Networking

1.How many valid host addresses are on the network 172.16.41.0/27? (2 points)

a. 65,534

b.30

c.14

d.254

and so on

please open attached file to see rest of the question

Linux

Lab #3-1 Making and Mounting Images

In this lab, you will learn how to make and mount images created using “dcfldd”.  We will go over the image-making procedure using a Linux laptop computer and then we will use another Linux laptop to mount the image like you would mount any file system. Then the students will write a 3 to 4-page paper (not including the title and references pages) describing how the process was carried out in the lab.  The students will then post the report to moodle and print the report out and put it into their lab notebooks. Make sure you use APA format and adhere to the writing rubric.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least 2-3 peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Lab #3-2 Building off Discussion Question 3.3 (Shell Scripting)

In this lab, you will learn how to create shell scripts using the Bourne Shell Scripting language. The student will have to do research on the Bourne Shell Scripting language and then write a script that asks the First Name , Last Name, Age, and Country of origin of the student and then print out these items in a statement Then the students will write a 3 to 4-page paper (not including the title and references pages) describing how the process was carried out in the lab.  The students will then post the report to Moodle and print the report out and put it into their lab notebooks. Make sure you use APA format and adhere to the writing rubric.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least 2-3 peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Deliverable 5 – Learning to Communicate Globally Through the Platform of Social Media

 

Competency

Integrate the positive and negative effects of social media making global communication easily accessible.

Instructions

When using social media, the communication barrier of distance is eliminated. This comes with obvious benefits, but it also comes with extra challenges due to the increased potential for misunderstandings with cultural differences and language barriers. The person that knows how to use communication opportunities will have a strong advantage in their work and in their networking and relationships.

This assignment has two parts to it.

Part 1:

Locate and study social media pages of businesses that are making an effort to market their product globally. You can use any social media platform you choose. Examine what you believe the companies are doing well and what can be improved. Look for ways in which their communication are clear to a large number of people, breaking through language and cultural barriers. Also look for ways in which the pages could be improved due to the limitations and challenges of global communication.

After you have studied several pages that are seeking to reach a large number of people, choose three of them.

1A. Choose the page that you feel does the best job overall.

Describe why you feel like this social media page was the best one that you viewed. Take a screenshot of the page and upload it with your submission.

1B. Choose one that needs improvement.

Describe what you see that needs improvement in their effort to reach people globally. Take a screenshot of the page and upload it with your submission.

1C. Choose one that most closely represents the type of page that you might create in the future. If you have no interest or potential need for ever creating a social media page that is intended to reach the masses globally, then choose one that you are interested in and like.

Describe why you chose this social media page as the one that you can best relate to or like the best. Take a screenshot of the page and upload it with your submission.

Note: Do not use the same social media page for more than one of these three choices. For example, do not say that one social media page was the best and also the one that you would be most likely to create a similar page as.  In other words, do not use one social media page for both 1A and 1C. You need to choose three separate pages in total.

Part 2:

Now you will use what you have learned to create your own social media page with the intent of reaching the masses. You will not need to actually create a page on a social media platform. Creating a fake company or organization online could obviously cause problems. Instead, emulate the formatting of a social media page, and create it so that you can submit it to your instructor.

Take what you learned from Part 1 to create the best fake social media page you can on an imaginary company or organization of your choice. Your company or organization can be anything you want, just ensure that it is class-appropriate. Describe what you learned in this assignment and how you incorporated that knowledge into your social media page.

Week 10 & 11

1)  you are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

2)  Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

3)  Discuss in 300 words whether the government should regulate Facebook more closely.   

Using JCA in Java- 5pgs due in 5hrs

Estimation of time required for brute-force search attack on the password-based encryption

(To use the attached program, do not use your own program,please)

This assignment asks you to estimate the time required for successful brute-force search attack on password-based encryption using JCA in Java. It assumes that you have done Lab 1, Lab2, Lab3 (see attachment).

Make a list of passwords, mentioned in item 3 of Section 1.2 of Lab 1 instructions (page 2)

For password-based DES encryption implementation in JCA (Lab 2 and Lab 3) fix some salt and iteration count and record an average time required for encryption/decryption (done in Lab 3);

For each of the passwords above estimate the time required for successful brute-force search attack, assuming that an attacker knows:

• the predefined plaintext;

• the ciphertext produced;

• the salt;

• the iteration count;

• but no password.

Investigate how the time required for the attack depends on the iteration count;

Consider a variant of the attack, in which an attacker knows everything as above, except the iteration count, and estimate the time required to recover the passwords;

Compare your estimated time with the estimated time returned for the same passwords by online services (Lab 1, page 2) and propose plausible explanation of any observed differences.

Write a report on the above, providing an evidence for your arguments (e.g. snippets of code used to estimate time required for one encryption).

Assignment 07/03

 

During this course, you will complete individual papers addressing an IT business integration issue. 

For your opening paper, consider your current organization or one with which you are very familiar. You may also want to speak with the IT manager or director in order to get additional information. Research how your organization either uses or can use IT strategically to help the business gain or maintain a competitive advantage.

In your opening paper, include a paragraph that introduces the organization and the business market they serve. In your next paragraph describe the organization’s strategic approach to using IT. Conclude your paper with a summary paragraph introducing your opening thoughts and recommendations regarding areas where the organization may be able to address gaps in IT strategy and value to the business.

Submit your opening research summary as a minimum 1-page paper. (One page of content, not including the cover page or references page)

Each paper must be completed using the APA template provided in the course.

risk assessment on Acme Enterprise

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment

concepts we have learned about thus far. Each of the areas of the infrastructure mentioned

above is where you will concentrate your assessments. After you have completed your risk

assessment, you will then provide recommendations for each area that you assessed to

reduce risk, exposure, and threat. Also, as part of your final submission demonstrate

through a redesign where your mitigations will take place within the architecture. You can

use the image below as guide for your risk analysis of each area.

Analyze your own leadership style

Here is an assessment on Leadership Style. Please take this assessment and provide an analysis of the results. How does this relate to you? How does your style impact the technological tools that you will use as a leader? How would you use your style to lead your organization? 

https://www.mindtools.com/pages/article/leadership-style-quiz.htm 

You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (250+ total words) and include at least one APA-formatted external citation/reference. Please follow up with two subsequent replies to colleagues. Each reply should consist of a relevant paragraph containing 50 words or more.

Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings.