EH FP

 

In 750 words

What is the Internet of Things (IoT) and how can we secure it? What are the Challenges?  

Address the below points
1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Constraint satisfaction problem

## Problem 2 – CSP

Consider the following constraint satisfaction problem. A linear graph has nodes of the following colors:

– Red

– Yellow

– Green

– Blue

– Violet

Each node has a domain of {1, 2, …, 9}.

Each node type has the following constraints on its value:

– Red – No contraints

– Yellow – equals the rightmost digit of of the product of all its neighbors

– Green – equals the rightmost digit of the sum of all its neighbors 

– Blue – equals the leftmost digit of the sum of all its neighbors

– Violet – equals the leftmost digit of the product of all of its neighbors

As a reminder here is the pseudo code for the Min-Conflicts search algorithm:

![minconflicts](https://images2017.cnblogs.com/blog/1126979/201712/1126979-20171224140802287-1871895433.png)

**Notes:**

– It’s possible that you won’t converge to a solution in a single run. Try a few runs to see if you get to a solution.

– The example is to show you what a problem looks like, we will test/grade your program on different examples

Complete the function *solve_csp* defined below. You may find some helper functions useful.

short answer

 

Please respond to the following:

  • There’s no real prominent certification in the programming industry that says to an employer that you have programming skills. What are some tips you have for your classmates on how you plan to showcase what you have learned as a programmer? How do you plan to document your education and experience to look valuable to a potential employer?

policy

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Discussion

 

  • As WLANs become more powerful, what are the implications for networks of the future? 
  • Will wired LANS still be common or will we eliminate wired offices?

Discussion week1

Answer the following questions related to the reading assignment for the week:

1) In your own words, describe the process of “validation” (per the text).

2) What are the concerns of evidence contamination? How can you protect against this issue?

3) What consent to search requirements would you have if you were asked to provide support in an investigation of a device? Please response with whatever would be ncessary.

Your response to the DQ must be a a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Blockchain

In chapter 7, the author briefly discusses how to deploy a smart contract. You’re using Ganache in your labs, but you’ll learn in future chapters about public test blockchains and production (live) blockchains. Once you deploy a smart contract, that smart contract code is stored on the blockchain forever (remember immutability?) Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?