Cyber Security

 The answer will be checked for plagiarism. 

  1. Discuss OSINT, how it works, and its role in the realm of social engineering.
  2. Why is it difficult to detect fileless malware on a traditional anti-virus tool? Explain.
  3. What are the major ingredients which you would consider if you have been 
    tasked to develop an incident response (IR) plan from the scratch?
  4. What is Cyber Threat Intelligence (CTI)? Explain the difference between Cyber Threat Intelligence and Cyber Intelligence.
  5. What is SCDA security and what are the biggest security/risk concerns of these systems?

 The answer will be checked for plagiarism.

 

Assignment 5-Fast Scrabble Words

 

You shall write a C++ program that:

  1. Reads an arbitrary number of whitespace-delimited tokens from standard input.
  2. Determines and prints (to standard output) two decimal integer values:
    1. The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in /srv/datasets/scrabble-hybrid.
    2. The total number of points that all those words would be worth in Scrabble, according to the letter values in /srv/datasets/scrabble-letter-values.

Specific Requirements

  1. You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
  2. Open and read the contents of each relevant data file exactly once.
  3. Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
  4. Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.

Cyber Terrorism

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

week 5

week 5. needs to be added to the attached white paper in paragraph form. week 3 needs revision also included in the white paper. 

short answer

 

  • Object-oriented programming is used in all types of development projects, such as mobile development, windows development, and cloud-based service development. Explain three benefits of object-oriented programming that you have identified as essential for creating web applications. What evidence can you present that discourages the use of object-oriented programming?
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Research Essay

 Description 

Your final research essay will present a comparison of Sara Teasdale’s poem, “There Will Come Soft Rains” and Ray Bradbury’s short story “There Will Come Soft Rains.” Your will address one of the following questions: 

1) What is the role of humanity in each of the two texts? Expand by illustrating the relationship between nature and humanity as represented in the poem and between humanity and technology as represented in the short story. 

the link for the poem: https://poets.org/poem/there-will-come-soft-rains

the link for the short story: https://urcourses.uregina.ca/pluginfile.php/2300543/mod_resource/content/1/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf

you need to compare  both the poem and short story and write a research essay based on the question.

Week 10 Discussion – Cyber Law

Discussion on Social media:

Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.

Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 450 words. Please add references in APA format.

Network

Identify a network that you are familiar with at home or at work. List at least 3 hardware components. What do they each do? You do not need to cite and reference but you do need to explain how they are used.  

500 words.