Build a C program that has two functions: one for encryption and one for decryption.

 Procedure

 Implement one program that has two functions: one for encryption and one for decryption. 

Encryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.) 

Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file. 

FTK imager lite & Autopsy

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

· No Plagiarism 

· APA Format required

· Each Answer Should be 350 words without References.

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

!!! One Answer using FTK IMAGER LITE Tool !!! 

!!! Second Answer using Autopsy Tool !!! 

urgent and needed in 6 hours

Review the draft papers. Before Tuesday, post a critique for two (2) or more of these selection papers including your evaluation of how well the students justified their recommendations.

3. Before 11:59 PM ET Tuesday, post a reply to 2 different selection papers (reply in their threads) which contain your vote for the best technology selection recommendations. Along with your vote, provide a brief one paragraph justification for your choice. (These count as your follow-up postings to your peers.)

final grad project : Information Assurance

Information Security & Assurance: how the evolution of Internet of things(IoT) is effecting it? Securing today’s information systems?

NOTE: Recommended 4-5 pages, including a cover page and reference page, at least three references and in APA format.  No plagiarism must be there and no late submissions.

Week 2 Discussion Due TONIGHT

 For  this discussion, you will need to address all the tasks below and be  sure to participate fully by responding to your classmates as well.  Citations should be used to support your analysis and references should  be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!  

Now that you have been introduced to some advanced features in  Microsoft Word, you will teach the class an advanced skill in it. In  this discussion, select at least one advanced feature of Microsoft Word  and, using your own words (no copying and pasting) and examples, teach  your classmates this skill. Check the posts on the discussion board to  choose something no one else has shared yet!

In your discussions with your classmates, see if you can follow their directions or offer any help to problems they had.

You can also offer any help with challenges your classmates have shared.

By Thursday, December 10, 2020, make your initial  post to the Discussion Area. After you post your initial submission, be  sure to respond to at least two of your classmates, and to the professor  when appropriate, by Monday, December 14,2020, on at least two different days of the week.  /content/enforced/71846-17093625/Week_Two_Discussion_Question1.pptx  

Physical Security: Door and Window Lock Assessment

 Topic: Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

short answer

 

“Heuristics and Analytics”  Please respond to the following:

  • The ideal method of evaluation products involves volunteers. However, sometimes this is not feasible (i.e., product time constraint, too expensive, etc). This where experts who are knowledgeable about interaction design, needs, and typical behavior of users come into the picture. Choose a random product that you use daily and speculate on how a heuristic evaluation would be performed on that product. Provide a rationale for your response.
  • Social media websites, such as Facebook, Twitter, and e-Commerce giant Amazon, use some form of Web analytics. Speculate on the Web analytic tool that you believe is most commonly used. Justify your response.

Written Assignment 3

 

  • Who uses extended support features?
  • Why is it important to keep backups of your SQL software?
  • What did you learn about SQL after watching Brent Ozar’s video?
  • How can you keep your skills aggressively current?
  • Be specific and provide examples.

Click the link above to submit your completed assignment.Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

procedure doc

 

Write a procedure document for CSI that documents how to change a password in a platform of your choosing.

The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases.  (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)

Text should be as understandable as possible and as non-technical as practical.  Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade.  Include a glossary where needed.

Visual aids should be included.  Screen captures or photographs are very helpful to the technically challenged.

For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.

Tips

This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.

Most students tend to get caught up in the editing process.  Getting a prototype document put together, including screen captures, is usually pretty fast.  Editing can be a time black hole so be mindful of that.

Ask a non-technical person to read one of your drafts.  If they understand it, and can follow it, you have succeeded.