Assignment2020

 Follow the instructions outlined in the attached PowerPoint presentation.  Use the information to write a 5-page paper conducting a risk assessment based on the information from the presentation.  Remember proper APA formatting, cite and paraprhase your sources. 

Discussion question, 350 words 4 references.

Review at least 4 articles on Balanced Scorecard and complete the following activities:

1.  Write annotated summary of each article. 

2.  As an IT professional, discuss how you will use Balanced Scorecard to manage IT resources efficiently.

Information security

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. 

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Enterprise Security Plan Strategic Objectives

 

Assignment Content

  1. An enterprise security plan is a document that explains the security exposure that an entity would encounter in a specific marketplace. A committee of people typically writes this document over a span of a few months. Many times the drafts begin with developing a high-level overview of strategic objectives that address how to secure the enterprise inside and outside the enterprise.

    The CEO asks you to explain the core principles of enterprise security and respond to five strategic objectives as part of the overall enterprise system security plan draft. They are:

    • Data-loss prevention
    • Access controls
    • Data management
    • Risk management
    • Cloud technology
    • For each of the five strategic objectives, write a response that addresses the following:
    • Key initiative: Why is this topic important to Auburn Regional?
    • Objectives: What is the desired outcome to this effort?
    • Description: What is the specific strategic objective? Provide a high-level explanation.
    • Benefits: What will be the benefits of this effort?
    • Outcome: What will be done to meet this objective?
    • Include any charts, graphics, or infographics created in previous weeks that support your findings.

      Compile your response with the following:

    • An updated executive summary
    • A final recommendation
    • At least three new references throughout your plan overview, cited according to APA guidelines.
    • Incorporate feedback and use previous assignments as a resource. As a guideline, an overview of this nature is typically 3 to 4 pages long.

homework computer

File Submission: Computer Deals

Objective of the activity

After learning the characteristics of the components of the Data Processing Cycle, students will apply the knowledge acquired through the exercise of selecting a computer offering that meets their needs.

Instructions

What are we going to do?

The student will reflect on the requirements that the computer that he needs for his studies and to practice his profession must have.

How are you going to do?

Download the Computer Offers filePreview the document

Look for three (3) computer deals.

Capture the screens of the three offers, including their description.

Detail in a table the components of the computer (main memory (RAM), CPU, Hard disk, components such as: printer, webcam, speakers, monitor, included programs …

Write in a paragraph in which you explain which of the three computers has the greatest capacity. Argument, based on what you researched and learned in the module.

Based on your needs as a student and professional, determine which of the three offers is right for you, regardless of price.

Deliverable

The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). Submit the answers in a Word document, Times New Roman, size 12. You must include the references in APA format, three years old or less.

Word file with the completed Computer Offers table. Must include:

The screenshots of the offers (including their description).

The paragraph determining which of the three has the greatest capacity and which of the three offers meet your needs as a student and professional.

References (where you got the bids from)

Answer the following question

 

Consider the reputation service and the needs of both individual consumers and large organizations that are security conscious.

What will be the expectations and requirements of the customers?

Will small-scale consumers’ needs be different from those of enterprises?

Who owns the data that is being served from the reputation service?

What kinds of protections might a customer expect from other customers when accessing reputations?

Research Paper – Info Tech Strat Plan

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

research writing

 1) Write and submit a paper on the topic “Cryptography and the Internet of Things” 2) The submission should be written in IEEE Proceedings Manuscripts style: two columns, single-spaced. You may find a template file at URL: http://www.ieee.org/web/publications/authors/transjnl/index.htm1. It should not be more than 2 pages long (including references and figures) and should contain an Abstract, Introduction, Main Body and Conclusion section at the minimum. 3) Anyone who reads the paper should be able to find answers to the following questions. a. What is the Internet of Things (IoT) and how does it change the dynamics of security in cyberspace? b. What are the classes of devices that run on the IoT and what are their security needs? c. What are lightweight cryptographic algorithms and why are they needed in the IoT space? d. What are the classes and approaches for creating lightweight cryptographic algorithms? e. How to evaluate lightweight cryptographic algorithm? Provide a brief evaluation of at least 3 lightweight cryptographic algorithms. 4) Your paper should also have a. At least 4 references b. At least 2 of the following, a graph, a table or a figure. If you choose to include a graph or a figure you must create them yourself. Do not copy images directly from another source 5) Copying the sentences directly from your references or other sources into your paper is plagiarism. Ensure that you write your paper using your own words. 6) Your submission will be judged based on the following criteria: Format/Organization Content Clarity Technical Depth Originality 

Course Mapping Document

The statement should provide a narrative or story about the student, including details about when he/she came to the U.S. to study, the degree program pursued, any previous OPT employment, why he/she decided to pursue a second Master’s degree program (if applicable), how he/she obtained CPT employment, job duties and experience gained during CPT employment, relevant and important courses taken that are helpful for CPT employment, etc.