- Define a denial-of-service attack in your own words.
- Explain how this type of attack can adversely impact infrastructure.
- Explain methods organizations can implement to prevent DoS attacks from occurring.
1000 words
CSCI 457 Assignment 4 – Address book
Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc. Requirements: • The list of the branches should be displayed in a table. • The cells in the table must have a colorful background. You may use any color except black, white, and gray. • Each cell of the table should contain a thumbnail of that branch, with its name and city. • When the user taps on a cell, a new view will pop up, showing the location of the branch on the map. • The pin on the map should contain a thumbnail of the branch, with its address. • On the top-right corner of the map, there should be a button. When the user taps the button, the map should be closed, and the program shall return to the table of the branches. (Hint: Use unwind in Lecture 12.) • When you submit this assignment, please compress the entire project folder into a single zip file and upload it to the submission link. You can find more hints in Lectures 10, 11, 12, and 13.
ERD vaariables
There is a use case associated with the assignment. You need to incorporate ALL requirements into the ERD, not just some components into the ERD Diagram. There are various examples that I have provided throughout the semester. I have pointed to another one so you know what I am explicitly expecting to see.
About the ERD Diagram
- I expect to see a diagram such as this: Database Development: Entity Relationship Diagram (impacttechnology.co.uk).
- If I see a diagram that looks like this: entity-relationship-diagram.pdf (texample.net), the assignment will fair poorly for you and/or your team. That is NOT an ERD. (I always get one or two every semester).
- I have provided numerous hints through all the lectures on how to build the diagram out (i.e. the use case is a collection of many textbook examples).
Deliverables
- An ERD Diagram (PDF File ONLY)
- A Word / PDF Document that describes exactly what is in your ERD. This helps me make sure you know what you modeled! Also, on that document, please tell me who did what for the assignment.
- Please provide me example screen shots to a working prototype of your database and/or access to the database. Make the dataset realistic, not scrap data. I will need to have access to the database if that is your preferred option until December 11, 2020 at 11:59pm EST unless I ask otherwise.
Cloud Computing in Education – Paper – 13 hrs
The topic of the paper is “Cloud Computing in Education”. Paper should consist of following sections and I have listed the section by resources to.
1. Abstract (1/2 page)
2. Introduction ( 1/2 page)
3. (2 pages)
a. Cloud Computing in Higher Education
b. The Challenges of Cloud Computing in Higher Education
– https://www.librarystudentjournal.org/index-php/lsj/article/view/289/321/#need?CSRF_TOKEN=1451c54f7aa59da7d6999c2281cefc17892a7939
4. Proposed Architecture for HE institutes (3 page)
– section 7 in paper- https://www.sciencedirect.com/science/article/pii/S221256711400224X
5. Advantages of using e-learning in the cloud (1/2 page)
– section 4 in paper- https://www.orizonturi.ucdc.ro/arhiva/2014_khe_6_pdf/khe_vol_6_iss_2_100to103.pdf
6. Conclusion (1/2 page)
Abstract, introduction and conclusion can be grabbed from below links(latest paper is the preference)
https://d1wqtxts1xzle7.cloudfront.net/44685282/IJIRSTV2I10084.pdf?1460530711=&response-content-disposition=inline%3B+filename%3DCloud_Computing_in_Education_Sector.pdf&Expires=1602376924&Signature=Bt2TMamjaN5OrthY7dGqyvrJ4LQ3CgctpRpaZTN~n6PA-dtKcjGjU5Mt3SeKQGTHW-t3IvWgomad29U9ZNWKWJKAAl68XvJtOloYi6VlhAQqttNrb52YNLr-yRPiR7kf5JFBtr1pMJk5KIdrXqMq08~iUGCpK0tjFrIJV~2t-cVjoDwQ12O44Y8ii8~HOB1QJ6zTZRcIHbhzlxFzrPSlJplCgssG0NF7FYIjbB5wnLABeo4ldCrbzyVhmg0YPQ9FzTrYpC0~DuMmSAg5AUM3dyfBOPcHRNexKROg7bZDPR5-FXlBrL5hv1vS~rvzOiQ58cptnRMV4NT4JVrylcJuYA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
https://link.springer.com/chapter/10.1007/978-1-4614-3329-3_2
http://www.ijcte.org/papers/511-G1346.pdf
Discussion 8 – info tech strat plan
In the last week of class, we are going to complete a reflection activity.
This discussion topic is to be reflective and will be using your own words (500 words)and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.
Items to include in the initial thread:
- “Interesting Assignments” – What were some of the more interesting assignments to you?
- “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
- “Perspective” – How has this course changed your perspective?
- “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?
A10
Please go through the attached document for full assignment details
Cloud_Computing_week_11
Discussion Topic:
1. Describe how web pages differ from apps and how apps differ from widgets.
2. Discuss why developers say that HTML5 will drive mobile solutions.
Paper:
write a paper on mobile cloud computing. The following are the items to discuss in the paper:
- Define and describe the mobile web.
- Describe the different generations of cell phones.
- Describe how smartphones differ from ordinary cell phones.
- Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.
Paper requirements:
- Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
- Minimum of four (4) references
- Format your paper consistent with APA guidelines
- When submitting the assignment, please ensure you are submitting as an attached MS Word document.
What is Objective
- How do the different views look at the problem of objectivity?
Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more .
Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more .
Strategic IT Exam
Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
A. boot sector
B. file infector
C. file destroyer
D. file command
Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
Question 3 of 20 5.0 Points
__________ invented the movable-type printing press that accelerated the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
Question 9 of 20 5.0 Points
__________ is a type of software for securing information systems by allowing only specific users access to specific computers, applications, or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
Question 14 of 20 5.0 Points
A(n) __________ is an ongoing planning process involving risk assessment, risk reduction planning, and plan implementation as well as ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
Question 20 of 20 5.0 Points
Some spam e-mail includes __________, which are attempts to trick financial account and credit card holders into giving away their authorization information.
A. freaking
B. tricking
C. phishing
D. luring