week 6

 In order to prevent common web-based attacks such as cross-site scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injections, organizations need the right tools to detect and prevent these issues before code goes to production. Both Dynamic Application Security Testing (DAST) and Static application security testing (SAST) tools are often integrated into an organization’s CI/CD pipeline to scan for vulnerabilities. For this week’s assignment, discuss the differences between DAST and SAST. Include any pros and cons for each type, how organizations can benefit, examples of what issues can be found, and any specific tools in your response. Your assignment should be 2-3 pages in length, with two or more references in APA Format cited in your response. 

Discussion 12

On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words APA format with citation and reference.

Physical security 2

 

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

Ethical Tactics in negotiation

 

Each student will select one of the key terms listed below and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key Terms:

  • Ethical tactics in Negotiation 
  • Deceptive Tactics in Negotiation
  • Cultural influences to Negotiation
  • The Golden Rule

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

Machine Language

 

In this assignment, you are given 5 programming challenges (20 pts per question). And you need to write MASM assembly codes using techniques we covered about 8086 assemblies in our previous lectures. You may write your assembly code for each question in separate files (e.g. 1.asm, 2.asm, …, 5.asm) and submit them (compressed or separately) through D2L system. Your code should be able to be executed in MS-DOS or its compatible systems and produce the correct output. The due time for this assignment is 10/01/2020 11:30 pm Central US time.

======= Challenges ======

Q1> Create a stack in RAM from address 0x20000 and initialize its capacity with 10 bytes. Store two values A1h, B2h in turn and pop the values to AX and BX registers separately. In the end, interrupt the procedure and return.

Q2> Store two values A1h and B2h in RAM, your data segment should start at address 0x20000 and offsets 8 and 16 (in decimal) respectively. In the end, interrupt the procedure and return.

Q3> Calculate 2^10 (2 to the power of 10) with a loop and store the result to the DX register. In the end, interrupt the procedure and return.

Q4> May or may not use the ES register, iteratively copy 10 continuous byte values stored in memory from 0x20000 to 0x20100. In the end, interrupt the procedure and return.

Q5> Sequentially scan 10 bytes from your code segment (from the beginning) and accumulate the summation result to the DX register. In the end, interrupt the procedure and return.

White or Gray Hat Hacking

 Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas to explain why a company might benefit from hiring someone to hack into their systems in3-4 paragraphs in APA format

Emerging Information Tech

 

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?

Please ask any questions in this week’s discussion.