Data Exchange1

  

Data Exchange1. Detail the series of steps involved in the initial key exchange, and the steps involved in sending a message M from Alice to Bob, both at Alice’s and at Bob’s end. Please see attached for full description.

Secure Data Exchange

Suppose Alice and Bob want to exchange data securely. They want confidentiality (encryption), integrity and authentication (MAC), and non-repudiation (Digital Signatures). They want the bulk encryption to be done using symmetric cipher “X”, with MAC function “H”. Both have signed and certified RSA keys. You may assume both parties have already exchanged and verified the validity of the public RSA keys of the other party. 

Risk Management Project part 1

  

Risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. This project allows you to fulfill the role of an employee participating in the risk management process in a specific business situation.

Please find attached document for more information on assignment.

 Please see the attached requirements. 

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To  do so, follow these steps: 

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

Fundamentals of Security (The Chief Financial Officer)

The Chief Financial Officer (CFO) made some complaints to the CEO regarding recent capital expenditures for security software. You try to lighten the blow by explaining the value of controlling security.In a point paper to the CEO, explain the cost-benefit analysis method you use to do a quantitative assessment before investing in security control.

Complete and include the table below in your paper.

The requirements for your assignment are:

  • 2-3 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

cyper security

 

The Database system have diagrams, mention the Types of diagrams? with photos

2 pages not including title and ref

 

WMO

The World Meteorological Organization (WMO) has hired you to write a data structure that stores record temperatures across the globe. Incoming temperature reports have very precise geo-location data (latitude and longitude coordinates). The WMO would like for you to store data in a “grid”, treating any points that round to the same latitude and longitude within one decimal as the same. Note that we are using negative numbers for southern latitudes and western longitudes, so the above coordinates correspond to (36.4° N, 105.0° W). Write a data structure TempMap that keeps track of the hottest and coldest temperatures for each reported coordinate. There is a lot of data coming in, so you need to read and write this information quickly – you should be able to update the record at a (lat, long) pair in O(1). Do not use the built-in set or dictionary types in this assignment. class TempMap Write a class TempMap that keeps track of the maximum and minimum temperature for each reported set of coordinates. Magic Methods init O(1) in O(1) Returns True (False) if the rounded version of a specified coordinate is (is not) in this collection get O(1) Returns a tuple containing the (min, max) temperatures at these coordinates Raise a KeyError if the specified coordinate are not in this collection the input coordinates may or may not be rounded Non-Magic Methods add_report(pos, temp) O(1) pos – an (unrounded) tuple of coordinates temp – the current temperature at those coordinates Updates the maximum or minimum recorded temperature for pos if appropriate remove_pos(pos) O(1) removes the record for the given position from this collection raises a KeyError if pos is not in this collection Special Behavior Memory constraint – you should limit your memory usage to be between 1/2 and 2x the amount necessary to store the number of unique coordinates – that is, you should periodically increase and decrease the amount of memory used as items are added and removed. The starter code includes a function generate_report that returns a randomly generated tuple of (lat, long, temperature). Feel free to use it to help with testing

IT207 week 2 case study

Write a research paper of 2  pages APA style covering the following areas:

  • Describe the Basic Input-Output System (BIOS) and Unified Extensible Firmware Interface (UEFI),  and the bootup or start the process for the operating system.
  • Describe resources that are on your Windows OS under System Information and  Resource Monitor.
  • Include a screenshot of the Performance and of the Overview tab for your computer. 

Your paper must be formatted according to APA style. Use citations and references as needed. Please do not copy & paste from the internet resources/solution manual as it will be considered plagiarism. 

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you