Denial of Service attack

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    1000 words 

CSCI 457 Assignment 4 – Address book

 Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc. Requirements: • The list of the branches should be displayed in a table. • The cells in the table must have a colorful background. You may use any color except black, white, and gray. • Each cell of the table should contain a thumbnail of that branch, with its name and city. • When the user taps on a cell, a new view will pop up, showing the location of the branch on the map. • The pin on the map should contain a thumbnail of the branch, with its address. • On the top-right corner of the map, there should be a button. When the user taps the button, the map should be closed, and the program shall return to the table of the branches. (Hint: Use unwind in Lecture 12.) • When you submit this assignment, please compress the entire project folder into a single zip file and upload it to the submission link. You can find more hints in Lectures 10, 11, 12, and 13. 

ERD vaariables

 

There is a use case associated with  the assignment. You need to incorporate ALL requirements into the ERD,  not just some components into the ERD Diagram. There are various  examples that I have provided throughout the semester. I have pointed to  another one so you know what I am explicitly expecting to see. 

About the ERD Diagram

Deliverables

  • An ERD Diagram (PDF File ONLY)
  • A Word / PDF Document that  describes exactly what is in your ERD. This helps me make sure you know  what you modeled! Also, on that document, please tell me who did what  for the assignment. 
  • Please provide me example screen  shots to a working prototype of your database and/or access to the  database. Make the dataset realistic, not scrap data. I will need to  have access to the database if that is your preferred option until  December 11, 2020 at 11:59pm EST unless I ask otherwise. 

Cloud Computing in Education – Paper – 13 hrs

The topic of the paper is “Cloud Computing in Education”. Paper should consist of following sections and I have listed the section by resources to.

1. Abstract (1/2 page)

2. Introduction ( 1/2 page)

3. (2 pages)

a. Cloud Computing in Higher Education

b. The Challenges of Cloud Computing in Higher Education

– https://www.librarystudentjournal.org/index-php/lsj/article/view/289/321/#need?CSRF_TOKEN=1451c54f7aa59da7d6999c2281cefc17892a7939

4. Proposed Architecture for HE institutes (3 page)

– section 7 in paper- https://www.sciencedirect.com/science/article/pii/S221256711400224X

5. Advantages of using e-learning in the cloud (1/2 page)

– section 4 in paper- https://www.orizonturi.ucdc.ro/arhiva/2014_khe_6_pdf/khe_vol_6_iss_2_100to103.pdf

6. Conclusion (1/2 page)

Abstract, introduction and conclusion can be grabbed from below links(latest paper is the preference)

https://d1wqtxts1xzle7.cloudfront.net/44685282/IJIRSTV2I10084.pdf?1460530711=&response-content-disposition=inline%3B+filename%3DCloud_Computing_in_Education_Sector.pdf&Expires=1602376924&Signature=Bt2TMamjaN5OrthY7dGqyvrJ4LQ3CgctpRpaZTN~n6PA-dtKcjGjU5Mt3SeKQGTHW-t3IvWgomad29U9ZNWKWJKAAl68XvJtOloYi6VlhAQqttNrb52YNLr-yRPiR7kf5JFBtr1pMJk5KIdrXqMq08~iUGCpK0tjFrIJV~2t-cVjoDwQ12O44Y8ii8~HOB1QJ6zTZRcIHbhzlxFzrPSlJplCgssG0NF7FYIjbB5wnLABeo4ldCrbzyVhmg0YPQ9FzTrYpC0~DuMmSAg5AUM3dyfBOPcHRNexKROg7bZDPR5-FXlBrL5hv1vS~rvzOiQ58cptnRMV4NT4JVrylcJuYA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

https://link.springer.com/chapter/10.1007/978-1-4614-3329-3_2

http://www.ijcte.org/papers/511-G1346.pdf

Discussion 8 – info tech strat plan

In the last week of class, we are going to complete a reflection activity.

This discussion topic is to be reflective and will be using your own words (500 words)and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in the initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?

A10

Please go through the attached document for full assignment details

Cloud_Computing_week_11

Discussion Topic: 

1. Describe how web pages differ from apps and how apps differ from widgets. 

2. Discuss why developers say that HTML5 will drive mobile solutions. 

Paper:

write a paper on mobile cloud computing. The following are the items to discuss in the paper:

  • Define and describe the mobile web.
  • Describe the different generations of cell phones.
  • Describe how smartphones differ from ordinary cell phones.
  • Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Strategic IT Exam

 

Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
 

A. boot sector
B. file infector
C. file destroyer
D. file command
 

Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
 

Question 3 of 20 5.0 Points
 __________ invented the movable-type printing press that accelerated  the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
 

Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
 

Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
 

Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
 

Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
 

Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
 

Question 9 of 20 5.0 Points
 __________ is a type of software for securing information systems by  allowing only specific users access to specific computers, applications,  or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
 

Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
 

Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
 

Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
 

Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
 

Question 14 of 20 5.0 Points
 A(n) __________ is an ongoing planning process involving risk  assessment, risk reduction planning, and plan implementation as well as  ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
 

Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
 

Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
 

Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
 

Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
 

Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
 

Question 20 of 20 5.0 Points
 Some spam e-mail includes __________, which are attempts to trick  financial account and credit card holders into giving away their  authorization information.
A. freaking
B. tricking
C. phishing
D. luring