C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

6-2 Memo: The Importance of Clarity and Conciseness

Instructions

As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some older directives that were never carried out, mostly because of their unclear nature.

One example included an email stating that the recipient (within the R&D team) was to “create a presentation discussing the new product and send it to interested departments.” Others included a request from Sales to Technical Support for “a list of the biggest problems with our hot products” and a memo from Finance to all departments to “reduce the number of suppliers being used to better control costs.”

In a memo to your team, describe what is wrong with directives such as these and how to improve these messages so that they are delivered to the recipient with clarity and conciseness.

3-5 page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?

 

Prepare a 3-5 page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.

Cyber security Planning and Management: Internet Search Week6

 

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3 paragraphs in length.

Organ Leader

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what performance management is and how it influences effective teams.
  2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

 

Text Book : 

https://books.google.com/books?id=Pkm3DwAAQBAJ&pg=PT105&source=gbs_selected_pages&cad=2#v=onepage&q&f=true 

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Hacking

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

IT203 week 6

 Submit a Word document in APA format that describes the topic you are assigned below. Explain key concepts and give examples. 

TOPIC-  Describe concept searching 

1 and half page and citation 

eParticipation, Simulation Exercise and Leadership Training in Nigeria: Bridging the Digital Divide – Discussion

 Weekly Chapter Discussions:  Chapter 19 – eParticipation, Simulation Exercise and Leadership Training in Nigeria: Bridging the Digital Divide

In the weekly Discussion tab in the course, the Professor and students interact to explore course concepts. For full credit, you are required to post on three different days (three-time each week) and follow the guidelines for the frequency and quality provided below. For your initial post, address the four sections below, and write NO more than 500 words. Your contributions should be in your own words; quote very sparingly. Be concise. All other contributions would be a reflection of the contributions of your classmates.  After your initial post, reply to the contributions by your classmates and follow the guidelines for the frequency and quality of your contributions. 

  • CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.
  • SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 
  • EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.
  • SOURCES: Include citations with your sources. Use APA style citations and references. 

Spr1.1

Assignment 1

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link:

http://www.visual-literacy.org/periodic_table/periodic_table.html

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.

Answer the following question(s):

Does a multilayered defense guarantee that attacks will not be successful? Why or why not?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 1.

Refer to the “Project Part 1-Active Directory Recommendations (1)” word document for questions and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $15 max. Please bid if you agree.