Case study

 2. Case Study

  • Download the lab file “Compare Data with a Hash lab”
  • Follow the instruction mentioned within the lab file to complete it.
  • Provide screen shot for every step of this lab.
  • Provide the answers to the questions within the lab file.

Business process redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

ROTOR MACHINE CIPHER IMPLEMENTATION

  1) Using any programming language of your choice implement the encryption scheme that uses a simple two cylinder rotor machine. It is not necessary to implement the decryption scheme [50 marks] Please note that your submission is expected to run on IRIS. Please ensure that you use a programming language that is compatible with IRIS and also ensure the program can run on IRIS before submitting it 2) Specifications: The program should start by randomly generating the mappings for the inner and outer cylinders, with the inner cylinder rotating faster than the outer cylinder. You can use any data structure to implement the cylinders but a “map” data structure is recommended. The program should then prompt the user for an input string to encrypt. When the user presses the enter, the program should validate and encrypt the input string. Validation would mean that the string is well formed and is not a command. It should then output the encrypted text and prompt the user for another text value. The cylinders should update their state after each character encryption. At any time, the user should be able to enter a predefined string to exit the program. The program should also contain a sub-routine that prints out the current state of the cylinders by entering a predefined command at the prompt. Example output might look like: Inner Cylinder 25 ↔ 4 6 ↔ 11 . . Outer Cylinder 13 ↔ 12 12 ↔ 24 . . In coding the above, please note the following • White space, numeric and special characters should not be encrypted. Simply output whitespace, numeric and special characters into the ciphertext • You can write your code to be case insensitive – convert all input to lower case 3) What can you say about the computational complexity of your algorithm relative to the size of the input string? [10 marks] Test 1 [10 marks] 1) Output the state of your cylinders. 2) Encrypt the string “A” and output its encrypted value. 3) Output the state of your cylinders. Test 2 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “EE” and output its encrypted value. 3) Output the state of your cylinders. 4) Is a rotor machine a monoalphabetic or polyalphabetic cipher? Comment based on the results above. Test 3 [15 marks] 1) Output the state of your cylinders. 2) Encrypt the string “Mr. Jock, TV quiz PhD, bags few lynx” and output its encrypted value. 3) Output the state of your cylinders. 4) Comment on the state of your cylinders before and after encryption. Please provide an explanation for what you observe. Submission 1) Submit the following documents separately in Blackboard by the deadline. NO ZIPPED FILES ALLOWED 1) All your code files 2) A detailed README file, which should explain how to run the code with sample input and output. If you are unfamiliar with READMEs you can find an introduction here https://www.makeareadme.com/ , here https://medium.com/@meakaakka/a-beginners-guide-to-writing-a-kickassreadme-7ac01da88ab3 and here v=RZ5vduluea4. Note that the README file you

submit for this project need not be complex, it only needs to at least explain how

to compile the code and run the code with examples. [5 marks]

3) A MAKEFILE that automates the building/compiling of your code. If you are

unfamiliar with Makefiles you can get a quick introduction here

https://www.youtube.com/watch?v=vye0kV5gvkA and here

https://swcarpentry.github.io/make-novice/02-makefiles/. Note that the exact

structure of your makefile will depend on the programming language you are

using, so you may choose to find an example specific to you. The Makefile you

create for this assignment need not be complicated. It only needs to define the

TARGET, its DEPENDENCIES, if any and the COMMAND to create the target

executable. [5 marks]

4) A report (which should include your answer to Question 3 and your test results

with screen shots)

IT-project management

  

  

Pretend your team has been given a computer by the T-Zone Help Desk with the instructions to rename the computer from John Martinson to the name of the new owner (John sold the computer to his niece, Alison Rogers). John made his administrative password “password” and his administrative username is Admin; his computer’s name is “JohnLaptop.” He created a user account for himself, “John” and his user account password is “English!9&”. Your job is to 

1. delete or rename the user account so that it is changed from John’s to Alison’s account, 

2. create a new password, 

3. change the administrative account to include a new administrative password, and 

4. change the computer name from “JohnLaptop” to “Alison Rogers Computer”.

Can you do this using the Registry? 

· If so, write down the process you used to change the computer account. 

· If not, write the details of the method you used to change the computer account. 

DELIVERABLE:

describe how you went about renaming the computer and changing accounts from John to Alison. That person should submit the document in Canvas on behalf of the team.

web browser forensics_3.1

 

Web Browser Tools

Last week you completed a short APA research paper on an overview of a particular Web Browser, this week we are going to dig a little deeper. You are to explore the different web browser forensic tools available, both paid and free. You are to research the different tools available to you, concentrate on free tools, and provide a summary of the tools and how you can use them to perform web browser forensics. You should also note whether the tools can be used on virtual machines.

Your research should include a 3-4 page executive summary paper in APA format, with all supporting references and screen shots of the software you explored that is available for you to use. Eventually you will be providing a video on the software in action and you using the software.  The goal is to be able to use the software to conduct the investigation and analysis and provide a final report for testimony, just to give you an idea on where we are heading.