Cyber Security planning&mgmt week 11

 

Internet Research – Wk 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

HIPAA

 

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Discussion

 After reading chapter 6, analyze the structure of advanced encryption standards and why it makes them so strong. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted 

lab

 

In this lab you’ll set up your own local environment you’ll use in later labs to set up Ethereum and Hyperledger Fabric development and deployment environments. When you finish this lab, you’ll have the infrastructure in place to build many different types of virtual environments on your own computer.  

 

flash card program python

the aim of this first assignment is to implement a Linked List that is able to hold and operate on more complex data (than just one number, string, etc.). 

Specifically, the task is to create a set of flash cards. The “deck” of flash cards can be thought of as a linked list. Each flash card should have a hint (e.g. “an ADT that typically has push and pop operations”), and then will prompt for an answer from the user. The program should go through the deck of flash cards (i.e. traverse the linked list). 

See the video here for a short demonstration of what the program should look like when it is run:

What to hand in?

A single *.py file should be submitted here on Canvas. Do *not* put your name anywhere in the *.py file since this will be anonymously reviewed. 

The example of how the ouput should is the first screen shot i’ve added. the next 2 screen shots are how the assignment is graded.

Additional requirements/specs:

  • the program should have at least 3 flash cards
  • you should choose hints and answers other than those that are shown in the demonstration video
  • your cards (the hints and answers) should be hard-coded inside of your program (you do not want to have to input the cards in your program each time it is run, and, when someone else runs your program they will be able to see new flash cards that they have not seen before)

Hints/Tips:

The flow of the program is that we iterate through the deck of flash cards (i.e. the linked list), and remove a card (i.e. node) when it has been answered correctly twice. Thus, iterating over the linked list, keeping track of correct answers, and stopping when the list is empty, is 90% of the task here. Try to push as much functionality into your flash cards (nodes), and deck (list) as possible. That way the main part of your program can be very short and simple. 

The python function, “input()” will be helpful. Here is how it could be used in this program:

answer = input("ENTER 'S' FOR STACK, 'Q' FOR QUEUE', OR 'L' FOR LIST")

Cloud Computing

 

A three-tier web application architecture has been generically defined as the presentation, business logic, and data storage tiers. However, Amazon Web Services defines the three-tier web application architecture as the web, application, and storage/database tiers.

Write a paper comparing the generic three-tier web application architecture to that applied by Amazon Web Services.

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar.

Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

computer D2

 This assignment has as main purpose to give you the understanding of what an algorithm means, and a real life application can be built by providing the right instructions. Here you have the opportunity to create an algorithm that performs one of your daily tasks. You will think of what actions you are taking to fulfill that particular task, and you should create the steps that a “clone” of you should take to perform the task like you do.  

Instruction:

 

Imagine that you want to create a robot that does what you do daily. Choose a simple task, such as your preparation to go to bed at night, the morning routine, brushing teeth, walking your dog, etc. Create an algorithm to describe the prime steps to complete the task that would guide the robot to fulfill the job. 

  1. Consider a task that can be modeled through a reasonable number of steps, which is at your choice.
  2. The algorithm should include decision items when the normal conditions of executing the task are not met. For example, if you model the routine of brushing your teeth, state what happens if you run out of toothpaste, if the water is cold, and so on.
  3. Consider including repetition items. For example, while brushing teeth, you brush ten times on each side of the mouth – you can model the repetition with a loop that counts the number of brush strokes.
  4. Include at least one decision and one loop in the algorithm

To create an algorithm, you may draw a structured flowchart or write pseudocode that describes all the steps in a Word document. If you choose to draw a flowchart, you may use a web tool, draw.io (Links to an external site.), with which you can easily create a flowchart and export it as a PDF document. Here is an example structured flowchart [PDF] for your reference.

 

Your initial response should include the following: 

  • An attachment – Attach the algorithm (.pdf, .docx, or .doc) to the post.
  • A description of the task – Type directly in the body of your post a description of the task and your considerations related to the process of creating the algorithm.
  • A conclusion – Include a conclusion in the body of your post. Based on the effort made to describe one task from your daily activity, write a statement that evaluates the effort of writing an algorithm that would guide a robot executing all the routine activities that you do daily.

Research Paper

Research Paper on the topic “Cyber Security”.  It should be at least 12-15 pages with at least 5 APA citations & matching references. Formatting: Introduction; Image / Table; Conclusion; 12 TNR font; double space; clearly divided small paragraphs; bold & underline headings