CRCs code

https://github.com/xaviermerino/ECE1552/tree/master/CRC-3

Lab Task #1

You are a detective. You have received the latest intelligence data on the target. The messages might have changed unintentionally when traveling through the network. You must implement CRC-3 to discover if the data you’ve obtained is error-free. Your polynomial is x^3 + x + 1. Each message is at most 29 bits long. Good luck!

This is what you are given:

unsigned int polynomial = 11;
unsigned int data[3] = {23, 80, 13548};
unsigned int crc[3] = {6, 4, 4};

The variable polynomial is the decimal representation of x^3 + x + 1. The array data contains information about latitude, longitude, and elevation of the target. The array crc contains the original calculated CRC-3 for the data.

Go through the data array and calculate the CRC-3 for each item in the array. Compare your calculation with the provided one in the crc array. Print [OK] or [FAILED] accordingly. If the calculations do not match, print the calculated CRC and expected CRC. Print the steps required to get to the calculated CRC.

In order to calculate the CRC-3 we are going to create a function crc3(). This function returns the check value of the CRC-3. We use printSteps to aide in our debugging. When set to true, it prints the binary steps.

The following function prototype is given:

unsigned int crc3(unsigned int binary, unsigned int polynomial, bool printSteps = false);

Example output is shown below for reference.

Latitude: 23	[FAILED]
Calculated CRC: 3
Expected CRC: 6

10111000
10110000
--------
00001000

00001000
00001011
--------
00000011


Longitude: 80 [FAILED]
Calculated CRC: 5
Expected CRC: 4

1010000000
1011000000
----------
0001000000

0001000000
0001011000
----------
0000011000

0000011000
0000010110
----------
0000001110

0000001110
0000001011
----------
0000000101


Elevation: 13548 [OK]

11010011101100000
10110000000000000
-----------------
01100011101100000

01100011101100000
01011000000000000
-----------------
00111011101100000

00111011101100000
00101100000000000
-----------------
00010111101100000

00010111101100000
00010110000000000
-----------------
00000001101100000

00000001101100000
00000001011000000
-----------------
00000000110100000

00000000110100000
00000000101100000
-----------------
00000000011000000

00000000011000000
00000000010110000
-----------------
00000000001110000

00000000001110000
00000000001011000
-----------------
00000000000101000

00000000000101000
00000000000101100
-----------------
00000000000000100

Part A: Cryptography (Dr Martin Tunnicliffe) – worth 50%

  

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.

2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Authentication and Non-repudiation. 

3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?

4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?

5. Will there be issues of compatibility between the organization’s cryptographic policy, and that of the NHS?

6. How will your solution scale with the possible future development of the organization?

7. How will cryptographic keys (and certificates) be created and managed?

8. How will the different levels of authorization within the organization be managed?

9. How will the effectiveness of your solution be monitored and assessed?

These are only suggestions: your report will likely not cover all of themand you may discover others of equal importance which you might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count:2,000

Computer science

 

Support your response with specific evidence from your selected study, as well as the Learning Resources, outside resources, and personal experience.

Assignment: Mention the most critical success factors for Big Data Analytics (Watson, Sharda, & Schrader, 2012), then describe them briefly.

Portfolio Project

  

APA format is required. All references should be from the years 2010 to present day. There should be a minimum of ten unique references. The body of the paper should be 5-7 pages in length, not including the title and reference pages.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header. 

 Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

 

Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

 

Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short? 

Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

The Use of Enterprise Resource Planning (ERP) in a Manufacturing Company

Overview:

SAP is an enterprise resource planning (ERP) manufacturing software that offers

industry-specific functionalities designed to help midsize companies boost operational

efficiency, strengthen customer relationships and enhance business agility. The use of

ERP encourages an integrated view of business processes to better manage financials,

inventory, human resources, product development, sales, and marketing.

Instructions:

Imagine a manufacturing company that is using a centralized system based on ERP, for

example, SAP. Based on what you know from your own company or from the materials,

write a short paper focusing on the following points:

• The advantages of a centralized system.

• The supply chain management (SCM) and its interaction with the strategic

information system (SIS).

• The company’s customer relationship management (CRM) and how they are

managing their relationship with their vendors.

Requirements:

• This assignment is a paper consisting of 2-3-pages, using APA formatting and

citations.

• Include at least two resources.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

I am currently unable to do more than what I am offering. If you can not do it I understand. Please do not ask for more than what I can currently afford. 

Thank You!

paper

Follow the doc for questions and concepts on which the questions must be answered 

Forensic Assignment 9

Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching one research paper that does just that and it is a great read. Please check out the Forensic Models.pdf found in the Supplemental Materials folder.

 Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime. It’s all fascinating. Then the article proposes a new one Generic Computer Forensic Investigation Model (GCFIM).

I would like you to read this – who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.

Instructions

Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you prefer the other models and if so what is your preference and why? Note – there are NO right or wrong answers here. I value your insights. No more than 2 pages please.

Assignment

 

create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.

  • A case study assessing risk and proposing security for some chosen organization (real).
  • Review of a security incident or threat, describing it in-depth and proposing a controls for future use
  • Technology review, reviewing some security product or control technology
  • Survey of technology, theory, or practice building on and expanding some topic covered

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words

Assignment (500 WORDS MINIMUM)

  

Web Analytics – Labeling Visitors, Sessions, Pages, and Web Server Log Files vs. Java Scripting

Assignment Instructions:

· Define the importance of custom variables, attached chapter 9 (Advanced Web Metrics with Google Analytics by Brian Clifton) explains the importance of each variable, and how each is restricted to one particular scope level.

· Explain in as much detail as you can regarding the scope of each of these levels; Visitor Level, Session Level and Page Level.

· Compare and contrast web server log files vs. JavaScript tagging

· What would you recommend in terms of the variables you would set for an ecommerce site? Would this recommendation be dependent on the type of business or any other factors?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.