Cryptography milestone 2

Question:  you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  

-The writing assignment requires a minimum of two written pages to evaluate the history. 

 -You must use a minimum of three scholarly articles to complete the assignment.  

-The assignment must be properly APA formatted with a separate title and reference page.  

-No Plagiarism.

What are the Consequences of Software Piracy?

 

For this assignment you will prepare a write a two-page essay on a current technology issue.

You may choose one of the technology issues from the list. Research your topic using a popular search engine or other resources. Print out at least three articles that you will use as sources for your project. Read and highlight the important and pertinent facts that you want included in your project.

Write a two-page essay (double spaced) on the topic. As with all of the issues, there are positive and negative points to consider. I want you to present facts derived from your research, and then state your opinion on your topic. You must have 3 references.

Operating System (Computer Science)

You need to have set up your Class DevBox Environment (see the Getting Started section) before starting this assignment.

The assignment description is attached and is also available in your repository subdirectory named assg03. Follow the assignment instructions and submit the required tar.gz submission file to this MyLeoOnline dropbox by the due date. You should only submit the assg03.tar.gz for this assignment, no other files should be submitted. Use the make submit target to create the correct submission file:

$ make submit

For this assignment you should have git, vagrant and virtual box setup in your computer. Please visit the following link provided by my professor for these setup.

https://bitbucket.org/dharter/csci430-os-sims

And the assignment is attached below.

Information Systems Architecture

 

Discuss how an information system’s architecture planning contributes to overall enterprise risk in the organizations. Research the following elements for a specific organization of your choosing: 

  • Platforms 
  • Networks 
  • Applications 
  • Databases 
  • Operating Systems 

How can risks can be eliminated? Note: You may choose to continue researching your chosen organization in this week’s individual assignment. 

Assignment

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the data representation choices:

  1. Start by identifying all the charts and their types
  2. How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
  3. Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
  4. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  5. Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?

Assignment Link: http://book.visualisingdata.com/chapter/chapter- 6

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.

Automation Testing Script using Celenium Java

Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link

 1. Selenium WebDriver – Page Object Model:

1. Visit amazon.com Page

2. Search for Book ‘qa testing for beginners’

3. Click on 1st item in the listed results.

 

4. Before Click on add to cart Add to Cart asset price from Step3. 

5. Click on Add to Cart.

6. Before Click on Proceed to Checkout asset price from Step3.

7. Click on proceed to checkout

5. On the checkout page assert price from Step3.

 2. API automation using Rest-assured or Karate API Test

 1. Use any 2 methods(Get, and Delete) from end-points listed in

http://dummy.restapiexample.com/

2. Perform assertions for 

   – Get & Delete – Status code to be Successful.

   – Get – Return specific Employee details(Any).

   – Delete – “message”: “successfully! deleted Records”.

comparing and contrasting documentation

 

Given the material covered in Module 3 (Hardware) and Module 4 (Software), your personal experience, and our good friend reliable sources, provide a well-formatted MS Word document (with citations) that provides a framework for comparing two different computing solutions for both hardware and software issues. [Hint: Such a document would most likely include an introduction paragraph, a table comparing individual characteristics, and a conclusion paragraph.]

For example, you might want to compare an iPhone X with an iPhone 7, or an iPhone X with a Galaxy 7, or a PS4 with an XBox, or an Apple Air with a Razer Blade Stealth.

Considerations might include:

  • # of (or importance of) exclusive software products available for that system
  • backwards compatibility for “old” materials from previous systems
  • cost of the system
  • compatibility of the system with supporting services (such as the cell phone network, gaming community, or preferred app store) 
  • availability of support for the system
  • disk space
  • type of external media supported
  • Graphics Card capabilities
  • Processor speed
  • Peripherals support

…Or any other considerations you consider important. A minimum of 2 hardware and 2 software factors must be included.

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.