Essay assignments

Chapter 3 – Complete the two essay assignments noted below: 

  • Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.
  • Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

Information Assurence

Topic: Cryptographic Applications 

  Recommend 4-5 pages (body), including a cover page and reference page (does not count toward 4-5 pages), at least three references and in APA format with 12pt font DOUBLE SPACED ONLY! If you do more than double space you WILL lose points! Safe Assign needs to be under 35% .

C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

6-2 Memo: The Importance of Clarity and Conciseness

Instructions

As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some older directives that were never carried out, mostly because of their unclear nature.

One example included an email stating that the recipient (within the R&D team) was to “create a presentation discussing the new product and send it to interested departments.” Others included a request from Sales to Technical Support for “a list of the biggest problems with our hot products” and a memo from Finance to all departments to “reduce the number of suppliers being used to better control costs.”

In a memo to your team, describe what is wrong with directives such as these and how to improve these messages so that they are delivered to the recipient with clarity and conciseness.

3-5 page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?

 

Prepare a 3-5 page paper on the future of digital currency litigation and the implications for taxation. What are the pros and cons? How will this ultimately impact the business world?

Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.

Cyber security Planning and Management: Internet Search Week6

 

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3 paragraphs in length.

Organ Leader

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what performance management is and how it influences effective teams.
  2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

 

Text Book : 

https://books.google.com/books?id=Pkm3DwAAQBAJ&pg=PT105&source=gbs_selected_pages&cad=2#v=onepage&q&f=true 

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.