700 word discussion– What are these three sectors? identify and name those three sectors, and provide a brief narrative for each sector by keeping the proper headings for each sector.

Chapter 18 – According to literature review and the EU Energy Security and ICT Policy, the authors indicated that, the points of departure of the EU’s (European Commission 2007) energy policy was threefold: combating climate change, limiting the EU’s external vulnerability to imported hydrocarbons, and promoting growth and jobs, thereby providing secure and affordable energy for consumers. The main focus of the EU’s policy ideally was to move towards a single global regime and the mainstreaming of climate into other policies; and hence receiving a 20% portion out of the entire 2014–2020 EU budget.  The focus at the urban level was to produce the greatest results in an energy-efficient effort that will integrate three sectors.

700 word discussion– What are these three sectors? identify and name those three sectors, and provide a brief narrative for each sector by keeping the proper headings for each sector.

Hexadecimal Calculator

Please check the attached file.

Hexadecimal Calculator Implement a hexadecimal calculator for iOS. Requirements: • The calculator should support 4 basic arithmetic operations: + – * and / • The calculator will operate on hexadecimal numbers, not decimal numbers • The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions. • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. • The calculator should handle overflow and underflow gracefully. The app must not crash. • The calculator should handle division-by-zero error gracefully. The app must not crash. • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. Hint: • To convert a string to a hex number, use “radix: 16” as an argument. For example: var s:String? s = “1A” var intHex:UInt = 0 intHex = UInt(s!, radix: 16)! print(intHex) // shows 26 intHex = 90 s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. • Strings may be concatenated by using + operator. E.g. var s1 = “1234” var s2 = “5” print(s1 + s2) // shows 12345 You may want to do string concatenation in the action of each digit button. • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. • To support different devices and orientations, use stack view, scroll view, or both. • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interfaces worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why. The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing-looking, it should be fine. 

discussion-5

 

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

4 discussion

Best Practices for IT Infrastructure Security Policies

Discuss at least four (4) best practices for IT infrastructure security policies in domains other than the User Domain. Pick one domain outside the user-domain to focus on. Address the following topics using your own words:

  • IT framework selection
  • When to modify existing policies that belong to other organizations versus creating your own policies from scratch
  • Policy flexibility
  • Cohesiveness
  • Coherency
  • Ownership

Explain your answers. 350-400 words must.

Cyber security questions

1. Calculate the timing of password-guessing attacks:

(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?

(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?

(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password.

  2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.

• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)

• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)

• access control matrix

• capability

3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.

4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections?

  5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

  6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.

  7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver.

  8. Humans are said to be the weakest link in any security system. Give an example for each of the following:

(a) a situation in which human failure could lead to a compromise of encrypted data

(b) a situation in which human failure could lead to a compromise of identification and authentication

(c) a situation in which human failure could lead to a compromise of access control.

 9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value? 

10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Computer Science

Conduct research over the Internet and find an article the concentrates on statistical testing. Discuss approaches for producing valid results in data mining problems. Is there significance testing, and/or modeling of null and alternative distributions? How about statistical testing for association analysis? What about statistical testing for cluster analysis and/or anomaly detection?

APA format

Minimum 2 pages

No plagiarism

No content spinning

Include all references

Python Programming

Requirements

For the following problem:

– Each module must be written in Python and submitted as an executable .py file (NOT the Jupyter notebook file)

– Each module must have header comments at the top of the program that include:

o The Course

o The assignment number

o The submission or creation date

o The author’s name

– Comments should be used to help explain your code if it may need explanation

Question 1

Write a module that simulates the rolling of 1 or more dice, then compare the theoretical with the actual results.

– The user must be asked how many dice will be used in the simulation. The number of dice should be between 1 and 16 inclusive. Your code should validate the user entry.

– The user must be asked for the number of rolls of the dice to simulate. Your code should validate the user entry to be a positive integer with a minimum value of 1.

– Your program must count the number of times each total of the dice faces appears. For example, if you have 3 dice, you will count the number of times 3, 4, 5, …. 18 appears.

– Your program must display a list of values representing the percentage of the total that each total appears, the theoretical likelihood, and the percentage error between the two values.

The name of the file must be of the form: FirstName_LastName_A02_Q1.py, where FirstName and LastName are your first name and last name respectively.

(continued on next page…)

Question 2

Write a module that counts the number of times each word appears in paragraph.

– The user must be able to enter a number of sentences. You can assume that each sentence ends in a period. (No other punctuation needs to be considered.) You may use any mechanism you wish to enter the sentences. However, you must explicitly tell the user what they need to do when entering.

– When the user finishes entering the sentences, the program displays each unique word found in the paragraph, along with a count of how many times that word appears. The list must be displayed in alphabetical order.

– Unique words are not case sensitive. For example, ‘House’ and ‘house’ are considered the same.

The name of the file must be of the form: FirstName_LastName_A02_Q2.py, where FirstName and LastName are your first name and last name respectively.

CAseStudy 5

Read Aggressive Sales Quotas or Unfair Business Practice? and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/aggressive-sales-quotas-or-unfair-bus-practice/

Discussion Questions:

  • Describe, specifically, the ethical dilemma that Peter faced.
  • What are virtues Peter needed to act as he did? What do you think motivated him?
  • What were the risks Peter faced in making this decision?
  • What factors do you think assist people in making moral decisions in the face of a great deal of pressure?

Purpose of the assessment (with ULO Mapping)

  

Purpose of the assessment (with ULO Mapping)

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

Describe architectural VPN design for small, medium and large businesses and corporations

Report on the health of the existing VPN architecture, solution, data, application, and technology

Discuss the appropriate security design and solutions for varieties of organisations

Report on the current and future state of the management of VPN infrastructure and its technologiesInterpret a roadmap process to transform the VPN architecture to support long-term organisations’ goalsImplement a process to support the administration and the management of VPN