need help in homework

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Need 3 pages with introduction, body and conclusion.

Implement the algorithm in python with some modifications

I need the implementation of a paper done in which you need to encrypt a picture using AES with using key from some other system. I can share full details if someone is interested in doing that. It is an assignment and needs to be done in a week.This assignment is related to Encryption and python.

Excel_2F_Bonus

  Excel_2F_Bonus

  

Excel_2F_Bonus

Project Description:

In the following project, you will edit a worksheet that summarizes the compensation for the commercial salespersons who qualified for bonuses in the Western and Eastern Canadian regions.

     

Open   the Excel file Student_Excel_2F_Bonus.xlsx downloaded with this   project.

 

Rename Sheet1 as Northern and rename Sheet2 as Southern.

 

Click the Northern sheet tab to   make it the active sheet, and then group the worksheets. In cell A1, type Rosedale   Landscape and Garden   and then Merge & Center the text across the range A1:F1. Apply the Title   cell style. Merge & Center the text in cell A2 across the range A2:F2,   and then apply the Heading 3 cell style.

 

The bonus rates for each salesperson are determined by sales amounts   using the following scale: Sales greater than $35,000 earn a bonus rate of   5%, sales greater than $25,000 earn a bonus rate of 4%. All other sales (any   amount greater than 0) earn a bonus rate of 2%. With the sheets still   grouped, in cell C5 use an IFS function to determine the commission rate for   the first salesperson whose sales are in cell B5. Fill the formula down   through cell C8.

 

In cell D5,   calculate Bonus for Reid by multiplying the Sales Eligible for Bonus times   the Bonus Rate. Copy the formula down through cell D8.

 

In cell F5, calculate Total   Compensation by summing the Bonus and Base Salary for Reid. Copy the formula   down through the cell F8.

 

In row 9, sum the columns for   Sales Eligible for Bonus, Bonus, Base Salary, and Total Compensation. Apply   the Accounting Number Format with two decimal places to the appropriate cells   in row 5 and row 9 (do not include the percentages).

 

Apply the Comma Style with two   decimal places to the appropriate cells in rows 6:8 (do not include the   percentages). Apply the Total cell style to B9 and D9:F9.

 

Ungroup the sheets, and then   insert a new worksheet. Change the sheet name to Summary. If any columns are too narrow to display   all the data, apply AutoFit to the column.

 

Move the Summary sheet so that   it is the first sheet in the workbook. In cell A1 of the Summary sheet, type Rosedale   Landscape and Garden   and then Merge & Center the title across the range A1:E1. Apply the Title   cell style. In cell A2, type June Commercial Salesperson Bonus Summary: California and then Merge & Center the   text across the range A2:E2. Apply the Heading 1 cell style.

 

In the range A5:A7, type the   following row titles and then apply the Heading 4 cell style:
Bonus
Base   Salary
Total   Compensation

PowerPoint_2F_Attractions

  PowerPoint_2F_Attractions

     

Open   the file Student_PowerPoint_2F_Attractions.pptx downloaded with this project. 

 

On Slide 1, select the title and   display the WordArt gallery. In the third row, apply the first WordArt style.   Change the Text Outline by applying, under Theme Colors, in the fourth   column, the fourth color.

 

On Slide 2, in the content   placeholder, insert a List type SmartArt graphic—Vertical Bullet List. In the first Text placeholder, type Location and then in the bullet point,   type Brookside. In the second text   placeholder, type Availability and then in the second bullet, type June 2022 

 

Click the Availability placeholder, and then add a shape after the   placeholder. In the new placeholder, type Specifications and then add a bullet. Type Course   located around park perimeter

 

Change the SmartArt color to   Colorful Range – Accent Colors 4 to 5, and then apply the 3-D Polished style.

 

Select the three shapes, and   then change the shapes to the Arrow: Right shape. On the Format tab, in the   Shapes group, click the Smaller button one time to decrease the size of the   arrows.
  Mac Tip This shape is called Right Arrow.

 

On Slide 3, convert the bulleted   list to a SmartArt graphic by applying the Vertical Box List graphic. (Mac   users, convert to Vertical Bullet List and then change to Vertical Box List.)

 

Change the SmartArt color to   Colorful Range – Accent Colors 4 to 5, and then apply the Polished 3-D style.

 

On Slide 5, insert a WordArt—in   the first row, the last style. Replace the WordArt text with To Accept the   Challenge?   Change the font size to 48.

 

Drag the WordArt down so that   its top edge is positioned on the lower half of the vertical ruler at 1.   Align center.

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 2F_Attractions

 

Display the document properties.   As the Tags type zip line, rock wall (Mac users enter keywords instead of tags).

 

Save and close the file, and   then submit for grading.

Assembly program

CSP25 Assignment 03
Converting from Big Endian to Small Endian.
Write an Assembly program that uses the variables below and MOV instruction to copy the
value from highEndian to lowEndian, reversing the order of the bytes. The number’s 32-bits
value is understood to be 12345678h as shown below

Make sure you have the following at the top of your Assembly code file. Fill it up accordingly
such as the name of the asm file will be Assignment01.asm
; Program Template (Assignment01.asm)
; Program Description:
; Author:
; Creation Date:
; Revisions:  
; Date:Modified :
Also make sure to document your Assembly code.

What to submit?
TWO files.
1. Copy your program and paste it to a text editor such as Notepad and save file as .txt file
then submit this text file.
2. A pdf file that has your code (copied or screenshot) and output of dumping of your
registers.
 

Enterprise Key Management

  

Enterprise Key Management

As a security architect and cryptography specialist for Superior Health Care, you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted.

You’re also expected to understand health care regulations and guidelines because you’re responsible for advising the chief information security officer, or CISO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.

You also have a team of security engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives.

This week, the CISO calls you into his office to let you know about the company’s latest initiative.

“We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration,” he says.

The CISO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.

The plan will help create an enterprise key management system.

The SEs would be responsible for the implementation, operation, and maintenance of the plan and system.

The CISO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.

The new web-based system needs to be running in a month. So, you’ll have a week to put together your enterprise key management plan and the accompanying policy.

Close

Project 1: Enterprise Key Management
Start Here

Transcript

In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

The following are the deliverables for this project:

Deliverables

  1. Enterprise Key Management Plan: An      eight- to 10-page double-spaced Word document with citations in APA      format. The page count does not include figures, diagrams, tables, or      citations.
  2. Enterprise Key Management Policy: A      two- to three-page double-spaced Word document.
  3. Lab Report: A      Word document sharing your lab experience along with screenshots.

There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”

Project 1: Enterprise Key Management
Step 1: Identify Components of Key Management

Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handling and identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Step 2: Learn Key Management Capabilities

You have successfully examined the major components of an enterprise key management system for Superior Health Care. Enter Workspace and complete the “Enterprise Key Management” exercise. Conduct independent research on public key infrastructure as it applies to your organization.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber (CST/DFC/CBR/CYB)
  • SubType Detail: Pick the category that best fits the issue you are      experiencing
  • Email: The email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

In the next step, you will identify the key management gaps, risks, solutions, and challenges found in corporations.

Professionals in the Field

Being able to interact with a variety of stakeholders is a skill set on which you will want to evaluate yourself and improve where necessary so that you can present that skill on paper and in person. 

As an example, consider the range of stakeholders in a health care setting: medical techs, doctors, data entry clerks, office and hospital administrators. Now consider the three technical domains that are interlinked in this setting: cybersecurity needs, the practice of medicine, and the legal requirements of HIPAA. 

Hypothetically, which of these audiences might you need to talk to before, during, and after your team of SEs implements your p

Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges

In a previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

In the next step, you will provide additional ideas for the chief information security officer (CISO) to consider.

Step 4: Provide Additional Considerations for the CISO

You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.

  1. Explain the      uses of encryption and the benefits of securing communications by hash      functions and other types of encryption. When discussing encryption, be      sure to evaluate and assess whether or not to incorporate file encryption,      full disc encryption, and partition encryption. Discuss the benefits of      using triple DES or other encryption technologies. To complete this task,      review the following resources:
    1. uses of encryption
    2. types of encryption
    3. hash functions
  2. Describe the      use and purpose of hashes and digital signatures in providing message      authentication and integrity. Review these resources on authentication to      further your understanding. Focus on resources pertaining to message      authentication.
  3. Review the      resources related to cryptanalysis. Explain the      use of cryptography and cryptanalysis in data confidentiality.      Cryptanalysts are a very technical and specialized workforce. Your      organization already has a workforce of security engineers (SEs).      Cryptanalysts could be added to support part of the operation and      maintenance functions of the enterprise key management system. Conduct      research on the need, cost, and benefits of adding cryptanalysts to the      organization’s workforce. Determine if it will be more effective to      develop the SEs to perform these tasks. Discuss alternative ways for      obtaining cryptanalysis if the organization chooses not to maintain this new      skilled community in-house.
  4. Research and      explain the concepts and practices commonly used for data confidentiality:      the private and public key protocol for authentication, public key      infrastructure (PKI), the X.509 cryptography standard, and PKI security.      Read about the following cryptography and identity management      concepts: public key infrastructure and      the X.509 cryptography standard.

Keep in mind that sometimes it takes considerable evidence and research for organizational leaders to buy in and provide resources.

Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Step 5: Analyze Cryptographic Systems

In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring.

Independently research commercially available enterprise key management system products, discuss at least two systems, and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness, and its efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

  • security index rating
  • level of complexity
  • availability or utilization of      system resources

Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

The following exercise, Introduction to Cryptographic Tools, is to introduce you to or help you better understand some basic cryptographic concepts and tools for both encryption and decryption processes.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC      Virtual Labs Support
  • Customer Type: Student      (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber      (CST/DFC/CBR/CYB)
  • SubType Detail: Pick      the category that best fits the issue you are experiencing
  • Email: The      email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

Step 6: Develop the Enterprise Key Management Plan

In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.

A possible outline could be:

  • Introduction
  • Purpose
  • Key Components
  • Implementation
  • Operation
  • Maintenance
  • Benefits and Risks
  • Summary/Conclusion

The following are the deliverables for this segment of the project:

Deliverables

· Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

· Lab Report: A Word document sharing your lab experience along with screenshots.

Submit your deliverables to the Assignments folder in the final step of the project.

Step 7: Develop the Enterprise Key Management Policy

The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.

Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.

Review and discuss the following within the policy:

Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.

Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

The following is the deliverable for this segment of the project:

Deliverables

· Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.

· 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.

· 1.4: Tailor communications to the audience.

· 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

· 2.2: Locate and access sufficient information to investigate the issue or problem.

· 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

· 2.4: Consider and analyze information in context to the issue or problem.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

· 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.

· 7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost

Exp19_Excel_Ch03_ML1_Airports

Excel Chapter 3 Mid-Level 1 – Airports 

Exp19_Excel_Ch03_ML1_Airports

Exp19 Excel Ch03 ML1 Airports

  

Project Description:

As an analyst for the airline industry, you track the number of passengers at the top six major U.S. airports: Atlanta (ATL), Chicago (ORD), Los Angeles (LAX), Dallas/Fort Worth (DFW), Denver (DEN), and New York (JFK). You researched passenger data and created a worksheet that lists the number of total yearly passengers at the top six airports. To prepare for an upcoming meeting, you will create a clustered column chart to compare the number of passengers at each airport. Then, you will create a line chart that compares trends over time. Next, you will create a bar chart to compare the passenger count for the latest year of data available and then emphasize the airport with the largest number of passenger traffic. Finally, you want to insert sparklines to visually represent trends in passengers at each airport over the 10-year period.

     

Start Excel. Download and open the file named Exp19_Excel_Ch03_ML1_Airports.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

 

You want to create a   clustered column chart to depict the passenger counts at the six airports   over several years.
  Use Quick Analysis to create a clustered column chart for the range A4:L10.   Cut the chart and paste it in cell A15.

 

You want to customize   the column chart with a chart title, display the years as a data series,   enlarge the chart to be easier to read, and apply a chart style.
  •Type Passengers by Top U.S. Airports as the chart title.
  •Swap the data on the category axis and in the legend.
  •Set a 3.5″ height and 11.4″ width.
  •Apply the Style 7 chart style.

 

The value axis takes   up a lot of space for the numbers. You will adjust the value axis to simplify   it.
  •Change the display units to Millions for the value axis.
  •Edit the axis title to display Millions of Passengers.

 

 

You want to focus on   the 2016 data series by adding data labels.
  Display data labels above the columns for the 2016 data series only.

 

Applying a fill color   to the chart area will make the chart visually appealing.
  Apply the Light Gradient – Accent 2 preset gradient fill to the chart area.

 

 

A best practice is to   add Alt Text to a chart for accessibility compliance.
  Add Alt Text: The chart displays the number of passengers in millions   for the top six airports from 2006 to 2016. (including the period).

 

When you change the   workbook theme, Excel applies that theme to the chart styles.
  Change the workbook theme to Slice.

 

 

You want to create a   bar chart to display passenger counts for only one year.
  Create a recommended clustered bar chart for the range A5:A10 and L5:L10 and move   the chart to a chart sheet named Bar Chart.

 

You want to customize   the bar chart.
  •Change the chart color to Colorful Palette 3.
  •Enter Passengers at Top 6 U.S. Airports in 2016 as the chart title.
  •Apply the Style 5 chart style.
  •Add Alt Text: The bar chart shows passengers at Top 6 U.S.   Airports in 2016. Atlanta had the most passengers. (including the   period).

 

 

Modifying the axes   will improve readability of the bar chart.
  •Change the font size to 10 for the category axis and value axis.
  •Change the value axis Maximum Bound to 1.1E8.

 

 

You will format a   data point so that it stands out and then add gridlines to enhance   readability in the bar chart.
  •Format the Atlanta data point with Dark Blue, Text 2 fill color.
  •Add Primary Minor Vertical gridlines.

 

A line chart   effectively shows trends over time for the passenger counts at the different   airports.
  Create a line chart using the range A4:L10 in the Passenger worksheet and   move the chart to a chart sheet named Line Chart. Add a chart title   Passengers at U.S. Airports 2006-2016 and bold the title.

 

 

You want to customize   the line chart.
  •Set the Minimum Bound at 4.0E7 for the value axis. The Maximum   Bound should change to 1.1E8 automatically.
  •Set the Vertical (Value) Axis Display units to Millions. Delete the Vertical   (Value) Axis Display Units Label from the upper-left corner of the chart. Add   a value axis title In Millions.
  •Change the font size to 10 for the value axis and category axis.
  •Move the legend to the top.
  •Filter the chart by deselecting the odd-numbered years.
  •Add Alt Text: The line chart displays trends for top six   U.S. airports from 2006 to 2016 at two-year intervals. (including the   period).

 

 

Sparklines provide a   simple visualization to represent data in a worksheet.
  Display the Passenger worksheet and insert Line sparklines in the range   M5:M10 to illustrate the data in the range B5:L10.

 

 

You want to customize   the sparklines to point out high and low points.
  •Show the high and low points in each sparkline.
  •Apply Black, Text 1 color to the high point marker in each sparkline
 

 

On the Questions   worksheet, type the answer to the first question in cell A2. Enter only the   airport code.
  Answer the other questions by typing in the answers in cells A3, A4, A5, and   A6.

 

Group the Bar Chart   and Line Chart sheets and insert a footer with Exploring Series on the left side, the   sheet name code in the center, and the file name code on the right on all   worksheets. Group the Passenger and Questions sheets and insert a footer with   the same data. Change to Normal view.

 

Set page formats for   the Passenger worksheet.
  Select Legal paper size, select Landscape orientation, set 0.3″ left and right   margins, and scale to fit 1 page.

 

Save and close Exp19_Excel_Ch03_ML1_Airports.xlsx.   Exit Excel. Submit the file as directed.

Lab2 Until today Until 6PM

I need these answers because I want to have answers, If I do not get answers then I will not be able to have a good grade:((. Please someone help me. 

I need to write it in a computer way {for example: like netbeans}

My Gmail is: [email protected]

risk mitigation plan

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.

The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan

1000 words, APA format with references needed.