Network layers

In the event of an unknown zero-day attack, an intrusion detection system (IDS) might not be able to detect the attack and therefore fail to alert the administrator. Any failure to detect an attack is called a false negative. When alarms are not going off, it’s common to assume that no malicious events are taking place. If that’s a false assumption, real attacks are occurring and security staff is unaware.

False positives may create a false sense of security for the opposite reason—too many alarms from benign occurrences. An administrator might react quickly to the first few alarms. However, after receiving additional false positives, a busy administrator might put off investigating the alarms or ignore them.

Answer the following question(s):

Assume you are a network administrator responsible for security. In your opinion, which is worse—false positives or false negatives? Why?

Evelop a deep learning system for the classification of images

In this assignment, you will develop a deep learning system for the classification of images containing decimal digits into three categories:

  1. A-digit 0
  2. B-digit 1
  3. C-others (e.g. any digit in 2,3,4,5,6,7,8,9)

For this purpose, you will use the MNIST dataset. (Download Here) (Links to an external site.) 

You will develop your solution within a transfer learning paradigm. Rather the designing and training a deep learning system from the scratch, you can use the Internet to find solutions to start from and/or augment. (HINT: There are many models in Python that can be found online to solve this problem.)

Tasks:

  1. Download and arrange a subset of the MNIST data in the three categories above, performing the proper partition into training, validation and testing
  2. Design, train, validate and test a model
  3. Compare and interpret the performance of each model (accuracy, behavior of the validation versus training, etc).

Note: Ensure you explain the rational and the methodology for tasks 1 and 2.

This is meant to be fun, challenging, and a stretch assignment.  Effort is what matters, not the perfect solution!!!

Alexa and Location based Apps

Assignment 1

Q1. Examine Alexa’s skill in ordering drinks from Starbucks.

Q2. Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

Each response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words, and continue to use in-text citations.

Assignment 2

Q1. What are location-based apps and why are they important?

Q2. Discuss the importance of location-aware apps.

Q3. Discuss the advantages and disadvantages of location-aware applications.

Q4. Discuss methods in which location awareness can be obtained in mobile applications.

Q5. Discuss some of the risks associated with using location-based services.

2 Pages with References. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.

The Cloud WWW Issues

 

Research and learn about the three topics listed below. 

1.  Dataveillance 

2.  Distributed Denial of Service Attacks

3.  Internet Parental Control Software  

4.   Internet Anonymity 

5.  Cryptography

6.  Biometrics

7.  Big Data (Data Analytics)

8.  Artificial Intelligence (AI – deep learning applications)

9.  Browser fingerprinting  

10. Facial Recognition

11. Virtualization

12. Blockchain  

13. Machine Learning

14. Application Security 

15. Cryptojacking

16. Cyber-Physical Attacks

17. Autonomous Vehicles

18. Smart Medical Devices

19. Electronic Medical Records

20. Smart Systems/Devices

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

The programmer will write the ExpressionSolverRunner that will use the ExpressionSolver class to solve an integer expression provided by the ExpressionSolver

 

The programmer will write the  ExpressionSolverRunner that will use the ExpressionSolver class to solve  an integer expression provided by the ExpressionSolver textfile. An  expression will a String and it will be comprised of number and the  mathematical operators +, *, /, and -. The % operation will not be a  part of this program. In order to read an expression, the user must read  the expression from left to right performing the multiplication and  division operators before attempting the subtraction arguments. The  programmer should be careful to follow the order of operations, or they  will not get the correct answer. The calculation is integer mathematics,  so there will be no rounding but just truncation. The programmer should  take particular care when a multiplication and a division or next to  each other and make sure to do the operations from left to right. There  will be no parenthesis in the expression. 

Unit 5 Data Flow Diagram Creation

 

Unit Outcomes:

  • Discover a variety of diagrams relating to systems analysis.
  • Describe logical process models.
  • Create Data Flow Diagrams.

Course Outcome:

IT460–3: Create logical models that describe system processes.

Assignment Instructions

Avery has opened a gym and rehabilitation center specifically designed to provide training and recovery for service members who may have been injured while on duty. New members are provided a free fitness assessment to help determine their current fitness levels and to ascertain the extent of any injury to help onboard them into the program.

Avery has designed a basic system to help onboard these new gym members. When members are seen for the first time, they complete a simple gym membership form that asks for their name, address, phone number, and brief medical history, which are stored in the gym member file. They are also asked to schedule a Fitness Assessment.

Therapists or trainers must check the assessment calendar file for an available time. Members may also call to change their assessments. Because these assessments are scheduled in advance, Avery usually sends a reminder postcard and text message to each member one week before the appointment.

Assignment Requirements

Use Visio to Construct a Level 1 DFD based on the attached use cases. Each use case corresponds to a process in the Gym System. Use Gane and Sarson symbols. All the information can be analyzed from the Use Cases. Some of the Information is provided below. You will have to determine and label all the Data Flows in the DFD.

Entity: Gym Member

Processes:

  • Schedule (or change) a Fitness Assessment
  • Collect Membership Information
  • Send Reminder and text message

Data Files:

  • Calendar File
  • Gym Member File
  • Data Flows:
    • At least 16 are needed

 

IT460: Unit 5 Assignment Data Flow Diagrams

Use Case Name: Gym Member makes or changes a fitness assessment

ID: _1_

Importance Level: High

Primary Actor: Gym Member

Short Description: This describes how a new fitness assessment is made or an existing fitness assessment is changed.

Trigger: Gym Member calls to schedule new fitness assessment or change an existing fitness assessment.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

Gym Member name

Gym Member

Scheduled fitness assessment

Gym Member

Desired fitness assessment

Gym Member

Scheduled fitness assessment

Calendar file

Fitness assessment to change

Gym Member

Available fitness assessments

Gym Member

Available fitness assessments

Calendar file

Check Gym Member name

Gym Member file

Existing Gym Members

Gym Member file

Major Steps Performed

  1. Get Gym Member’s name. Check Gym Member name with Gym Member file.
  2. If new Gym Member, get address and phone number and enter in new Gym Member file entry.
  3. If this is a fitness assessment change, find current fitness assessment in fitness assessment file, and cancel it.
  4. Get desired fitness assessment time and match with available fitness assessments in Calendar File. When a suitable time is found, enter scheduled fitness assessment in the Calendar file and confirm with Gym Member.

Information for Steps

Gym Member name

Gym Member File

Address

Phone number

New Gym Member information

Fitness assessment to change

Existing Fitness assessments

Desired fitness assessment

Available fitness assessments

Scheduled fitness assessments

Use Case Name: Collect new Gym Member information

ID: _2_

Importance Level: High

Primary Actor: New Gym Member

Short Description: This describes how new Gym Member information is collected when a new Gym Member arrives for fitness assessment.

Trigger: New Gym Member arrives for fitness assessment.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

New Gym Member information

Gym Member Information

Gym Member file

(Includes name, address,

Gym Member

phone number)

Injury History

Gym Member

Major Steps Performed

  1. When the Gym Member arrives, determine if he/she has been seen before in this gym. If they have not, have them fill out a Gym Member information form.
  2. Use the information on the Gym Member information form to update and complete the Gym Member’s entry in the Gym Member file.

Information for Steps

Gym Member status

Gym Member name

Address

Phone number

Injury history

Use Case Name: Send fitness assessment reminder card and text message

ID: _3_

Importance Level: Medium

Primary Actor: System

Short Description: This describes how reminder cards and text message sent to Gym Members one week prior to fitness assessment.

Trigger: Time to send reminders and text message one week before scheduled fitness assessments.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

Current date

Calendar

Fitness assessment notification card

Gym Member

Scheduled fitness assessments

Calendar file

Text message

Gym Member

Gym Member Contact Info

Gym Member file

Major Steps Performed

  1. Each day find the fitness assessments in the Calendar file for the day week.
  2. Prepare fitness assessment notification card and text message to all Gym Members having fitness assessments.

Information for Steps

Current date

Scheduled fitness assessments

Name

Address

Fitness assessment

Fitness assessment notification card