Dissertation

Below qustions need to be covered in the assigment:

1)What is the goal of your research? / What are your research goals?  

2)Do you feel you will be able to gather the data for this research? If so, where? Though we are not to that point in your research it is important that you are considering this.

3)What question are you asking in your research? 

4)What research question are you trying to answer with this research?

5)Your dissertation MUST relate to your work. Does this dissertation relate to your work? (FYI, currently I work for a Telecom  project as a software engineer)

R5RS Scheme (Dr.Racket)

;; Towards a Scheme Interpreter for the Lambda Calculus — Part 1: Syntax

;; 5 points

;; , and pre-requisite for all subsequent parts of the project

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; All programming is to be carried out using the pure functional sublanguage of R5RS Scheme.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; You might want to have a look at http://www.cs.unc.edu/~stotts/723/Lambda/overview.html

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; 1. The lambda calculus is a particularly simple programming language consisting only of

;; variable references, lambda expressions with a single formal parameter, and function

;; applications.  A BNF definition of lambda calculus expressions is

;; ::= | (lambda ( ) )  |  ( )

;; Design a data type for the lambda calculus, with constructors, selectors, and classifiers.

;; For concrete representation, use Scheme, as follows:  an identifier should be represented as

;; a quoted Scheme variable, a lambda expression (lambda (x) E) as the quoted 3-element list

;; ‘(lambda (x) [list representing E]), and an application  (E1 E2) as the quoted 2-element list

;; ‘([list representing E1]  [list representing E2])

;; 2.  In (lambda () ), we say that is a binder that

;; binds all occurrences of that variable in the body, , unless some intervening

;; binder of the same variable occurs. Thus in (lambda (x) (x (lambda (x) x))),

;; the first occurrence of x binds the second occurrence of x, but not

;; the fourth.  The third occurrence of x binds the fourth occurrence of x.

;; A variable x occurs free in an expression E if there is some occurrence of x which is not

;; bound by any binder of x in E.  A variable x occurs bound in an expression E if it is

;; not free in E.  Thus x occurs free in (lambda (y) x), bound in (lambda (x) x), and both

;; free and bound in (lambda (y) (x (lambda (x) x))).

;; As a consequence of this definition, we can say that a variable x occurs free in a

;; lambda calculus expression E iff one of the following holds:

;;   (i) E = x

;;   (ii) E = (lambda (y) E’), where x is distinct from y and x occurs free in E’

;;   (iii) E = (E’ E”) and x occurs free in E’ or x occurs free in E”

;; Observe that this is an inductive definition, exploiting the structure of lambda calculus

;; expressions.

;; Similarly, a variable x occurs bound in a lambda calculus expression E iff one of the

;; following holds:

;;   (i) E = (lambda (x) E’) and x occurs free in E’

;;   (ii) E = (lambda (y) E’), and x occurs bound in E’: here, y may be x, or distinct from x

;;   (iii) E = (E1 E2) and x occurs bound in either E1 or E2

;; Develop and prove correct a procedure free-vars that inputs a list representing a lambda calculus

;; expression E and outputs a list without repetitions (that is, a set) of the variables occurring

;; free in E.

;; Develop and prove correct a procedure bound-vars that inputs a list representing a lambda calculus

;; expression E and outputs the set of variables which occur bound in E.

;; 3.  Define a function all-ids which returns the set of all symbols — free or bound variables,

;; as well as the lambda identifiers for which there are no bound occurrences — which occur in

;; a lambda calculus expression E.  

Wk 1 – Apply: Threats to Confidentiality, Integrity, and Availability

Assignment Content

  1. There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks.

    Create a 1-to 2 -page table, in Microsoft® Word, listing a minimum of 6 threats using the column headers and details below:

    • Threat – List the threat.
    • Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type.
    • Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA.
    • Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences.
    • Example:
      Threat: Password Compromise
      Threat to Type of Data: Data-At-Rest
      Confidentiality/Integrity/Availability: C & I
      Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.

      Include a short paragraph that highlights two access control techniques or policies that enforce security.

      Cite at least two resources within the assignment in APA format.

Need Response to below discussion

Please read the below discussion posts and provide two responses in 50 to 75 words

Post#1

 

DNS Failover is designed to operate at the DNS level. That is, the level before a client connects to any of your servers. DNS essentially converts your domain name (e.g.www.example.com) into the IP address of your server. By monitoring applications and altering DNS dynamically so clients are pointed to different IP addresses, you can control traffic fairly easily and expensively. However, DNS failover does have two notable limitations: a) DNS Failover does not fix an outage when a client is already connected to an application. This is because their browser may not query DNS again for quite some time. b) DNS Failover has a TTL cache issue that could take anywhere from 1 to 30 minutes or more for the IP address change to be visible around the world. This is since many ISP’s recursive DNS servers cache longer than required to reduce traffic. “Time is an important component of the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS caches rely on an absolute notion of time (e.g., “August 8, 2018 at 11:59pm”) to determine how long DNS records can be cached (i.e., their Time To Live (TTL)) and to determine the validity interval of DNSSEC signatures. This is especially interesting for two reasons” (Malhotra, 2019).

DNS Failover has been around for quite some time and is reliable. As a result, the sequential mode is the most popular for e-commerce applications or where back-end databases exist and some type of synchronization step is required before falling back to the primary. The cloud network monitors all of the available servers based on the monitoring criteria you specify via the management GUI and when it detects the primary down, it automatically fails over to the secondary IP (or if the secondary is down, fails over to the tertiary, etc.). In a typical static content scenario, when the primary comes back, it updates DNS again to send traffic to the primary. However, in an application where back-end databases must be synchronized, you can easily disable auto-failback to prevent the primary server from receiving traffic again. “A passive redundancy approach with diversification has been applied to intrusion-tolerant systems (ITSs) that aim to tolerate cyberattacks on a server” (Okamoto, 2017).

The monitoring system will still alert you that it is back online, but you have to manually force it to start receiving traffic again. This allows you to perform whatever tasks are required to ensure that the primary has the latest copy of the database or whatever is required. One critical drawback to using DNS failover in a situation where back-end synchronization is critical is when the primary is only down for a very short period. The short period would be sufficient to trigger a failover, but insufficient so that existing client connections (or new connections where the TTL cache has not expired) permit some clients to still hit the primary site. In this case, both the primary and secondary sites could receive traffic and create completely different databases that are very difficult to synchronize. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Reguero Naredo, 2017).

Post#2

 

            Cloud computing efficiency and security depends on several security concerns related to networks and connectivity. Protecting information system in cloud environment, from threats can be done largely by maintaining secure data traffic. The concepts of Domain Name System failover and Cloud failover come in this context of data traffic security. These two are most popular approaches in cloud security and share some similarities and dissimilarities between each other.

Comparison

            Functionality of DNS and cloud failover depends on the authentication of IP addresses largely. Both the preventive measures in cloud service security find out necessary action to recover from failures such as downtime recovery. Both the solutions need open access to public cloud in order to become active. The monitoring mechanism used in both the systems are almost equal and works in the same way for identification of servers and detection of faults (Naredo & Pardavila, 2017). DNS and Cloud failover are equally capable of delivering fast recovery as soon as within 60 seconds and can change functions automatically based on the requirement scenario.

The differences in cloud and DNS failover starts with the process through which these functions run. DNS finds easiest solution in re-routing of traffic in cases where a particular server fails, and it makes the traffic run through other active servers. A system embedded in the process helps in detecting the active server through a technique known as ‘round-robin’ method. A fault in DNS failover is that it contains the cached data which keeps revolving till one user’s Time to Live (TTL) in the server. “A DNS Load Balancer Daemon (LBD) has been developed at CERN as a cost-effective way to balance applications accepting DNS timing dynamics and not requiring persistence” (Naredo & Pardavila, 2017).

Cloud failover is popular for its accuracy and precision of carrying out the task necessary for sustained uptime. It does not send cached data back frequently. Sessions cared by cloud have better utilization capacities as it allows remote deployment unlike DNS failover where critical applications of a server are interrupted. To sustain through the TTLs, cloud failover uses session-wise load-balancing that proves to be more efficient than round-robin of DNS. Further, DNS failover fails to offer the flexibility due to the pre-determined conditioning that makes it a rigit system. Cloud, however, includes the DNS often for offering optimized result via a permanent proxy IP address. “DNS, being open-source, is less secure and it has no uncommon method for deciding if data has been intercepted while transmission or information of a domain name originates from an approved domain owner or not” (Ansari et. Al., 2020).

Conclusion

As a result of limitations, cloud failover service is costlier than DNS. There are steady improvements identifiable in DNS in global network. Some of the services are also allowing cache-free recovery of server. In spite of the advancements, it is yet to compete equally with cloud failover. On the other hand, cloud has its challenges too. “In spite of Cloud Computing services seem to be very attractive as an alternative to traditional on-premise data centers, there is still some concern about the providers availability” (Goncalves  & Fagotto, 2018).

Cyber Security

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Discussion1

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

300 words in APA style with a minimum of 2-3 references.