Discussions 3

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 3 & 4  (Jamsa, 2013).Chapter 3 topics:

  • Define and describe PaaS.
  • List the benefits of PaaS solutions.
  • Describe potential disadvantages of PaaS.
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with a PaaS.

Chapter 4 topics:

  • Define and describe IaaS.
  • Define and describe system redundancy. Discuss how you might use IaaS to implement a redundancy plan.
  • Define and describe load balancing. Discuss how you might use IaaS to implement load balancing.
  • Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis?
  • Define and describe colocation. Discuss how you might use IaaS to implement colocation.
  • Compare and contrast a cloud-based disk storage device (with a file system) with a cloud based database.
  • Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Dissertation topic proposal

In 100 words, identify a proposed topic in your discipline.

Connection to program goals and core courses

If you do NOT have a CPT code then just discuss at the end of your Topic how the Topic related to your concentration in the Ph.D. program.

Journals must be from approved list

Access control discussion 8

Explain how access control protects data.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.

Operational Excellence – Paper

ITS 631 Paper #1 (Chapters 1 – 5 Bourgeois)    Niccole Hyatt, PhD Professor

100 Points Possible  Open Textbook and Resources

Individual Effort Only!

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. How can they be overcome? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? What are the disadvantages? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

5 Pages 

Order # 12527

Title: Network Installation

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine your cousin, Frank, just bought a small hardware store. He wants to install a network that will include 14 PCs; a printer, scanner, and fax combination; and a cable modem line that are all currently configured as a P2P network. Frank is on a tight budget, so he would like to do the work himself. He has been conducting research and cannot decide if he should install Cat5, Cat6, or fiber. He has asked you to help with his decision.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Then, using research you conduct on the Internet and the lab activity as references, write a 3–5-page report in which you make recommendations to Frank. Address the following:

•Compare and contrast the different cabling standards.

•Discuss the cost benefits of client/server networks.

•Define the basic concepts of network cabling.

•Recommend a network to Frank based on your research.

•Apply the concepts from the practice lab activity for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

Discussion

 After reading chapter 13, analyze the advantages and disadvantages of digital signatures. 

Security Architecture & design discussion

Length: Minimum of 400 words

Due date: Sunday, November 22, 2020 by 4:00PM EST

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Question:
Why do good requirements go bad?  What can be done to prevent things from going bad?

InfoTech Import in Strat Plan (ITS-831)

Research Paper: Develop a Computer/Internet Security Policy

Word count: 2 to 3 pages

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

1. Chapter 10, “Information Systems Sourcing”

Text book: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

2. Chapter 10, “Information Systems Sourcing” pp. 224-234

Buhrendorf, E. (2019). Outsourcing IT is a money-saving cyber safety net for company data. Fairfield County Business Journal, 55(20), 12. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=b9h&AN=136657455&site=eds-live

plagiarism check required, Good work, APA format, include References, within 8hrs