ETCM DISCUSSION-1

Topic:  After reviewing 1 and 2 Chapters in below text book, Describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data?

Discussion should be between 250-to-300 words. 

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

Make sure APA format, citation are very key.

Time: 36 hours

Text Book:  https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/4837883?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27%2528ISC%2529%25C2%25B2%2520CISSP%2520Certified%2520Information%2520Systems%2520Security%2520Professional%2520Official%2520Study%2520Guide%2520%2528%2520PDFDrive.com%2520%2529%25282%2529.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200823T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200823%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=7fff08a758bea1467da136f30e8b64c079c4bc1827f611839a08ecc614ad4b9f 

 

Policy, Legal, Ethics and Cmplc

 

Research Project Proposal

The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. Do not zip your submission.

Respond helpfully to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Wtite to help them focus and say something that you think would help them say something that would be valuable.    You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested

Caesar Cypher

Analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Minimum 350words. 

Also need 4- 5 lines two different opinions on Caesar Cypher . 

Page 92-94 in attached reference

bharg research paper

 

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use  Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

one and half page excluding citations

 Topic:

MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used.  What is the difference between a one way hash value and other cryptographic functions? Why is a “salt” important? 

CSCI 457 Assignment 3 – Biography Viewer

Choose one of your favorite games, and implement an app that shows the biography of each character of the game.

Requirements:

  • Your app should show a list of characters in the main view using a table view.
  • A small icon and some brief information of each character should be displayed in the table
    view.
  • The user can scroll up and down to see the full list.
  • The user can swipe right to reveal two buttons to favorite a character or unfavorite a
    character.
  • A checkmark is displayed for each favorite character, and the checkmark is removed if the
    character is unfavored.
  • The user can touch a character to open a detail view to see the character’s large portrait and
    full biography.
  • Do not use parallel arrays. Use a class for the characters.

Cyber Security planning&mgmt week 5

 

Writing Assignment – WK 5

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words

portfolio

 

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

EH week 13

 

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Heaps and prority queus In python

You have been provided a Python file, heap.py, which constructs a heap structure with a list. Using that code as a guide:

Develop a heap data structure using a linked structure (Nodes and Pointers)

The heap must support add and remove from the heap

All operations most abide by the rules that govern a heap (see lecture slides for reference)

Once you have your heap structure created, next you must use it as a backing structure to a priority queue.

Develop a priority queue data structure that is backed by a heap (linked structure NOT A LIST)

Implement the normal methods that accompany a priority queue structure

Enqueue, dequeue, and peek by priority not position

Also length and whether or not the structure is empty (is_empty)

Perform the following operations to showcase your working structure

Enqueue the following items: 4, 7, 5, 11, 8, 6, 9

Dequeue 3 items by priority, they should be 4, 5, & 6.

related heap.py file code is below

class Heap:

    def __init__(self):

        self.heap = [0]

        self.size = 0

    def float(self, k):

        while k // 2 > 0:

            if self.heap[k] < self.heap[k//2]:

                self.heap[k], self.heap[k//2] = self.heap[k//2], self.heap[k]

            k //= 2

    def insert(self, item):

        self.heap.append(item)

        self.size += 1

        self.float(self.size)

    def sink(self, k):

        while k * 2 <= self.size:

            mc = self.minchild(k)

            if self.heap[k] > self.heap[mc]:

                self.heap[k], self.heap[mc] = self.heap[mc], self.heap[k]

            k = mc

    def minchild(self, k):

        if k * 2 + 1 > self.size:

            return k * 2

        elif self.heap[k*2] < self.heap[k*2+1]:

            return k * 2

        else:

            return k * 2 + 1

    def pop(self):

        item = self.heap[1]

        self.heap[1] = self.heap[self.size]

        self.size -= 1

        self.heap.pop()

        self.sink(1)

        return item

h = Heap()

for i in (4, 8, 7, 2, 9, 10, 5, 1, 3, 6):

    h.insert(i)

print(h.heap)

for i in range(10):

    n = h.pop()

    print(n)

    print(h.heap)