Ethical hacking

Wk -3 (2-3 Paragraphs)

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.

WK -4(2-3 Paragraphs)

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

WK -5

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Business Intelligence – End-of-Chapter questions

Chapter 3 – Discussion question #1, #2, #3, #4 &
                     Exercise #12

Chapter 4 – Discussion question #1, #2, #3, #4 & #5 &
                     Exercise #1

– Each answer must be at least 125 words

– 2 references apa format

– no plagiarism

Discussion

 One of the most important aspect of developing good projects and programs is planning. 

Noted author Mark Twain hit it on the head when he said, “The Secret of getting ahead is getting started. The secret of getting started is breaking your complex overwhelming tasks into small manageable ones then starting on the first one.”

Why is Planning Important? Give an example where you used planning and its importance.  This can be in any area of life: home building/projects, school, work, etc. Include any sources you use to answer this question. 

operational excellence assignment 23

 

HW#2: Achieving Operational Excellence: Using Internet Tools to Increase Efficiency and Productivity

Software skills: Web browser software and presentation software

Business skills: Employee productivity analysis 

In this project, you’ll suggest applications of Internet technology to help employees at real-world company work more efficiently. 

Dirt Bikes’s management is concerned about how much money is being spent communicating with people inside and outside the company and on obtaining information about developments in the motorcycle industry and the global economy. You have been asked to investigate how Internet tools and technology could be used to help Dirt Bikes employees communicate and obtain information more efficiently. Dirt Bikes provides Internet access to all its employees who use desktop computers. 

How could the various Internet tools help employees at Dirt Bikes? Create a matrix showing what types of employees and business functions would benefit from using each type of tool and why.

How could Dirt Bikes benefit from intranets for its sales and marketing, human resources, and manufacturing and production departments? Select one of these departments and describe the kind of information that could be provided by an intranet for that department. How could this intranet increase efficiency and productivity for that department?

Use electronic presentation software to summarize your findings for management.

wk7 etc research paper

 

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

• Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)

• Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

CRCs code

https://github.com/xaviermerino/ECE1552/tree/master/CRC-3

Lab Task #1

You are a detective. You have received the latest intelligence data on the target. The messages might have changed unintentionally when traveling through the network. You must implement CRC-3 to discover if the data you’ve obtained is error-free. Your polynomial is x^3 + x + 1. Each message is at most 29 bits long. Good luck!

This is what you are given:

unsigned int polynomial = 11;
unsigned int data[3] = {23, 80, 13548};
unsigned int crc[3] = {6, 4, 4};

The variable polynomial is the decimal representation of x^3 + x + 1. The array data contains information about latitude, longitude, and elevation of the target. The array crc contains the original calculated CRC-3 for the data.

Go through the data array and calculate the CRC-3 for each item in the array. Compare your calculation with the provided one in the crc array. Print [OK] or [FAILED] accordingly. If the calculations do not match, print the calculated CRC and expected CRC. Print the steps required to get to the calculated CRC.

In order to calculate the CRC-3 we are going to create a function crc3(). This function returns the check value of the CRC-3. We use printSteps to aide in our debugging. When set to true, it prints the binary steps.

The following function prototype is given:

unsigned int crc3(unsigned int binary, unsigned int polynomial, bool printSteps = false);

Example output is shown below for reference.

Latitude: 23	[FAILED]
Calculated CRC: 3
Expected CRC: 6

10111000
10110000
--------
00001000

00001000
00001011
--------
00000011


Longitude: 80 [FAILED]
Calculated CRC: 5
Expected CRC: 4

1010000000
1011000000
----------
0001000000

0001000000
0001011000
----------
0000011000

0000011000
0000010110
----------
0000001110

0000001110
0000001011
----------
0000000101


Elevation: 13548 [OK]

11010011101100000
10110000000000000
-----------------
01100011101100000

01100011101100000
01011000000000000
-----------------
00111011101100000

00111011101100000
00101100000000000
-----------------
00010111101100000

00010111101100000
00010110000000000
-----------------
00000001101100000

00000001101100000
00000001011000000
-----------------
00000000110100000

00000000110100000
00000000101100000
-----------------
00000000011000000

00000000011000000
00000000010110000
-----------------
00000000001110000

00000000001110000
00000000001011000
-----------------
00000000000101000

00000000000101000
00000000000101100
-----------------
00000000000000100

Part A: Cryptography (Dr Martin Tunnicliffe) – worth 50%

  

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.

2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Authentication and Non-repudiation. 

3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?

4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?

5. Will there be issues of compatibility between the organization’s cryptographic policy, and that of the NHS?

6. How will your solution scale with the possible future development of the organization?

7. How will cryptographic keys (and certificates) be created and managed?

8. How will the different levels of authorization within the organization be managed?

9. How will the effectiveness of your solution be monitored and assessed?

These are only suggestions: your report will likely not cover all of themand you may discover others of equal importance which you might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count:2,000

Computer science

 

Support your response with specific evidence from your selected study, as well as the Learning Resources, outside resources, and personal experience.

Assignment: Mention the most critical success factors for Big Data Analytics (Watson, Sharda, & Schrader, 2012), then describe them briefly.

Portfolio Project

  

APA format is required. All references should be from the years 2010 to present day. There should be a minimum of ten unique references. The body of the paper should be 5-7 pages in length, not including the title and reference pages.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 

 Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

 

Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

 

Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short? 

Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The Use of Enterprise Resource Planning (ERP) in a Manufacturing Company

Overview:

SAP is an enterprise resource planning (ERP) manufacturing software that offers

industry-specific functionalities designed to help midsize companies boost operational

efficiency, strengthen customer relationships and enhance business agility. The use of

ERP encourages an integrated view of business processes to better manage financials,

inventory, human resources, product development, sales, and marketing.

Instructions:

Imagine a manufacturing company that is using a centralized system based on ERP, for

example, SAP. Based on what you know from your own company or from the materials,

write a short paper focusing on the following points:

• The advantages of a centralized system.

• The supply chain management (SCM) and its interaction with the strategic

information system (SIS).

• The company’s customer relationship management (CRM) and how they are

managing their relationship with their vendors.

Requirements:

• This assignment is a paper consisting of 2-3-pages, using APA formatting and

citations.

• Include at least two resources.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

I am currently unable to do more than what I am offering. If you can not do it I understand. Please do not ask for more than what I can currently afford. 

Thank You!