week 5

 Minimum words 600 words

In  the following scenario you are the CISSO of a Major E-commerce  Organization. The organization has decided to migrate their entire IT  infrastructure and associated processes to the cloud. Considering the  ecosystem of the cloud and the ever-present threats, you’ve been tasked  to develop a secure implementation plan which includes the ability for  threat modeling and simulations.

  • Paper should be developed in accordance to APA
  • Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

Discussion

 

  1. How many teams are involved in recovering the mission critical systems?
  2. What is the process to secure a high level of communication among the different teams in executing the DR plan?

Three Dimensions of Risk Management

 

Choose an organization from the education, financial, or healthcare sector to study throughout this course. Each week you explore different aspects within the IT division of the organization including:

  • 3 dimensions of risk management
  • Potential risks during a server database migration
  • Risk assessment and continuity plan
  • Request for proposal for new web servers
  • Monte Carlo method

You have been asked by the CIO of the organization you chose to create Microsoft®PowerPoint® presentation, along with an accompanying summary guide handout, for the managers of the IT, Accounting/Finance, and Engineering departments to inform them of the three dimensions of risk management.

The three dimensions of risk management shape the organizational framework of project risk management and determine the degree of freedom used to classify various realizations of uncertainties, resulting in a formalized systematic analysis of physical systems.

Research information about the organization you chose to complete this week’s assignment.

Part A:

Create a 4- to 6-slide, (does not include title or reference pages) media-rich Microsoft® PowerPoint® presentation (with Speaker Notes) which describes each of the three dimensions, its definition, values, and importance to your company. Identify the potential security risks to an organization in each of the following outsourcing situations:

  • The implementation of an external service provider for data/security protection
  • The use of contractual service providers for processing information systems applications such as a payroll, human resources, or sales order taking
  • The use of an offshore company to support your desktop computers
  • The use of an third-party governance to provide network support

Note: Media-rich presentations should include multimedia such as graphics, charts, pictures, photos, drawings, video clips, or audio.

Part B:

Create a 1-page ( (does not include title or reference pages) Microsoft® Word Summary Guide on this presentation. Include the following:

  • Risk considerations during the development and implementation of information systems
  • The importance of Information systems risk management
  • A summary of the organizational risk management framework
  • The risk register of the highest risk of information security to the organization

Include APA-formatted citations when necessary.

research summary

 

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section 

This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

Python dictionary attack for user input passwor, then, salting the password with user given number then again performing dictionary attack and calculating time

  

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

SIMPLE ALU

Prompt

In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

· Arithmetic addition

· Increment

· Decrement

· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)

· Logic bitwise Not

· Logic bitwise And

· Logic bitwise Or

· Register right logic shift

· Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.

· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.

· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

· addition

· logic bitwise AND

· right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

· branch to an address (name it JMP)

· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

· Write a program that adds two operands.

· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.

· Write a program that increments by 2 the content of a register 10 times.

· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’