network security layers

Deny by default/allow by exception assumes that all traffic is potentially malicious or at least unwanted or unauthorized. Everything is prohibited by default. As benign, desired, and authorized traffic is identified, an exception rule grants it access to the network.

Allow by default/deny by exception assumes that most traffic is benign. Everything is allowed by default. As malicious, unwanted, or unauthorized traffic is identified, an exception rule blocks it.

Most security experts agree that deny by default/allow by exception is the more secure stance to adopt.

Answer the following question(s):

When would you use allow by default/deny by exception? Provide a rationale for your answer.

CMIS102 Homework Assignment

  

CMIS102 Homework Assignment 3 (Worth 13% of your grade)

http://questionssolved.com/multiplication-table/

In this assignment, you will design a program to perform the following task:

Write a program that would calculate and display the results for the multiplication table for values ranging from 1 to 100.

Before attempting this exercise, be sure you have completed all of chapter 4, 5 and course module readings, participated in the weekly conferences, and thoroughly understand the examples throughout the chapter. There are 3 main components of your submission including the problem analysis, program design and documentation, and sample test data.

1. Provide your analysis for the following problem statement: You need to write a program that would calculate the results for the multiplication table up from 1 to 100. (For example, 1X1, 1X2, 1X3 … 1X10, 2X1, 2X2 …. 10X2 … 10×10). Your program should print the output for each step and output a new line after 10 items. So the example output would be something like this Notice a new line appears after 10 steps:

1 2 3 4 5 6 7 8 9 10

2 4 6 8 10 … 20

10 20 30 … 100

To write the new lines you can just use code similar to : write “new line”. Hint: You will probably use a nested repetition loop.

Your analysis should be clearly written and demonstrate your thought process and steps used to analyze the problem. Be sure to include what is the required output? What is the necessary input and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe any necessary formulas and sample calculations.

2. Provide your program design for the program you analyzed for printing the multiplication table. Be sure to describe the fundamental tasks (i.e., things your program must do) needed to solve the problem so you can use a modular design. Provide pseudocode of your overall design that includes the Main module and the order of the module calls, and a Hierarchy chart for the program (see figure 3.8 page 148). Finally, display the flow charts (using Raptor, or your favorite graphics editor) for each module. (See figure 5.3 page 233 as an example.)

Include header and step comments in your pseudocode, using a similar approach as the example provided in section 2.3 (textbook page 86). See example 2.8 on pages 88).

3. Prepare any input data (Test data) along with expected output for testing your program (Note: Programs may not always have both input and output data. Just provide test cases for your application). Your test data can be presented in the form of a table as was shown in Assignment 1.

Systems Management

 

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 4: Develop the Systems Management section of your ISP

In this week’s Lab you will develop the section on Systems Management which focuses on the user’s relationship to systems management and the responsibilities delegated to both users and systems administrators to avoid confusion. This includes:

·  Authentication and Encryption

·  System Administrator Responsibilities

·  User Responsibilities

·  Auditing

·  Configuration

Homework 3

post current events article on any computer security topic.(200 to 250 words and References) 

Week#2 Scholarly Abstract Assignment – Quantitative and Qualitative

 2.1 Scholarly Abstract Assignment – Quantitative

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in Week 1. This article should reflect a quantitative research method.

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name the qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

9. Conclusions – what did the findings show and how does that relate to current research

10. Suggestions for further research – based on the conclusions of the study, what additional research is needed.

 

2.2 Scholarly Abstract Assignment – Qualitative

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in Week 1. This article should reflect a qualitative research method.

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

9. Conclusions – what did the findings show and how does that relate to current research

10. Suggestions for further research – based on the conclusions of the study, what additional research is needed

Mock Dissertation – Methodology Section

Research Question: Why is Machine Learning critical for cyber security in the healthcare industry, and how does Machine Learning benefit in safeguarding data and compliance in the Healthcare sector?  

(4 page methodology section that includes the following) Sample attached

  1. Introduction
  2. Research Paradigm (qualitative or quantitative) Notes: Choose Qualitative or Quantitative based on what methodology you plan to use for your actual dissertation. You may not choose to do both qualitative and quantitative (mixed-methods)  
  3. Research- or project- Design
  4. Sampling Procedures and
  5. Data Collection Sources
  6. Statistical Tests Summary (quantitative) OR Data Organization Plan (Qualitative). Notes:  If you chose a quantitative research paradigm, you must choose a quantitative statistical test summary option in this section. If you chose a qualitative research paradigm, you must choose the qualitative organization plan option in this section.  

YO19_Excel_Ch09_Assessment_Cleansing_Inventory_Data

YO19_Excel_Ch09_Assessment_Cleansing_Inventory_Data

  

YO19_Excel_Ch09_Assessment_Cleansing_Inventory_Data

Project Description:

You currently work part-time in an automotive parts store. Because word of your knowledge of Excel has spread, you have been contacted by the district manager. The database used for keeping track of inventory has been corrupted, causing some issues with the inventory data. You have been asked to use your expertise in Excel to clean the inventory data.

     

Start Excel. Open the downloaded   workbook named Excel_Ch09_PS2_Inventory.xlsx.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location where you are storing your files.

 

There are duplicate rows of data   in the Inventory worksheet. These duplicate records need to be removed before   the data can be further cleansed.
 

  Remove any duplicates that exist in the Inventory worksheet. Duplicate   records are any records with the same InventoryCode and ItemNumber.

 

The data for the   Category/Manufacture has extra spaces, non-printable characters, and the case   of the text needs altered in order to successfully cleanse the data. This   process will take several steps and it will be easier if each step is   completed in separate columns.
 

  Enter the text Step 1 in cell G1.

 

The data in column C has   nonprintable characters before and after the data contained in each cell. In   cell G2, enter a formula to remove any nonprintable characters from column C.   Copy the formula down the column.

 

Enter the text Step 2 in cell H1.

 

There are several spaces before   and after the data in column G that need to be removed.
 

  In cell H2, enter a formula to remove any extra spaces in the data from   column G. Copy the formula down the column.

 

The category and manufacturer   should be in two separate columns. Enter the text Category in cell I1.

 

Enter the text Manufacturer in cell J1.

 

Use Flash Fill to place the   category data from column H in proper case in column I. Use Flash Fill to   place the Manufacturer data from column H into the new column J. Owing to the   nature of the data, Flash Fill will need to be invoked from the Data tab. 

 

A new ItemCode will be   constructed from the InventoryCode and ItemNumber columns. The first part of   the ItemCode will be the InventoryCode displayed as uppercase letters.
 

  Enter the text InvCode in cell K1. In cell K2, enter a formula to display the inventory   code from column A as all uppercase letters. Copy the formula down the   column.

 

Enter the text ItemCode in cell L1. The ItemCode is a   combination of the inventory code in all uppercase letters, with the item   number appended to it. For example, the first ItemCode should be UARM423949.   Use the appropriate function in column L to create this new ItemCode and fill   the function down the column. 

 

Save and close Excel_Ch09_PS2_Inventory.xlsx. Exit   Excel. Submit your files as directed.

Exp19_Excel_Ch08_ML2_Reading_Scores

 Exp19_Excel_Ch08_ML2_Reading_Scores

  

Project Description:

As an elementary school principal, you are concerned about students’ reading comprehension. After conducting a study, you want to calculate some general statistics and then conduct a one-way analysis of variance (ANOVA). Doing so will enable you to compare three sample group means and evaluate the variances within each group compared to the variances among the three groups.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch08_ML2_HW_ReadingScores.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

In the range F2:H2, insert   functions that will calculate the average for each of the groups (Control,   CBT Only, Hybrid).

 

In the range F3:H3, insert   functions that will calculate the median for each of the groups.

 

In the range F4:H4, insert   functions that will calculate the most repetitive value for each of the   groups.

 

In the range F5:H5, insert   functions that will calculate the highest value for each of the groups.

 

In the range F6:H6, insert   functions that will calculate the lowest value for each of the groups.

 

In the range F7:H7, insert   functions that will calculate the variance for each of the groups. Use the   function that includes the .S descriptor.

 

In the range F8:H8, insert   functions that will calculate the standard deviation for each of the groups.   Use the function that includes the .S descriptor.

 

Format the values in the range   F2:H8 with the Comma Style with three decimal places.

 

Use the Data Analysis tools to   perform an analysis of variance using the range A2:C25 as the input range and   E11 as the output range.

 

Format the averages and   variances in the SUMMARY table with the Comma Style with three decimal   places.

 

Save and close   EXP19_Excel_CH08_ML2_HW _ReadingScores.xlsx. Exit Excel. Submit the file as   directed.

questions

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Complete your answers on a WORD Document,