Capstone Assignment week2

Question 1: 400 words

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new inter organizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Minimum of two references and one of the references needs to be from Text book to be used: Reynolds, George W. Information Technology for Managers, 2nd edition.(2016). Cengage Learning. ISBN: 978-1-305-38983-0.

Electronic

 identify the best electronic element to secure a highly secure environment like the NSA 

Computer Science- Dictionary Attack with and without Password Salt program

 PowerPoint of the Slides is attached below.

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

 Explain your program appropriately using comments the source code. 

Hexadecimal Calculator using Swift

Implement a hexadecimal calculator for iOS. Requirements: 

• The calculator should support 4 basic arithmetic operations: + – * and / 

• The calculator will operate on hexadecimal numbers, not decimal numbers 

• The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions.

 • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. 

• The calculator should handle overflow and underflow gracefully. The app must not crash. 

• The calculator should handle division-by-zero error gracefully. The app must not crash. 

• The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. 

Hint:

 • To convert a string to a hex number, use “radix: 16” as an argument. 

For example: var s:String? 

s = “1A” 

var intHex:UInt = 0 

intHex = UInt(s!, radix: 16)! 

print(intHex) 

// shows 26

 intHex = 90

 s = String(intHex, radix: 16).uppercased()

 print(s!)

 // shows 5A

• It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. 

• Strings may be concatenated by using + operator. 

E.g. var s1 = “1234” var s2 = “5” 

print(s1 + s2)

 // shows 12345 

You may want to do string concatenation in the action of each digit button.

 • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. 

• To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. 

• To support different devices and orientations, use stack view, scroll view, or both. 

• Design your algorithm first! 

Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.

Chat application demo (using Angular and spring)

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.

Digital Forensics

  

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

MSDF-630: Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in MSDF-630 provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Questions

 1. 500 words:

Chapter 9 Cluster Analysis

Answer the following questions in a point by point fashion.  NOT an essay. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

  1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not to be desirable?
  2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.
  3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.
  4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?
  5. Explain the difference between likelihood and probability.
  6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Requirement: 

Provide a question and Answer Paper with six (6) Questions specifically answered one after the other 

You must use properly formatted APA in-text citations and scholarly references. NO Copying and Pasting from the Internet or other past student paper. There is no redo for plagiarism. 

2. 250 Words:

 

Consider the mean of a cluster of objects from a binary transaction data set.

1. What are the minimum and maximum values of the components of the mean?

2. What is the interpretation of components of the cluster mean?

3. Which components most accurately characterize the objects in the cluster?

Please clearly LIST your response out to all THREE (3) questions and ensure to cite the specific article with the binary transaction of data set. I will be examing this for myself and other students should verify this as well. Provide the Author, YYYY  and specific page number, with any content brought into the discussion.

CS

Q1  Network Access Control. (600 – 800 WORDS)

     1 a.  Explain how it is relevant to network security.  Be as clear as you can in explaining your topic by using examples, software, hardware, etc. ( 200 words).

Computer Science

Write about Operation security Course Importance ( covering segregation of duties, Enterprise data breach causes, challenges )

Should be in APA format with references around 500 words. 

DQ

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.