CYBERLAWS & ETHICAL HACKING

Cryptography Concepts

Organizations across private and public sectors may use a variety of encryption technologies for various purposes.

Answer the following question(s):

1. What might be the effects of not using encryption on network or Internet traffic?

2. Why might vendors propose proprietary encryption methods rather than using standard encryption technologies?

Fully address the question(s) in this task in one page ; provide valid rationale for your choices, where applicable.

PreviousNext

Vertical and Horizontal Integration

LIVE NATION Entertainment:

Horizontal Integration is a type of strategy pursued by a company in order to strengthen its position in the industry. Within your Thompson (2022) text, read the Chapter 6 Assurance of Learning Exercise #1 related to Live Nation (https://www.livenationentertainment.com/) and respond to the following questions:

  • How has the company used horizontal mergers and acquisitions to strengthen its competitive position?
  • Are these moves primarily offensive or defensive? Please explain.
  • Has either Live Nation or Ticketmaster achieved any type of advantage based on the timing of its strategic moves?  
  • Relate your response to each of the above to our coursework (Thompson text) from this week.

Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper. All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

References:

Home

Professor Feedback:

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper. All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, double-spaced and proper in-text citations using APA guidelines.

Information Technology Security Auditing Paper outline

Outline must be 100% original work and not plagiarized.  

Instructions:

You must submit an outline for the paper topic “Information Technology Security Auditing.” It must include a detailed outline of topics and subtopics, as well as an annotated bibliography. Outline will be used to write an 8-10 page research paper. Attached is an example of how the Paper outline must be.

Submission Instructions:

The annotated bibliography must include at least three of the references you will use in your paper, written in APA style.

You have just been hired as the corporate security manager

  

You have just been hired as the corporate security manager for a major e-commerce corporation. Your boss has told you that the CFO and CEO made legislative compliance a top priority. Because your e-commerce site accepts credit cards, the company handles confidential customer information. You are told that no program or policies currently exist, and your top level management has only recently seen the need for a policy. Formulate a plan to bring the organization into compliance as quickly as possible. Develop short-term goals over the next 6 months and long-term goals that may take up to 5 years. Consider how you may approach this new assignment and discuss your short and long term approach with respect to building this program.

length 2-3 pages

Se493 week 1

Apa format citations and number them question SE493 week 1

Question 1

What is the most important difference between generic software product development and custom software development? What might this mean in practice for users of generic software products?(Review Chapter 1).

Question 2 

Assignment Description

Please read chapter 2 of your  textbook and review lecture slides/ and library resource and reputable articles/journals and in your own word explain your understanding of the following Software Process Models:

A) The waterfall model and  its problems

B) Incremental development model AND Incremental development benefits AND Incremental development problems.

research assignment

 

The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic.

: Machine learning-based SMS Spam Filtering

For a team with multiple team members, one team member submits the answer and a file of names for all team members. Each of other team members submits a file that contains names of all team members.  

Project Statements

– Objective

For this project, you are asked to implement a detection program supporting Short Message Service (SMS) spam filtering. The main concern is to design/generate features to differentiate SMS spam messages from legitimate ones, and run machine learning techniques (i.e., supervised learning) to classify SMS spam messages. Unlike email spam filtering, SMS spam filtering poses its own intrinsic problem because the length of text messages is relatively small (up to 160 characters or less). To come up with this project successfully, you must devise robust and efficient detection features to solve this problem.

.

– Dataset

You will explore real SMS Spam Collection Data Set, corpus of mobile SMS labeled Spam/Legitimate. The SMS Spam collection contains a total  of 1324 SMS messages, which is composed of 82 spam and 1002 legitimate messages.  Each line has one SMS message including two columns separted by “,”: the second column indicates label if the SMS message is spam or legitimate (ham), and the first one is the content of the message (i.e., raw text). Table 1 shows some samples of SMS Spam/Legitimate messages in the given dataset.

Table 1: SMS Spam/legitimate message samples

Label Text

spam “For the most sparkling shopping breaks from 45 per person; call 0121 2025050 or visit www.shortbreaks.org.uk”

spam December only! Had your mobile 11mths+? You are entitled to update to the latest colour camera mobile for Free! Call The Mobile Update Co FREE on 08002986906

ham Yup next stop.

ham No. I dont want to hear anything

Project Requirements

– Feature Extraction

Write a java (or python, or other program langagues but you need to give a demo to me) program for the detection features from raw text and generate a feature set file. You will be programming FOUR detection features and are responsible for justifying the implementation strategy for each of the features in the report. If you are using any references in terms of the implementation, you should cite and explain it concisely. For project 1, the detection features are:

Detection feature Description

Number of Characters typed

in Message In Table 1 above, it appears that SMS spam messages include relatively large number of characters than legitimate messages. From the SMS spammers’ (e.g., marketers) perspective, they are likely to use more characters available as long as it doesn’t exceed the limit of SMS to send the sufficient information to customers for illicit profits.   

Number of Currency Symbols To take the bait by mobile users, SMS spammers might emphasize the prize (or cash) using the currency symbol (e.g., £) in the SMS message. This is typically different from legitimate messages. Here is an example, “Please call our customer service representative on 0800 169 6031 between 10am-9pm as you have WON a guaranteed £1000 cash or £5000 prize!”

Number of Numeric String One of the intrinsic factors from the SMS spams is a CONTACT number or PROMOTION code. Since the phone number is sensitive, it is not likely to be in the legitimate messages frequently. (Example: “PRIVATE! Your 2003 Account Statement for shows 800 un-redeemed S. I. M. points. Call 08719899230 Identifier Code: 41685 Expires 07/11/04”)

The frequency of most popular term/word

   

– Binary Classification

From WEKA, run different binary classifiers to identify SMS Spam messages using the feature set you devised. You should run the following FIVE classification algorithms with Cross Validation (by default, K =10) and report the experimental results you analyzed. Specifically, you must report  the best classifier with i) Accuracy, ii) True Positive rate (TPR), and iii) False Positive rate (FPR).

Decision Tree (J48)

Multinomial Naive Bayes

K-Nearest Neighbors

SVM (LibSVM)    

RandomForest

Programming Requirements

We highly recommend you to use Java (or Python) and WEKA  for this assignment. You can also use other langagues but you need to clearly write the instrucitons to configure the compling and running environment to test your code. You might also be required to give a demo of your code. You need to write the programs to extract detection features and apply machine learning techniques using WEKA. Here is official Weka documentation (e.g., Weka Wiki, FAQ, Tutorials) link (http://www.cs.waikato.ac.nz/ml/weka/documentation.html). If the program only runs in your own machine, you should show the demo to TA or the instructor  in person.

Your program should generate the output in the format of Attribute-Relation File Format (ARFF), which can be directly analyzed by the Weka. 

Submission Requirements

The assignment must be done originally. Please submit TWO files:

i) A single tar (or zip) file that include all files below:

Source codes: your java (or python) codes and a shell script files (if applicable) that you use for testing. Your code also needs to be well-documented, with any major constructs (i.e., functions) clearly commented.

README: overall high-level documentation of instructions to run your program.(1 page)

Report: well-documented summary that includes the annotation/justification of detection features and the experimental results you analyzed. (at least 5 pages, the more formal the better.)  

Dataset: a feature set data in the format of ARFF to be tested

ii)  a MS word (or Acrobat PDF, Plain Text) file, including ONLY source codes for originality checking.