Discuss the best practices for implementing an access control system.
500 words APA format
Discuss the best practices for implementing an access control system.
500 words APA format
Please find the attachment and please follow the instructions
Explain and provide example when it is possible that will cover chapter 6 subjects:
•Network architecture components
•Traditional network design
•Building-block network design
–Needs analysis
–Technology design
–Cost assessment
Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:
•[WANsim] WAN simulators and emulators http://www.wan-sim.net/
•[OPNET] OPNET Modeler, http://www.opnet.com/
•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/
•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page
•[NS3] NS3 official website, http://www.nsnam.org/documents.html
•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/
•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html
•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html
•[J-Sim] J-Sim homepage http://www.j-sim.org/
•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary
•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/
Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?
*******
You will develop your research project in stages throughout the course, to include: selecting a topic, submitting an abstract/outline, and submitting your final project (paper) for evaluation. You must support your materials by using at least five appropriate, properly cited sources in addition to your course textbook. Your project (paper) will comprise 3000 words (not including title and reference pages). Your project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins.
Text book: Technology Ventures : from idea to enterprise 5th edition by Thomas Byers ISBN: 9781260048490
Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter’s 3 & 4 (Jamsa, 2013).Chapter 3 topics:
Chapter 4 topics:
NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.
Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.
Check the attached files of “OS Security II,” for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.
If you are not familiar with measuring execution time in C++, see the following website:
https://www.geeksforgeeks.org/measure-execution-time-function-cpp/
If you are not familiar with measuring execution time in Python, see the following website:
https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution
See the following steps.
1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.
2. Compute the hash of the password from step 1.
Your hash function H() is simply the checksum. (See Assignment 2)
3. Now you become an attacker and try to find the password of length N.
Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.
Measure execution time.
4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.
5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.
6. Now you become an attacker and try to find the concatenated password salt and password.
Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.
Measure execution time.
NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.
Need help in modifying and implementing the C++ code according to the attached problem description. (C++17 complier)
In 100 words, identify a proposed topic in your discipline.
Connection to program goals and core courses
If you do NOT have a CPT code then just discuss at the end of your Topic how the Topic related to your concentration in the Ph.D. program.
Journals must be from approved list
Explain how access control protects data.
It must be at least 450 words and have references.
No plagiarism and no grammar mistakes and need APA format.
properly site the references.