Discussion 1 response – Cyber Law

 Question : Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world. 

I am adding my classmate’s response for the above question. You will have to write response for each post in 250 words. No references needed.  

Discussion 1: (RajeshKumar Kodali) 

The internet definitely changed somewhere between 1989 and 1995.

 The main source was privatization. After a progression of meetings, adjustments and startups, in 1993 the National Science Foundation declared plans to privatize all administrative resources associated with Internet work, helping those who were successful in mid-1995. Why? In short, NSF wanted to attract private customers and, in that sense, share the expensive picture of the Internet with them. NSF was simply pursuing its main goal of supporting US research: it was confident that a huge usage size would cut costs. (Indeed, it certainly had an unexpected result.) (Bruce, 1999).

Privatization had another unexpected result. It allowed application designers to think about building commercial applications for a previously unknown set of customers (e.g., any business or family outside scouting universities) and uses (e.g., e-commerce). This has opened up a completely different range of possible applications for the Internet and expanded its capabilities.

 The next reason was the innovation of the World Wide Web. Tim Berners-Lee decided to offer his product in shareware destinations in 1991. He founded the World Wide Web Consortium in 1994. The program had just begun to spread widely in university and soon spread everywhere. This made web applications the essential use of the internet framework and eradicated email as the primary function of the internet (Bruce, 1999).

Surprisingly, the size of the Internet began to change dramatically after 1995. From then on, it developed rapidly, surprising three billion customers the last time anyone checked. The number of pages of commercial websites has reached huge and incomprehensible figures (Bruce, 1999)

Now consider 2005-2015,Many additional applications were developed in the Internet / Web header. Perhaps the most unusual changes have occurred in the last decade with the increase in real time to watch videos and games. This detects stresses on the Internet that were not initially intended for, for example, the continuous (and without interference!) Movement of a lot of information to end customers. It also inspires massive internet usage and makes many customers willing to spend more money on faster collaborations (Glaser et al., 2002).

This also convinces numerous providers to provide customers with what they need and has prompted numerous organizations to find better approaches to utilize the additional throughput. Additionally, it inspired the fabric of the cloud, fundamentally to bring storage closer to customers, which also reconfigured the Internet in ways not initially proposed by planners. (Hi anyway, it improves the experience, so no one is complaining.)

There is another wonderful change in the Internet: the expansion of numerous devices. There was no single Internet solution for remote neighbourhoods, such as Wi-Fi. There were no plans for advanced tablets or mobile phones. There were no plans for NEST indoor dimmers, cameras from your garden, or Netflix on the porch by the pool. However, we can do each of these things on the basis that the conventions of the Internet have been expanded, reformed, modified, shaped, changed, modernized, undone, and imaginatively reconfigured for a wide variety of purposes (Glaser et al., 2002).

Someone else can focus on the many advancements to the Web over the past twenty years. This has also changed the number of customers using the internet.

————————————————————————————–

Discussion 2:(Dheeraj Kumar)

Internet is globally connecting networking systems that facilitate worldwide communications and will accessing to the data resource through huge collection of government, academic, business, public and private network. It is been governed by the agencies like as Internet Assigned Numbers Authority that will establish the universal protocols. Term World Wide Web and internet will be often be used in interchangeably but they will not be same thing internet will refer to global communication systems, includes infrastructure and hardware while web is services that is communicated over internet (Zaryn.D, 2020).

Internet is originated with US government that began in building computer networks in 1960 referred as ARPANET. In the year 1985, US nation’s science foundation commissioned development of university networks backbone referred as NSFNET. System is been replaced by the new network operated commercial internet service provider in the year 1995 Internet is brought to public on the large scale around this time  As the global network responsible for large amounts of the data transfer and the process facilitation . Intent is been evolving constantly. Rapid developments of internet have created an unstable, significant change to everyday lives of ours. Impact intent have on the society is that felt almost on everything we do from that of ordering a pizza to latest news. To have affected the way we are communicating, the way we are learning in regards to the events and our brain functions. At this point racing in catching up with the developing the web technologies, create social evolutions that have impacted the way we will celebrates significant life events. Internet have affected ways we form and maintain the relationship with the family, acquaintance and friends. Now that we could interact with other and keep other update on lives of our be much easily that that of the past, notion of the intimate relationship have changed. For example the social media allow the people in constantly updating the networks in regards to the lives. Using the text posts, videos, photos we will present ourselves to people around us allow us in staying in touch every moment with the people who will care in regards to the people we do not. Cause acquaintance from past few years political learning where we will go to and graduate from the school .This could create new sense of an intimacy that will not exist sin past as people feels that they know all there is in knowing in regards to people in the lives This will in turn have been decrease actually significance of personal life events like as high school reunion and family. Beginning of 21st century have seem more is in the social media and some interactive, crow base communication platform. Revolution have upended ways we will think in regards to the personal life events because of fact that with internet we will have the access in more variety of the options and ideas and now that everyone have say. Where as it is hard to say that internet is sole reason  of this developments there is no denying that this have made significant impact on the way it is used in our day to day lives (Drew.H, 2020).

4s week 3 assignment EH 2

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. There is an EXAMPLE attached to show you the format requirements. 

 https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_terminologies.htm

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_skills.htm 

 Include references, no copy-paste strictly. Use your own words. 

PCC

  

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

·  

· Ask an interesting, thoughtful question pertaining to the topic

· Provide extensive additional information on the topic

· Explain, define, or analyze the topic in detail

· Share an applicable personal experience

· Provide an outside source 

· Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Block Chain Development discussion 5

Chapter 8 describes the process of maintaining blockchain apps after deployment. Create a new thread, choose one aspect of app maintenance from the material in chapter 8, and describe the life cycle problem and how addressing your chosen problem in a blockchain environment differs from a traditional application development life cycle. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 7 or 8. You’re not trying to test each other, but you are trying to start a discussion.

You must do this following:

1) Create a new thread. As indicated above, choose one aspect of app maintenance from the material in chapter 8, and describe the life cycle problem and how addressing your chosen problem in a blockchain environment differs from a traditional application development life cycle. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 7 or 8. You’re not trying to test each other, but you are trying to start a discussion.

Research Google+ features

 

Google+ is a social networking site that lets users define and manage various groups of people and how they interact with them.  With Google+, users can define various circles, which might include people from work, good friends, and family, as well as casual acquaintances. Using such circle definitions, users can better control the posts they allow others to view.

For this project, research Google+ features.  Compare and contrast the Google+ features with those of at least two other social networks (such as Facebook).  This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Assignment

 

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Youtube link:  https://www.youtube.com/watch?v=QpoVlVhRQTg 

Advanced Operating Systems Project

 There are 4 parts for the project. The question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk
{
public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes
};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize) This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :  

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer) retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer) writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk
{
Public :
Filesys(string diskname, int numberofblocks, int blocksize);
int fsclose();
int fssynch();
int newfile(string file);
int rmfile(string file);
int getfirstblock(string file);
int addblock(string file, string block);
int delblock(string file, int blocknumber);
int readblock(string file, int blocknumber, string& buffer);
int writeblock(string file, int blocknumber, string buffer);
int nextblock(string file, int blocknumber);


Private :


int rootsize;           // maximum number of entries in ROOT

int fatsize;            // number of blocks occupied by FAT
vector filename;   // filenames in ROOT
vector firstblock; // firstblocks in ROOT
vector fat;             // FAT
};

An explanation of the member functions follows :

  • Filesys() This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:                                                           -figure 1 (what I attached below)           
  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like                                                   -figure 2 (what I attached below)  The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.  

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”. PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9]. Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.  
  • fssynch This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file) This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file) This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file) This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer) This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber) The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer) gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer) writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber) returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys
{
Public :

Shell(string filename, int blocksize, int numberofblocks);

int dir();// lists all files
int add(string file);// add a new file using input from the keyboard
int del(string file);// deletes the file
int type(string file);//lists the contents of file
int copy(string file1, string file2);//copies file1 to file2
};

An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :See the figure 4  (what I attached below) for the ls function of Filesys.See the figure 5 (what I attached below) for dir function of Shell. See the figure 6 (what I attached below)  for main program of Shell.*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys
{
Public :

Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);

int Build_Table(string input_file);
int Search(string value);

Private :

string flatfile;
string indexfile;

int IndexSearch(string value);
};

The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile) This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file) This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value) This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value) This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command.