)

 

Review the following questions from Network security: Private communication in a public world and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

  1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

  1. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol’s answer to Alice’s challenge?

  1. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties— the good guys and the bad guys— get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. (note: this textbook is a reference for the assignment and not a required resource for learners)

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Essential Concepts Project

 

The purpose of this hands-on project is to give students an opportunity to create a hierarchical folder structure (CLO 1, MLO 1.1) and explain key terms and concepts related to information systems (CLO 7, MLO 1.3). To do this, use the weekly readings, along with the video tutorial, to complete the Essential Concepts Project.

Part 1. Read the following modules in the Technology for Success textbook:

  • Module 3: Computer Hardware (pages CC 3-1 to CC 3-28)
  • Module 4: Operating Systems and File Management (pages CC 4-1 to CC 4-21)
  • Module 5: Software and Apps (pages CC 5-1 to CC 5-33)

Next, create a new Microsoft Word document (.docx). In 2-3 pages, answer the following questions:

  1. What does it mean to live in a “modern information society?”
  2. What types of input and output devices would be ideal for a college student completing his or her coursework?
  3. What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?
  4. Leah Jacobs is starting her own dance studio and wants to create digital media and use productivity software to support her business. She is hiring a graphic artist to create a logo for her business. She wants to use the logo across all visual communications at the company, from business cards to database forms, to websites and social media. What programs and apps should she consider using to run her business?

Part 2. Create a class folder so that you can save files in the proper folders. As an organization scheme, do the following:

  1. Create the folders you need onto the location of your choice. This may be your Documents folder, a flash drive, or the desktop if you are working on a CBU machine. Begin by creating a folder called LastnameFirstname. Inside of the LastnameFirstname folder, create a folder called CIS 265. Inside the CIS 265 folder, create the following folders: Office and Operating System, Word, PowerPoint, Excel, Access, and Outlook, Integrated Capstone Project.

  2. Expand the hierarchical tree so that all the folders are visible (via Windows Explorer).

  3. Press the Prnt Scrn button on your keyboard. This will take a snapshot of the screen and put it in the computer’s clipboard (temporary memory).

  4. Open the document you’ve already created for this Essential Concepts assignment. Press the Paste button or press Ctrl and V. This should paste a picture of the screen onto the last page of the document.
  5. The finished product should consist of a copy of the screenshot showing that you have created the folders.


(IMPORTANT: You should use these folders to save all your work throughout this course.)

Part 3. Attach and submit your completed project (which should be a single Word document with word processing and/or screen shots (in Full Screen Reading view) of all assignment components, labeled and in order) by the assigned due date.

Essential Concepts Project Scoring

Assignment ComponentsPossible
Points

Part 1  

  • Questions 1-4 answered correctly

15 x 4 = 60

Part 2  

  • Includes a LastnameFirstname folder
  • Includes the CIS265 sub-folder
  • Includes all seven (7) application sub-folders
  • Displays all folders in the correct hierarchy

 Below is an outline of what each page of your Essential Concepts Project should look like:

Page 1Essential Concepts ProjectFirst and Last NameCourse TitleCalifornia Baptist University_____________________________________________________

Pages 2-4I n 2-3 pages, answer the questions above._____________________________________________________________

Pages 5-6
Insert or paste screen shots of your class hierarchical folder and organizational scheme.

Coso Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Summary and Chart

 

Assignment Content

  1. Phoenix Fine Electronics would like you to brief them on your system recommendation.

    Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business. Cite at least two sources within your chart. Compare the following information:

    • Elements of the system
    • How the system would support management
    • How the system would create a successful partnership between the business and IT
    • Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at the 12-point font, and single-spaced. 

      Include the following in your summary:

    • An overview of the business needs and desired outcomes
    • The system comparison chart (from above)
    • Your system recommendation
    • The scope of the project
    • References

1 Discussion Case Study And Lab work

Discussion 6.1

Compare and contrast simple random sampling and systematic sampling. List the strengths and weaknesses of each concept.

Discussion ( 150 words Excluding the references)

Case Study 6.1  – Full 3 Pages In length excluding References.

  • Read the following Case Study
    Case 8.3 Delivery Times at Snow Pea Restaurant
  • Write a summary analysis and answer the questions. 

Writing Requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Lab 5

Complete the following problems by Thursday

Chapter 7 

C8 and C9 -PAGE NUMBER 321

Chapter 8 –

Problem #35 – PAGE Number 360

the assignment must be an APA formatted paper with embedded excel files

Lab work Should be in word Documents with clear explanation and References with Excel file screen shots in word document……

Agile W3

 In your opinion, what might be some team responsibilities that are not covered in any of these roles? Could you see yourself becoming a scrum master? Why or why not? 

250-300 words

Managerial Economics D-1

using the link below write the discussion 350 words

Free Markets Didn’t Create the Great Recession

Read the attached opinion piece where the author indicates that the Great Recession of 2009 was not caused by the Free Market, but was instead caused by US Government policies.   

Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology. 

2) 2 replies each 150 words

cloud-com-week-6

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Assignment

 

Assignment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this Cloud Computing course have been applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge and knowledge could be applied to an employment opportunity in your field of study.

Requirements

Provide a 500 word (or 2 pages double spaced) minimum reflection

Use of Proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course and how they will be used at your current or future employer.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.