PHP chatroom

I have a chat room page that I need help with. I have a login page that is supposed to take the users first and last name and on submit take them to the chat.html page. then when the user types a message it shows the users name above the message.

practical connection paper on cloud computing

Develop a paper describing how the knowledge, skills or theories of this course (cloud computing) have been applied or could be applied, in a practical manner to your current work environment as an IT consultant working for an organization of your choice.

(topics eg: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a 500-word (2 pages). 

APA format.

Computer Science- Dictionary Attack with and without Password Salt program

 PowerPoint of the Slides is attached below.

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

 Explain your program appropriately using comments the source code. 

Discussion 300 WORDS MINIMUM

 

One of the most important skills we learn as adults is information literacy and the ability to evaluate sources and recognize if these sources are accurate.

For this week’s forum, we are exploring websites that check information for bias, misinformation, and possible fake news misinformation. Go to the following websites and review the methodology they use to test information for accuracy.

After you have looked over these websites and reviewed the methodology of each website, please answer the following:

  • Which website do you find has the best way to review information for accuracy?
  • Do any of these websites have any gaps in their methodology?
  • Why is it important for everyone to be able to evaluate information?

200-250 words discussion

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.

Discussion 1

 How will Blockchain increase transparency and accountability in marketing? 

  1. APA style- 500 words.
  2. Only Scholarly references.

Wk 3 – Security Standards, Policies, and Procedures Manual

 

Assignment Content

  1. Cyber security engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

    Take on the role of Cyber Security Engineer for the organization you chose in Week 1.

    Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template, with recommendations to management of security standards, policies, and procedures that should be implemented in your chosen organization.

    Research and include the following:

    • Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. 
    • Recommend appropriate policies and procedures for: 
    • Data privacy 
    • Data isolation 
    • NDA 
    • IP Protection 
    • Passwords 
    • Acceptable use of organizational assets and data 
    • Employee policies (separation of duties/training) 
    • Risk response 
    • Avoidance 
    • Transference 
    • Mitigation 
    • Acceptance 
    • Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative]
    • HIPPA 
    • FERPA 
    • ISO 
    • NIST 
    • SEC 
    • Sarbanes/Oxley 
    • Incident response 
    • Preparation 
    • Identification 
    • Containment 
    • Eradication 
    • Recovery 
    • Lessons learned 
    • Auditing 
    • Environmental/Physical 
    • Administrative
    • Configuration

BigData Research paper final

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Resource:  A. Ali, S. Latif, J. Qadir, S. Kanhere, J. Singh, “Blockchain and the Furture of the Internet: A Comprehensive Review”, arxiv.org, URL: https://arxiv.org/pdf/1904.00733v1.pdf?

Your paper should meet the following requirements:

• Be approximately 7 pages in length, not including the required cover page and reference page. Be sure to use proper APA formatting and citations to avoid plagiarism.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Conclude your paper with a detailed conclusion section. 

• Support your answers with the readings from the course, the course textbook, and at least 3 scholarly journal articles and at least 5 peer-reviewed articles to support your positions, claims, and observations. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Program Maintenance

 

Create an actionable plan including executive level support and  budget allocation to ensure security controls can be rapidly updated and  expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

  1. Procedures to track performance
  2. Procedures to monitor and measure performance for areas of improvement
  3. Procedures to identify new threats, vulnerabilities, or any countermeasures
  4. Procedures to obtain feedback on the effectiveness of policies
  5. Procedures and technical tools to monitor the internal and external environment
  6. Procedures for budget allocation
  7. Procedures to catch any oversights

APA style is not required, but solid academic writing is expected.

Refer  to ” Cybersecurity Program Maintenance Scoring Guide,” prior to  beginning the assignment to become familiar with the expectations for  successful completion.