- A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography
- Presentation materials (PPT, handouts,)
Need 4 pages-Analyze the scenario and need to answer the questions mentioned in the document
Minimum words 600 words
In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.
This assignment should be in APA format and have to include at least two references.
Choose an organization from the education, financial, or healthcare sector to study throughout this course. Each week you explore different aspects within the IT division of the organization including:
You have been asked by the CIO of the organization you chose to create Microsoft®PowerPoint® presentation, along with an accompanying summary guide handout, for the managers of the IT, Accounting/Finance, and Engineering departments to inform them of the three dimensions of risk management.
The three dimensions of risk management shape the organizational framework of project risk management and determine the degree of freedom used to classify various realizations of uncertainties, resulting in a formalized systematic analysis of physical systems.
Research information about the organization you chose to complete this week’s assignment.
Create a 4- to 6-slide, (does not include title or reference pages) media-rich Microsoft® PowerPoint® presentation (with Speaker Notes) which describes each of the three dimensions, its definition, values, and importance to your company. Identify the potential security risks to an organization in each of the following outsourcing situations:
Note: Media-rich presentations should include multimedia such as graphics, charts, pictures, photos, drawings, video clips, or audio.
Create a 1-page ( (does not include title or reference pages) Microsoft® Word Summary Guide on this presentation. Include the following:
Include APA-formatted citations when necessary.
Describe what is strategic integration and how it ties to the implementation of technology within your business organization. Please provide examples.
Read the attached paper carefully and write a research summary ,in two sections
1- Overall summary
2- What you would like to add or change to the conclusion section
This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum
Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in Python.
If you are not familiar with measuring execution time in Python, see the following website:
https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
Identify and discuss the federal government’s four attempts to legislate business ethics since the late 1980s.
Prompt
In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html
Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.
Phase One
Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:
· Arithmetic addition
· Increment
· Decrement
· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)
· Logic bitwise Not
· Logic bitwise And
· Logic bitwise Or
· Register right logic shift
· Register left logic shift
In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’
After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.
Phase Two
In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:
· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.
· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.
· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.
Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’
Phase Three
In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:
· addition
· logic bitwise AND
· right logic shift
In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.
Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’
Phase Four
In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):
· branch to an address (name it JMP)
· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)
Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:
· Write a program that adds two operands.
· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.
· Write a program that increments by 2 the content of a register 10 times.
· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.
· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’