In 250 words
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method
In 250 words
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method
Microprocessor Operatng systems
q1) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years?
q2) Will offices as we think of them today exist in the next ten years? Why or why not?
note:1. the whole discussion should be Minimum 250-300 words.
2. Use at least one scholarly article.
Need In APA Format 7 Without Plagiarism
Discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.
At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that
1. Users are authenticated with password-based method
a. discuss the method,
b. how to technically implement it,
c. advantages and limitation,
d. Include any sources you are using to answer including websites, books, and papers from conference and journals.
2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification–
a. discuss the potential method,
b. how to technically implement it,
c. advantages and limitation,
d. Include any sources you are using to answer including websites, books, and papers from conference and journals.
3. Compare both password and biometric based method in terms of advantages and disadvantages.
Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.
If you are not familiar with measuring execution time in Python, see the following website:
https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
Instructions: Answer all questions in a single document. Each response to a single essay question should be 150 words.
1. Software development is a complex task, especially as technology changes at the speed of light, environments evolve, and more expectations are placed upon vendors who want to be competitive within the software market. This complexity also makes implementing security more challenging. Given this environment, what suggestions for secure software development best practices would you suggest to improve software security?
2. In addition to application development, databases are another area that needs to have a focus on security within their design. Describe the database concepts of View-based access control, Polyinstantiation, Data warehousing and data mining, and Online Transaction Processing (OLTP)?
3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability.
Write research paper “How will artificial intelligence affect politics?” using evidence. (Annotated bibliography)
Resources
NY Times Science Section
Google Scholar
Online technology publications
TED Talks
YouTube Videos