For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic:
- User interface programming
For this assignment, explore the peer-reviewed literature and complete a 1 – page paper on the following topic:
Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad.
The fifth assignment involves writing a Python program to determine whether a password meets all the requirements for a secure password. Your program should prompt the user for the candidate password and output either that the password is valid or the reason it is invalid. To be valid the length of the password must greater than some minimum length but less than some maximum. It must not include the substring “umgc” in any combination of upper or lower case letters. Finally, it must contain the # symbol in some position other than the first or last character. You should decide on the minimum and maximum allowable lengths.
Your program should include the pseudocode used for your design in the comments. Document the values you chose for the minimum and maximum allowable lengths in your comments as well.
You are to submit your Python program as a text file (.py) file. In addition, you are also to submit a test plan in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, 70% on whether your program executes correctly on all test cases and 15% on the completeness of your test report.
Please review attached docs and write discussion as per instructions.
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.
Your Task
Step 5: Develop the Violations of Policy section of your ISP
In this week’s Lab you will develop the section on Violations of Policy which describes the penalties for violating policy and provides instructions on how to report policy violations.
Please provide detailed answers to the following questions
1) What is software engineering? Chapter 1
2) What are the fundamental activities that are common to all software
processes? Chapter 1
3) List the 5 principles of agile methods. Chapter 3
4) What are user requirements and system requirements? Chapter 4
5) What is the most important advantage of a client-server architecture?
Chapter 6
6) What are the 5 key activities in an object-oriented design process?
Chapter 7
7) Briefly describe the idea of open-source development. Chapter 7
QUESTION 1:
QUESTIONS 2:
write 25 pages on data and privacy in social media
references should be 50 and done by both a footnote and Harvard (each one on a separate page)
Part 1: Hacking Windows and Linux
Respond to the following:
Part 2: Windows 2000™ and Firewall Issues
Respond to the following: