discussion help minimum 300 words

Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Read Chapter 1 of the assigned textbook.

Book reference:

Computer Security: Principles and Practice

Fourth Edition By:  William Stallings and Lawrie Brown

Wireshark

In this week’s discussion, you were introduced to Wireshark and GlassWire, two free network monitor & security tools. Compare and contrast these two tools. explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.

https://www.glasswire.com/

https://www.wireshark.org/

1 Discussion , 1 Case Study and weekly summary

Discussion 4.1

What are some methods used to identify attackers? (How can we attribute an attack to a person or organization?)

Case Study 

Midterm Requirements

  • Individual Paper:
    • Describe each of the following Non-State Actors: NGOs, Organized Crime, Corporations, Terrorists, Activists, Individuals

Writing Requirements: 

  • 4 full pages paper in APA format, for citations and refereneces
  • Use the APA template located in the Student Resource Center to complete the assignment.
  • Each team member submits the team assignment

References should not be older than 2015

References should not be older than 2015

Weekly Summary 4.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Assignment 5-Fast Scrabble Words

 

You shall write a C++ program that:

  1. Reads an arbitrary number of whitespace-delimited tokens from standard input.
  2. Determines and prints (to standard output) two decimal integer values:
    1. The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in /srv/datasets/scrabble-hybrid.
    2. The total number of points that all those words would be worth in Scrabble, according to the letter values in /srv/datasets/scrabble-letter-values.

Specific Requirements

  1. You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
  2. Open and read the contents of each relevant data file exactly once.
  3. Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
  4. Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.

cloud computing

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

Op Excellenteè

Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

Name the organization and briefly describe what good or service they sell and where they operate.

Note how they are a differentiator in the market.

Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

Explain what actions the company took to achieve operational excellence.

Discussion

Operations Security

IT Policy Compliance and Compliance Technologies

Discuss tracking, monitoring, and reporting of various compliance systems and explain the relevance of such compliance systems. 

Information Governance wek-5-1

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references

— 600 Words

ROTOR MACHINE CIPHER IMPLEMENTATION

  1) Using any programming language of your choice implement the encryption scheme that uses a simple two cylinder rotor machine. It is not necessary to implement the decryption scheme [50 marks] Please note that your submission is expected to run on IRIS. Please ensure that you use a programming language that is compatible with IRIS and also ensure the program can run on IRIS before submitting it 2) Specifications: The program should start by randomly generating the mappings for the inner and outer cylinders, with the inner cylinder rotating faster than the outer cylinder. You can use any data structure to implement the cylinders but a “map” data structure is recommended. The program should then prompt the user for an input string to encrypt. When the user presses the enter, the program should validate and encrypt the input string. Validation would mean that the string is well formed and is not a command. It should then output the encrypted text and prompt the user for another text value. The cylinders should update their state after each character encryption. At any time, the user should be able to enter a predefined string to exit the program. The program should also contain a sub-routine that prints out the current state of the cylinders by entering a predefined command at the prompt. Example output might look like: Inner Cylinder 25 ↔ 4 6 ↔ 11 . . Outer Cylinder 13 ↔ 12 12 ↔ 24 . . In coding the above, please note the following • White space, numeric and special characters should not be encrypted. Simply output whitespace, numeric and special characters into the ciphertext • You can write your code to be case insensitive – convert all input to lower case 3) What can you say about the computational complexity of your algorithm relative to the size of the input string? [10 marks] Test 1 [10 marks] 1) Output the state of your cylinders. 2) Encrypt the string “A” and output its encrypted value. 3) Output the state of your cylinders. Test 2 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “EE” and output its encrypted value. 3) Output the state of your cylinders. 4) Is a rotor machine a monoalphabetic or polyalphabetic cipher? Comment based on the results above. Test 3 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “Mr. Jock, TV quiz PhD, bags few lynx” and output its encrypted value. 3) Output the state of your cylinders. 4) Comment on the state of your cylinders before and after encryption. Please provide an explanation for what you observe. Submission 1) Submit the following documents separately in Blackboard by the deadline. NO ZIPPED FILES ALLOWED 1) All your code files 2) A detailed README file, which should explain how to run the code with sample input and output. If you are unfamiliar with READMEs you can find an introduction here https://www.makeareadme.com/ , here https://medium.com/@meakaakka/a-beginners-guide-to-writing-a-kickassreadme-7ac01da88ab3 and here v=RZ5vduluea4. Note that the README file you

submit for this project need not be complex, it only needs to at least explain how

to compile the code and run the code with examples. [5 marks]

3) A MAKEFILE that automates the building/compiling of your code. If you are

unfamiliar with Makefiles you can get a quick introduction here

https://www.youtube.com/watch?v=vye0kV5gvkA and here

https://swcarpentry.github.io/make-novice/02-makefiles/. Note that the exact

structure of your makefile will depend on the programming language you are

using, so you may choose to find an example specific to you. The Makefile you

create for this assignment need not be complicated. It only needs to define the

TARGET, its DEPENDENCIES, if any and the COMMAND to create the target

executable. [5 marks]

4) A report (which should include your answer to Question 3 and your test results

with screen shots)